WorldWideScience

Sample records for protocol layers service

  1. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  2. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  3. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  4. Feature-Driven Domain Analysis of Session Layer Protocols of Internet of Things

    NARCIS (Netherlands)

    Köksal, Omer; Tekinerdogan, B.

    2017-01-01

    The Internet of Things (IoT) architecture is defined as a layered structure in which each layer represents a coherent set of services. For supporting the communication among the different IoT entities many different communication protocols are now available in practice. For practitioners, it is

  5. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  6. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  7. The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss

    NARCIS (Netherlands)

    Sundramoorthy, V.; van de Glind, G.J.; Hartel, Pieter H.; Scholten, Johan

    We analyze the behavior of FRODO, a second generation service discovery protocol, in response to message loss in the network. Earlier protocols, like UPnP and Jini rely on underlying network layers to enhance their failure recovery. A comparison with UPnP and Jini shows that FRODO performs more

  8. The Performance of a Second Generation Service Discovery Protocol In Response to Message Loss

    NARCIS (Netherlands)

    Sundramoorthy, V.; van de Glind, G.J.; Hartel, Pieter H.; Scholten, Johan

    We analyze the behavior of FRODO, a second generation service discovery protocol, in response to message loss in the network. First generation protocols, like UPnP and Jini rely on underlying network layers to enhance their failure recovery. A comparison with UPnP and Jini shows that FRODO performs

  9. QoS-aware self-adaptation of communication protocols in a pervasive service middleware

    DEFF Research Database (Denmark)

    Zhang, Weishan; Hansen, Klaus Marius; Fernandes, João

    2010-01-01

    Pervasive computing is characterized by heterogeneous devices that usually have scarce resources requiring optimized usage. These devices may use different communication protocols which can be switched at runtime. As different communication protocols have different quality of service (Qo......S) properties, this motivates optimized self-adaption of protocols for devices, e.g., considering power consumption and other QoS requirements, e.g. round trip time (RTT) for service invocations, throughput, and reliability. In this paper, we present an extensible approach for self-adaptation of communication...... protocols for pervasive web services, where protocols are designed as reusable connectors and our middleware infrastructure can hide the complexity of using different communication protocols to upper layers. We also propose to use Genetic Algorithms (GAs) to find optimized configurations at runtime...

  10. Analytical approach to cross-layer protocol optimization in wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2008-04-01

    In the distributed operations of route discovery and maintenance, strong interaction occurs across mobile ad hoc network (MANET) protocol layers. Quality of service (QoS) requirements of multimedia service classes must be satisfied by the cross-layer protocol, along with minimization of the distributed power consumption at nodes and along routes to battery-limited energy constraints. In previous work by the author, cross-layer interactions in the MANET protocol are modeled in terms of a set of concatenated design parameters and associated resource levels by multivariate point processes (MVPPs). Determination of the "best" cross-layer design is carried out using the optimal control of martingale representations of the MVPPs. In contrast to the competitive interaction among nodes in a MANET for multimedia services using limited resources, the interaction among the nodes of a wireless sensor network (WSN) is distributed and collaborative, based on the processing of data from a variety of sensors at nodes to satisfy common mission objectives. Sensor data originates at the nodes at the periphery of the WSN, is successively transported to other nodes for aggregation based on information-theoretic measures of correlation and ultimately sent as information to one or more destination (decision) nodes. The "multimedia services" in the MANET model are replaced by multiple types of sensors, e.g., audio, seismic, imaging, thermal, etc., at the nodes; the QoS metrics associated with MANETs become those associated with the quality of fused information flow, i.e., throughput, delay, packet error rate, data correlation, etc. Significantly, the essential analytical approach to MANET cross-layer optimization, now based on the MVPPs for discrete random events occurring in the WSN, can be applied to develop the stochastic characteristics and optimality conditions for cross-layer designs of sensor network protocols. Functional dependencies of WSN performance metrics are described in

  11. Service Characteristics Based High Speed Multimedia Transport Protocol

    National Research Council Canada - National Science Library

    Chen, C

    1997-01-01

    .... This multimedia protocol will automatically extract service requirements from multimedia applications by selecting certain sets of parameters from user applications to optimally drive the lower level physical network...

  12. 78 FR 14701 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Science.gov (United States)

    2013-03-07

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and..., the information collection associated with the Commission's Misuse of Internet Protocol (IP) Captioned...- 2235075, or email [email protected] . SUPPLEMENTARY INFORMATION: This document announces that, on...

  13. Application Protocol, Initial Graphics Exchange Specification (IGES), Layered Electrical Product

    Energy Technology Data Exchange (ETDEWEB)

    O`Connell, L.J. [ed.

    1994-12-01

    An application protocol is an information systems engineering view of a specific product The view represents an agreement on the generic activities needed to design and fabricate the product the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transferring some or all of the information required. This application protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  14. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  15. Service-Oriented Synthesis of Distributed and Concurrent Protocol Specifications

    Directory of Open Access Journals (Sweden)

    Jehad Al Dallal

    2008-01-01

    Full Text Available Several methods have been proposed for synthesizing computer communication protocol specifications from service specifications. Some protocol synthesis methods based on the finite state machine (FSM model assume that primitives in the service specifications cannot be executed simultaneously. Others either handle only controlled primitive concurrency or have tight restrictions on the applicable FSM topologies. As a result, these synthesis methods are not applicable to an interesting variety of inherently concurrent applications, such as the Internet and mobile communication systems. This paper proposes a concurrent-based protocol synthesis method that eliminates the restrictions imposed by the earlier methods. The proposed method uses a synthesis method to obtain a sequential protocol specification (P-SPEC from a given service specification (S-SPEC. The resulting P-SPEC is then remodeled to consider the concurrency behavior specified in the S-SPEC, while guaranteeing that P-SPEC provides the specified service.

  16. Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

    Directory of Open Access Journals (Sweden)

    Qin Qin

    2015-01-01

    Full Text Available In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet. In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. Then, the cloud service business support platform is created based on the Internet application service management capabilities and wireless sensor network communication service capabilities, which is the architecture of the cloud support layer. The cooperative cloud service aware model was proposed. Finally, we proposed the mobile Internet coverage connectivity guarantee protocol. The results of experiments demonstrate that the proposed algorithm has excellent performance, in terms of the security of the Internet and the stability, as well as coverage connectivity ability.

  17. An improved network layer protocol based on mobile IPv6

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The mobile [Pv6 proposed by the IETF aims at providing mobility support on the next generation Internet. First, the authors described the basic principle of mobile lPv6 in brief and analyzed the advantages and disadvantages of it, presented a new idea of allocating a specific address space for mobile node ( MN ) and developed a new extension header and two ICMP message types for mobile IPv6. Lastly the authors proposed an optimization strategy, for mobile IPv6 based on these extensions of protocol, which has the following advantages:1 ) It is more convenient to manage the MNs because MN can be judged from its IP address; 2) When the correspondent node (CN) is not actively communicating with a MN, the MN and its home agent (HA) need not send Binding Update to tire CN, and the CN need not send Binding Request to the MN. Only when the CN really wants to send a packet to the MN, will the CN voluntarily send a MN Discover Request message to acquire the MN's care-of address. In this way, the transmission of Binding Update and Binding Request is greatly reduced, consequently the network overhead is also decreased; 3) While sending packets, the CN simply uses a MN Home Address Extension Header without using IPinlP encapsulation and routing header, which can reduce the redundant information in the packet and the message delay; 4) All the packets sent by the CN can be directly routed to the MN and the triangle routing can be completely avoided. By using these protocol extensions, the overhead of the network is greatly reduced and the network quality of services (QoS) is improved.

  18. Service Migration Protocol for NFC Links

    DEFF Research Database (Denmark)

    Nickelsen, Anders; Schwefel, Hans-Peter; Martin, Miquel

    2010-01-01

    of use while preserving state. This paper focuses on the scenario of migration between two devices in which the actual migration procedure is executed over near-field communication (NFC) ad-hoc links. The NFC link is interesting as it gives the user the perception of trust and enables service continuity...

  19. Internet protocol-based emergency services

    CERN Document Server

    Schulzrinne, Henning

    2013-01-01

    Written by international experts in the field, this book covers the standards, architecture and deployment issues related to IP-based emergency services This book brings together contributions from experts on technical and operational aspects within the international standardisation and regulatory processes relating to routing and handling of IP-based emergency calls.  Readers will learn how these standards work, how various standardization organizations contributed to them and about pilot projects, early deployment and current regulatory situation. Key Featur

  20. 78 FR 8090 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Science.gov (United States)

    2013-02-05

    ... equipment and software used in conjunction with their service have captions turned off as the default... equipment and software used in conjunction with their service have a default setting of captions off, so...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and...

  1. 78 FR 8032 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Science.gov (United States)

    2013-02-05

    ... providers to ensure that equipment and software used in conjunction with their service have a default...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and Speech Disabilities AGENCY: Federal...

  2. Adaptive MAC-layer protocol for multiservice digital access via tree and branch communication networks

    Science.gov (United States)

    Sriram, Kotikalapudi; Li, Chia-Chang; Magill, Peter; Whitaker, Norman A.; Dail, James E.; Dajer, Miguel A.; Siller, Curtis A.

    1995-11-01

    Described here is an adaptive MAC-layer protocol that supports multiservice (STM and ATM) applications in the context of subscriber access to tree and branch (e.g., fiber-coaxial cable) networks. The protocol adapts to changing demands for a mix of circuit and cell mode applications, and efficiently allocates upstream and downstream bandwidth to a variety of bursty and isochronous traffic sources. In the case of a hybrid fiber-coaxial (HFC) network the protocol resides in customer premises equipment and a common head-end controller. A medium-access control (MAC) processor provides for dividing the time domain for a given digital bitstream into successive frames, each with multiple STM and ATM time slots. Within the STM region of a frame, variable length time slots are allocated to calls (e.g., telephony, video telephony) requiring different amounts of bandwidth. A contention access signaling channel is also provided in this region for call control and set-up requests. Within the ATM region fixed-length time slots accommodate one individual ATM cell. These ATM time slots may be reserved for a user for the duration of a call or burst of successive ATM cells, or shared via a contention process. At least one contention time slot is available for signaling messages related to ATM call control and set-up requests. Further, the fixed-length ATM time slots may be reserved by a user for the duration of a call, or shared through a contention process. This paper describes the MAC-layer protocol, its relation to circuit- and ATM- amenable applications, and its performance with respect to signaling throughput and latency, and bandwidth efficiency for several service scenarios.

  3. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-05-01

    Full Text Available This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  4. Cross-layer protocol design for QoS optimization in real-time wireless sensor networks

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    The metrics of quality of service (QoS) for each sensor type in a wireless sensor network can be associated with metrics for multimedia that describe the quality of fused information, e.g., throughput, delay, jitter, packet error rate, information correlation, etc. These QoS metrics are typically set at the highest, or application, layer of the protocol stack to ensure that performance requirements for each type of sensor data are satisfied. Application-layer metrics, in turn, depend on the support of the lower protocol layers: session, transport, network, data link (MAC), and physical. The dependencies of the QoS metrics on the performance of the higher layers of the Open System Interconnection (OSI) reference model of the WSN protocol, together with that of the lower three layers, are the basis for a comprehensive approach to QoS optimization for multiple sensor types in a general WSN model. The cross-layer design accounts for the distributed power consumption along energy-constrained routes and their constituent nodes. Following the author's previous work, the cross-layer interactions in the WSN protocol are represented by a set of concatenated protocol parameters and enabling resource levels. The "best" cross-layer designs to achieve optimal QoS are established by applying the general theory of martingale representations to the parameterized multivariate point processes (MVPPs) for discrete random events occurring in the WSN. Adaptive control of network behavior through the cross-layer design is realized through the parametric factorization of the stochastic conditional rates of the MVPPs. The cross-layer protocol parameters for optimal QoS are determined in terms of solutions to stochastic dynamic programming conditions derived from models of transient flows for heterogeneous sensor data and aggregate information over a finite time horizon. Markov state processes, embedded within the complex combinatorial history of WSN events, are more computationally

  5. Model-Checking Web Services Business Activity Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2013-01-01

    Web Services Business Activity specification defines two coordination protocols BAwCC (Business Agreement with Coordination Completion) and BAwPC (Business Agreement with Participant Completion)that ensure a consistent agreement on the outcome of long-running distributed applications. In order...

  6. CaPiTo: protocol stacks for services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    CaPiTo allows the modelling of service-oriented applications using process algebras at three levels of abstraction. The abstract level focuses on the key functionality of the services; the plug-in level shows how to obtain security using standardised protocol stacks; finally, the concrete level...... allows to consider how security is obtained using asymmetric and symmetric cryptographic primitives. The CaPiTo approach therefore caters for a variety of developers that need to cooperate on designing and implementing service-oriented applications. We show how to formally analyse CaPiTo specifications...

  7. L2-LBMT: A Layered Load Balance Routing Protocol for underwater multimedia data transmission

    Science.gov (United States)

    Lv, Ze; Tang, Ruichun; Tao, Ye; Sun, Xin; Xu, Xiaowei

    2017-12-01

    Providing highly efficient underwater transmission of mass multimedia data is challenging due to the particularities of the underwater environment. Although there are many schemes proposed to optimize the underwater acoustic network communication protocols, from physical layer, data link layer, network layer to transport layer, the existing routing protocols for underwater wireless sensor network (UWSN) still cannot well deal with the problems in transmitting multimedia data because of the difficulties involved in high energy consumption, low transmission reliability or high transmission delay. It prevents us from applying underwater multimedia data to real-time monitoring of marine environment in practical application, especially in emergency search, rescue operation and military field. Therefore, the inefficient transmission of marine multimedia data has become a serious problem that needs to be solved urgently. In this paper, A Layered Load Balance Routing Protocol (L2-LBMT) is proposed for underwater multimedia data transmission. In L2-LBMT, we use layered and load-balance Ad Hoc Network to transmit data, and adopt segmented data reliable transfer (SDRT) protocol to improve the data transport reliability. And a 3-node variant of tornado (3-VT) code is also combined with the Ad Hoc Network to transmit little emergency data more quickly. The simulation results show that the proposed protocol can balance energy consumption of each node, effectively prolong the network lifetime and reduce transmission delay of marine multimedia data.

  8. Analysis of the radius and diameter protocols in terms of pricing telecommunication services

    Directory of Open Access Journals (Sweden)

    Vesna M. Radonjić

    2013-06-01

    Full Text Available Accounting of telecommunication services is closely related to the functions of authentication and authorization. These functions are usually considered together and implemented within the same server using a common protocol. The most renowned protocols for authentication, authorization and accounting are the RADIUS and Diameter protocols.   AAA functions and related protocols   In this chapter, the accounting management architecture developed by IETF is presented. It includes the interaction between network elements, accounting servers and billing and charging servers. Accounting data can be used for management, planning and charging users as well as other (specific purposes. Authentication is the process of confirming a user's digital identity, usually through some type of identifiers and related data. Authorization determines whether a particular entity is authorized to perform an activity.   Basic Functions of the RADIUS Protocol   The RADIUS architecture is based on a client-server model. It uses UDP on the transport layer. Transactions between the client and the server are authenticated, which is achieved by using a common secret key that is never sent through the network. Given the limited resources available to network devices, RADIUS facilitates and centralizes charging end users, provides some protection against active attacks by unauthorized users and it has great support from different network equipment vendors. Although RADIUS is a widely accepted protocol for the mechanisms of authentication, authorization and accounting, it has certain shortcomings that may be caused by the protocol itself or by its poor implementation.   Architecture and Operation of the Diameter Protocol   Diameter is a scalable protocol designed by the IETF working group in order to eliminate shortcomings and functional limitations of the RADIUS protocol and eventually to replace it in the near future. Most of the basic Diameter mechanisms and its

  9. An Energy-Efficient Link Layer Protocol for Reliable Transmission over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Iqbal Adnan

    2009-01-01

    Full Text Available In multihop wireless networks, hop-by-hop reliability is generally achieved through positive acknowledgments at the MAC layer. However, positive acknowledgments introduce significant energy inefficiencies on battery-constrained devices. This inefficiency becomes particularly significant on high error rate channels. We propose to reduce the energy consumption during retransmissions using a novel protocol that localizes bit-errors at the MAC layer. The proposed protocol, referred to as Selective Retransmission using Virtual Fragmentation (SRVF, requires simple modifications to the positive-ACK-based reliability mechanism but provides substantial improvements in energy efficiency. The main premise of the protocol is to localize bit-errors by performing partial checksums on disjoint parts or virtual fragments of a packet. In case of error, only the corrupted virtual fragments are retransmitted. We develop stochastic models of the Simple Positive-ACK-based reliability, the previously-proposed Packet Length Optimization (PLO protocol, and the SRVF protocol operating over an arbitrary-order Markov wireless channel. Our analytical models show that SRVF provides significant theoretical improvements in energy efficiency over existing protocols. We then use bit-error traces collected over different real networks to empirically compare the proposed and existing protocols. These experimental results further substantiate that SRVF provides considerably better energy efficiency than Simple Positive-ACK and Packet Length Optimization protocols.

  10. A Service Differentiated MAC Protocol for OFDM/TDMA Wireless Systems

    Institute of Scientific and Technical Information of China (English)

    WANG Ying; ZHANG Ping

    2005-01-01

    This paper proposes a Service Differentiated-Dynamic Slotted Multiple Access (SD-DSMA) protocol with QoS guarantee. The Media Access Control (MAC) frame format is variable according to the traffic of uplink and downlink and the traffic of control and data. In addition, the services are divided into two categories, Guaranteed Bandwidth (GB) and Best Effort (BE). Uplink control message slots are designed for the GB users to reduce contention. Taking into consideration the techniques in physical layer, a two-Dimensional Radio Resource Allocation (2-D RRA) method is proposed. The 2-D RRA is an efficient way to allocate radio resources for multi-cell, multi-user OFDM/TDMA system as it takes into consideration both the channel condition and the co-channel interference. The piggyback mechanism and fair scheduling algorithm are adopted for GB services, and the max C/I scheduling algorithm is used for BE services. The simulation results show that the proposed MAC protocol has better performance in terms of delay, probability of successful access request.

  11. Criteria for Evaluating Alternative Network and Link Layer Protocols for the NASA Constellation Program Communication Architecture

    Science.gov (United States)

    Benbenek, Daniel; Soloff, Jason; Lieb, Erica

    2010-01-01

    Selecting a communications and network architecture for future manned space flight requires an evaluation of the varying goals and objectives of the program, development of communications and network architecture evaluation criteria, and assessment of critical architecture trades. This paper uses Cx Program proposed exploration activities as a guideline; lunar sortie, outpost, Mars, and flexible path options are described. A set of proposed communications network architecture criteria are proposed and described. They include: interoperability, security, reliability, and ease of automating topology changes. Finally a key set of architecture options are traded including (1) multiplexing data at a common network layer vs. at the data link layer, (2) implementing multiple network layers vs. a single network layer, and (3) the use of a particular network layer protocol, primarily IPv6 vs. Delay Tolerant Networking (DTN). In summary, the protocol options are evaluated against the proposed exploration activities and their relative performance with respect to the criteria are assessed. An architectural approach which includes (a) the capability of multiplexing at both the network layer and the data link layer and (b) a single network layer for operations at each program phase, as these solutions are best suited to respond to the widest array of program needs and meet each of the evaluation criteria.

  12. A Performance Evaluation of NACK-Oriented Protocols as the Foundation of Reliable Delay- Tolerant Networking Convergence Layers

    Science.gov (United States)

    Iannicca, Dennis; Hylton, Alan; Ishac, Joseph

    2012-01-01

    Delay-Tolerant Networking (DTN) is an active area of research in the space communications community. DTN uses a standard layered approach with the Bundle Protocol operating on top of transport layer protocols known as convergence layers that actually transmit the data between nodes. Several different common transport layer protocols have been implemented as convergence layers in DTN implementations including User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Licklider Transmission Protocol (LTP). The purpose of this paper is to evaluate several stand-alone implementations of negative-acknowledgment based transport layer protocols to determine how they perform in a variety of different link conditions. The transport protocols chosen for this evaluation include Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), Licklider Transmission Protocol (LTP), NACK-Oriented Reliable Multicast (NORM), and Saratoga. The test parameters that the protocols were subjected to are characteristic of common communications links ranging from terrestrial to cis-lunar and apply different levels of delay, line rate, and error.

  13. A review on transport layer protocol performance for delivering video on an adhoc network

    Science.gov (United States)

    Suherman; Suwendri; Al-Akaidi, Marwan

    2017-09-01

    The transport layer protocol is responsible for the end to end data transmission. Transmission control protocol (TCP) provides a reliable connection and user datagram protocol (UDP) offers fast but unguaranteed data transfer. Meanwhile, the 802.11 (wireless fidelity/WiFi) networks have been widely used as internet hotspots. This paper evaluates TCP, TCP variants and UDP performances for video transmission on an adhoc network. The transport protocol - medium access cross-layer is proposed by prioritizing TCP acknowledgement to reduce delay. The NS-2 evaluations show that the average delays increase linearly for all the evaluated protocols and the average packet losses grow logarithmically. UDP produces the lowest transmission delay; 5.4% and 5.8% lower than TCP and TCP variant, but experiences the highest packet loss. Both TCP and TCP Vegas maintain packet loss as low as possible. The proposed cross-layer successfully decreases TCP and TCP Vegas delay about 0.12 % and 0.15%, although losses remain similar.

  14. Denial of Service Attacks on 802.1X Security Protocol

    National Research Council Canada - National Science Library

    Ozan, Orhan

    2004-01-01

    ... infrastructure, such as military and administrative government LANs. The IEEE 802.11 wireless standard specifies both an authentication service and encryption protocol, but research has demonstrated that these protocols are severely flawed...

  15. STRESS TESTS FOR VIDEOSTREAMING SERVICES BASED ON RTSP PROTOCOL

    Directory of Open Access Journals (Sweden)

    Gabriel Elías Chanchí Golondrino

    2015-11-01

    Full Text Available Video-streaming is a technology with major implications these days in such diverse contexts as education, health and the business sector; all of this regarding the ease it provides for remote access to live or recorded media content, allowing communication regardless of geographic location. One standard protocol that enables implementation of this technology is real time streaming protocol, or RTSP. However, since most application servers and Internet services are supported on HTTP requests, very little research has been done on generating tools for carrying out stress tests on streaming servers. This paper presents a stress measuring tool called Hermes, developed in Python, which allows calculation of response times for establishing RTSP connections to streaming servers, as well as obtaining RAM memory consumption and CPU usage rate data from these servers. Hermes was deployed in a video-streaming environment where stress testing was carried out on the LIVE555 server, using calls in the background to VLC and OpenRTSP open source clients. 

  16. A multi-protocol framework for ad-hoc service discovery

    OpenAIRE

    Flores-Cortes, C.; Blair, Gordon S.; Grace, P.

    2006-01-01

    Discovering the appropriate services in ad-hoc computing environments where a great number of devices and software components collaborate discreetly and provide numerous services is an important challenge. Service discovery protocols make it possible for participating nodes in a network to locate and advertise services with minimum user intervention. However, because it is not possible to predict at design time which protocols will be used to advertise services in a given context/environment,...

  17. OPTIMISATION OF BUFFER SIZE FOR ENHANCING QOS OF VIDEO TRAFFIC USING CROSS LAYERED HYBRID TRANSPORT LAYER PROTOCOL APPROACH

    Directory of Open Access Journals (Sweden)

    S. Matilda

    2011-03-01

    Full Text Available Video streaming is gaining importance, with the wide popularity of multimedia rich applications in the Internet. Video streams are delay sensitive and require seamless flow for continuous visualization. Properly designed buffers offer a solution to queuing delay. The diagonally opposite QoS metrics associated with video traffic poses an optimization problem, in the design of buffers. This paper is a continuation of our previous work [1] and deals with the design of buffers. It aims at finding the optimum buffer size for enhancing QoS offered to video traffic. Network-centric QoS provisioning approach, along with hybrid transport layer protocol approach is adopted, to arrive at an optimum size which is independent of RTT. In this combinational approach, buffers of routers and end devices are designed to satisfy the various QoS parameters at the transport layer. OPNET Modeler is used to simulate environments for testing the design. Based on the results of simulation it is evident that the hybrid transport layer protocol approach is best suited for transmitting video traffic as it supports the economical design.

  18. Two-Layer Hierarchy Optimization Model for Communication Protocol in Railway Wireless Monitoring Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Ma

    2018-01-01

    Full Text Available The wireless monitoring system is always destroyed by the insufficient energy of the sensors in railway. Hence, how to optimize the communication protocol and extend the system lifetime is crucial to ensure the stability of system. However, the existing studies focused primarily on cluster-based or multihop protocols individually, which are ineffective in coping with the complex communication scenarios in the railway wireless monitoring system (RWMS. This study proposes a hybrid protocol which combines the cluster-based and multihop protocols (CMCP to minimize and balance the energy consumption in different sections of the RWMS. In the first hierarchy, the total energy consumption is minimized by optimizing the cluster quantities in the cluster-based protocol and the number of hops and the corresponding hop distances in the multihop protocol. In the second hierarchy, the energy consumption is balanced through rotating the cluster head (CH in the subnetworks and further optimizing the hops and the corresponding hop distances in the backbone network. On this basis, the system lifetime is maximized with the minimum and balance energy consumption among the sensors. Furthermore, the hybrid particle swarm optimization and genetic algorithm (PSO-GA are adopted to optimize the energy consumption from the two-layer hierarchy. Finally, the effectiveness of the proposed CMCP is verified in the simulation. The performances of the proposed CMCP in system lifetime, residual energy, and the corresponding variance are all superior to the LEACH protocol widely applied in the previous research. The effective protocol proposed in this study can facilitate the application of the wireless monitoring network in the railway system and enhance safety operation of the railway.

  19. Abstraction Layer For Development And Deployment Of Cloud Services

    Directory of Open Access Journals (Sweden)

    Binh Minh Nguyen

    2012-01-01

    Full Text Available In this paper, we will present an abstraction layer for cloud computing, which intends to simplify the manipulation with virtual machines in clouds for easy and controlled development and deployment of cloud services. It also ensures interoperability between different cloud infrastructures and allows developers to create cloud appliances easily via inheritance mechanisms.

  20. Network Layer Protocol Activation for Packet Data Access in UMTS WCDMA Laboratory Network

    OpenAIRE

    Lakkisto, Erkka

    2011-01-01

    The purpose of this Bachelor’s Thesis was to set up the UMTS WCDMA network in the laboratory environment of Helsinki Metropolia University of Applied Sciences and to study the network layer protocol activation for packet data access. The development of 3G technology has been very rapid and it can be considered as one of the main technologies in telecommunication. Implementing the laboratory network in Metropolia enables teaching and researching of the modern network technology. Labora...

  1. Cross-layer cluster-based energy-efficient protocol for wireless sensor networks.

    Science.gov (United States)

    Mammu, Aboobeker Sidhik Koyamparambil; Hernandez-Jayo, Unai; Sainz, Nekane; de la Iglesia, Idoia

    2015-04-09

    Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs). One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE) can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs) and a cluster head (CH). The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH) and hybrid energy-efficient distributed clustering (HEED).

  2. Cross-Layer Cluster-Based Energy-Efficient Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Aboobeker Sidhik Koyamparambil Mammu

    2015-04-01

    Full Text Available Recent developments in electronics and wireless communications have enabled the improvement of low-power and low-cost wireless sensors networks (WSNs. One of the most important challenges in WSNs is to increase the network lifetime due to the limited energy capacity of the network nodes. Another major challenge in WSNs is the hot spots that emerge as locations under heavy traffic load. Nodes in such areas quickly drain energy resources, leading to disconnection in network services. In such an environment, cross-layer cluster-based energy-efficient algorithms (CCBE can prolong the network lifetime and energy efficiency. CCBE is based on clustering the nodes to different hexagonal structures. A hexagonal cluster consists of cluster members (CMs and a cluster head (CH. The CHs are selected from the CMs based on nodes near the optimal CH distance and the residual energy of the nodes. Additionally, the optimal CH distance that links to optimal energy consumption is derived. To balance the energy consumption and the traffic load in the network, the CHs are rotated among all CMs. In WSNs, energy is mostly consumed during transmission and reception. Transmission collisions can further decrease the energy efficiency. These collisions can be avoided by using a contention-free protocol during the transmission period. Additionally, the CH allocates slots to the CMs based on their residual energy to increase sleep time. Furthermore, the energy consumption of CH can be further reduced by data aggregation. In this paper, we propose a data aggregation level based on the residual energy of CH and a cost-aware decision scheme for the fusion of data. Performance results show that the CCBE scheme performs better in terms of network lifetime, energy consumption and throughput compared to low-energy adaptive clustering hierarchy (LEACH and hybrid energy-efficient distributed clustering (HEED.

  3. Sharing Service Resource Information for Application Integration in a Virtual Enterprise - Modeling the Communication Protocol for Exchanging Service Resource Information

    Science.gov (United States)

    Yamada, Hiroshi; Kawaguchi, Akira

    Grid computing and web service technologies enable us to use networked resources in a coordinated manner. An integrated service is made of individual services running on coordinated resources. In order to achieve such coordinated services autonomously, the initiator of a coordinated service needs to know detailed service resource information. This information ranges from static attributes like the IP address of the application server to highly dynamic ones like the CPU load. The most famous wide-area service discovery mechanism based on names is DNS. Its hierarchical tree organization and caching methods take advantage of the static information managed. However, in order to integrate business applications in a virtual enterprise, we need a discovery mechanism to search for the optimal resources based on the given a set of criteria (search keys). In this paper, we propose a communication protocol for exchanging service resource information among wide-area systems. We introduce the concept of the service domain that consists of service providers managed under the same management policy. This concept of the service domain is similar to that for autonomous systems (ASs). In each service domain, the service information provider manages the service resource information of service providers that exist in this service domain. The service resource information provider exchanges this information with other service resource information providers that belong to the different service domains. We also verified the protocol's behavior and effectiveness using a simulation model developed for proposed protocol.

  4. A Cross-Layer Duty Cycle MAC Protocol Supporting a Pipeline Feature for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Chon Kim

    2011-05-01

    Full Text Available Although the conventional duty cycle MAC protocols for Wireless Sensor Networks (WSNs such as RMAC perform well in terms of saving energy and reducing end-to-end delivery latency, they were designed independently and require an extra routing protocol in the network layer to provide path information for the MAC layer. In this paper, we propose a new cross-layer duty cycle MAC protocol with data forwarding supporting a pipeline feature (P-MAC for WSNs. P-MAC first divides the whole network into many grades around the sink. Each node identifies its grade according to its logical hop distance to the sink and simultaneously establishes a sleep/wakeup schedule using the grade information. Those nodes in the same grade keep the same schedule, which is staggered with the schedule of the nodes in the adjacent grade. Then a variation of the RTS/CTS handshake mechanism is used to forward data continuously in a pipeline fashion from the higher grade to the lower grade nodes and finally to the sink. No extra routing overhead is needed, thus increasing the network scalability while maintaining the superiority of duty-cycling. The simulation results in OPNET show that P-MAC has better performance than S-MAC and RMAC in terms of packet delivery latency and energy efficiency.

  5. Modelling and Verification of Web Services Business Activity Protocol

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2011-01-01

    WS-Business Activity specification defines two coordination protocols in order to ensure a consistent agreement on the outcome of long-running distributed applications. We use the model checker Uppaal to analyse the Business Agreement with Coordination Completion protocol type. Our analyses show ...

  6. Measurement protocols for performance testing of dosimetry services for external radiations

    International Nuclear Information System (INIS)

    1993-01-01

    In the Health and Safety Executive's ''Requirements for the Approval of Dosimetry Services under the Ionising Radiations Regulations 1985'', it is stipulated that dosimetry services seeking approval must show that they have successfully completed a performance test. The services must arrange for the tests to be carried out on application and thereafter every 18 months, by a laboratory which has received accreditation from the National Measurement Accreditation Service (NAMAS) for the whole performance testing activity. The performance tests must be carried out to published protocols and the purpose here is to provide protocols for external, whole body film and TLD dosimetry services, and for skin and extremity dosimetry services. (Author)

  7. Layered Electrical Product Application Protocol (AP). Draft: Initial Graphics Exchange Specification (IGES)

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    An application protocol is an information systems engineering view of a specific product. The view represents an agreement on the generic activities needed to design and fabricate the product, the agreement on the information needed to support those activities, and the specific constructs of a product data standard for use in transfering some or all of the information required. This applications protocol describes the data for electrical and electronic products in terms of a product description standard called the Initial Graphics Exchange Specification (IGES). More specifically, the Layered Electrical Product IGES Application Protocol (AP) specifies the mechanisms for defining and exchanging computer-models and their associated data for those products which have been designed in two dimensional geometry so as to be produced as a series of layers in IGES format. The AP defines the appropriateness of the data items for describing the geometry of the various parts of a product (shape and location), the connectivity, and the processing and material characteristics. Excluded is the behavioral requirements which the product was intended to satisfy, except as those requirements have been recorded as design rules or product testing requirements.

  8. Verification of communication protocols in web services model-checking service compositions

    CERN Document Server

    Tari, Zahir; Mukherjee, Anshuman

    2014-01-01

    Gathers recent advancements in the field of self-organizing wireless sensor networks and provides readers with the essential, state-of-the-art information about sensor networking. In the near future, wireless sensor networks will become an integral part of our day-to-day life. To solve different sensor networking related issues, researchers have put a great deal of effort into coming up with innovative ideas. Verification of Communication Protocols in Web Services: Model-Checking Service Compositions gathers recent advancements in the field of self-organizing wireless sensor networks and provides readers with integral information about sensor networking. It introduces current technological trends, particularly in node organization, and provides implementation details of each networking type to help readers set up sensor networks in their related job fields. In addition, it identifies the limitations of current technologies, as well as future research directions.

  9. Cross Layer PHY-MAC Protocol for Wireless Static and Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Chris Blondia

    2008-11-01

    Full Text Available Multihop mobile wireless networks have drawn a lot of attention in recent years thanks to their wide applicability in civil and military environments. Since the existing IEEE 802.11 distributed coordination function (DCF standard does not provide satisfactory access to the wireless medium in multihop mobile networks, we have designed a cross-layer protocol, (CroSs-layer noise aware power driven MAC (SNAPdMac, which consists of two parts. The protocol first concentrates on the flexible adjustment of the upper and lower bounds of the contention window (CW to lower the number of collisions. In addition, it uses a power control scheme, triggered by the medium access control (MAC layer, to limit the waste of energy and also to decrease the number of collisions. Thanks to a noticeable energy conservation and decrease of the number of collisions, it prolongs significantly the lifetime of the network and delays the death of the first node while increasing both the throughput performance and the sending bit rate/throughput fairness among contending flows.

  10. Impact of Transport Layer Protocols on Reliable Information Access in Smart Grids

    DEFF Research Database (Denmark)

    Shahid, Kamal; Saeed, Aamir; Kristensen, Thomas le Fevre

    2017-01-01

    Time is critical for certain types of dynamic information (e.g. frequency control) in a smart grid scenario. The usefulness of such information depends upon the arrival within a specific frame of time, which in other case may not serve the purpose and effect controller’s performance....... The question is addressed by analyzing the performance of UDP and TCP over imperfect network conditions to show how the selection of transport layer protocol can dramatically affect controller’s performance. This analysis is based on a quality metric called mismatch probability that considers occurrence...

  11. Selecting corporate political tactics: The Montreal Protocol on substances that deplete the ozone layer

    International Nuclear Information System (INIS)

    Getz, K.A.

    1991-01-01

    This study examines factors influencing the choice of one set of tactics over others. The case of ozone depletion is used as the research context, and the data are drawn from US companies having a stake in this issue. A model is developed which suggests that a firm's choice of political tactics (dependent variable) is dependent on the targets of political activity and the nature of the issue of concern (independent variables), and a variety of organizational and industry factors (moderating variables). The paradigm of agency is used to systematically assess the relative importance of these factors. To test the relevance of the model, an empirical study was done. The case of the Montreal protocol on Substances That Deplete the Ozone Layer was chosen as a setting; and 551 firms directly affected by policy intended to protect the ozone layer were surveyed. There were 151 usable responses. Generally, the findings were consistent with the model

  12. A Formal Analysis of the Web Services Atomic Transaction Protocol with UPPAAL

    DEFF Research Database (Denmark)

    Ravn, Anders Peter; Srba, Jiri; Vighio, Saleem

    2010-01-01

    We present a formal analysis of the Web Services Atomic Transaction (WS-AT) protocol. WS-AT is a part of the WS-Coordination framework and describes an algorithm for reaching agreement on the outcome of a distributed transaction. The protocol is modelled and verified using the model checker UPPAAL...

  13. Performance Evaluation of a Cluster-Based Service Discovery Protocol for Heterogeneous Wireless Sensor Networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2006-01-01

    Abstract—This paper evaluates the performance in terms of resource consumption of a service discovery protocol proposed for heterogeneous Wireless Sensor Networks (WSNs). The protocol is based on a clustering structure, which facilitates the construction of a distributed directory. Nodes with higher

  14. An XML-Based Protocol for Distributed Event Services

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    This viewgraph presentation provides information on the application of an XML (extensible mark-up language)-based protocol to the developing field of distributed processing by way of a computational grid which resembles an electric power grid. XML tags would be used to transmit events between the participants of a transaction, namely, the consumer and the producer of the grid scheme.

  15. A Practice-Based Evaluation of Distress Screening Protocol Adherence and Medical Service Utilization.

    Science.gov (United States)

    Zebrack, Brad; Kayser, Karen; Bybee, Deborah; Padgett, Lynne; Sundstrom, Laura; Jobin, Chad; Oktay, Julianne

    2017-07-01

    Background: This study examined the extent to which cancer programs demonstrated adherence to their own prescribed screening protocol, and whether adherence to that protocol was associated with medical service utilization. The hypothesis is that higher rates of service utilization are associated with lower rates of adherence to screening protocols. Methods: Oncology social workers at Commission on Cancer-accredited cancer programs reviewed electronic health records (EHRs) in their respective cancer programs during a 2-month period in 2014. Rates of overall adherence to a prescribed distress screening protocol were calculated based on documentation in the EHR that screening adherence and an appropriate clinical response had occurred. We examined documentation of emergency department (ED) use and hospitalization within 2 months after the screening visit. Results: Review of 8,409 EHRs across 55 cancer centers indicated that the overall adherence rate to screening protocols was 62.7%. The highest rates of adherence were observed in Community Cancer Programs (76.3%) and the lowest rates were in NCI-designated Cancer Centers (43.3%). Rates of medical service utilization were significantly higher than expected when overall protocol adherence was lacking. After controlling for patient and institutional characteristics, risk ratios for ED use (0.82) and hospitalization (0.81) suggest that when overall protocol adherence was documented, 18% to 19% fewer patients used these medical services. Conclusions: The observed associations between a mandated psychosocial care protocol and medical service utilization suggest opportunities for operational efficiencies and costs savings. Further investigations of protocol integrity, as well as the clinical care models by which psychosocial care is delivered, are warranted. Copyright © 2017 by the National Comprehensive Cancer Network.

  16. Distributed Denial of Service Detection with IPFIX Protocol

    Directory of Open Access Journals (Sweden)

    M. R. Mukhtarov

    2011-03-01

    Full Text Available In this article the existing methods of detecting Distributed Denial of Service attacks based on the analysis of network traffic or Netflow data is examined. Advantages and disadvantages of anomaly detection methods are listed. Authors suggest to use a method of maximum entropy estimation for the analysis of IPFIX data and propose an approach for detecting Distributed Denial of Service attacks.

  17. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  18. Elder Abuse Identification in the Prehospital Setting: An Examination of State Emergency Medical Services Protocols.

    Science.gov (United States)

    Namboodri, Brooke L; Rosen, Tony; Dayaa, Joseph A; Bischof, Jason J; Ramadan, Nadeem; Patel, Mehul D; Grover, Joseph; Brice, Jane H; Platts-Mills, Timothy F

    2018-03-22

    To describe statewide emergency medical service (EMS) protocols relating to identification, management, and reporting of elder abuse in the prehospital setting. Cross-sectional analysis. Statewide EMS protocols in the United States. Publicly available statewide EMS protocols identified from published literature, http://EMSprotocols.org, and each state's public health website. Protocols were reviewed to determine whether elder abuse was mentioned, elder abuse was defined, potential indicators of elder abuse were listed, management of older adults experiencing abuse was described, and instructions regarding reporting were provided. EMS protocols for child abuse were reviewed in the same manner for the purpose of comparison. Of the 35 publicly available statewide EMS protocols, only 14 (40.0%) mention elder abuse. Of protocols that mention elder abuse, 6 (42.9%) define elder abuse, 10 (71.4%) describe indicators of elder abuse, 8 (57.1%) provide instruction regarding management, and 12 (85.7%) provide instruction regarding reporting. Almost twice as many states met each of these metrics for child abuse. Statewide EMS protocols for elder abuse vary in regard to identification, management, and reporting, with the majority of states having no content on this subject. Expansion and standardization of protocols may increase the identification of elder abuse. © 2018, Copyright the Authors Journal compilation © 2018, The American Geriatrics Society.

  19. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  20. Comparison of two oestrus synchronisation protocols administered to dairy cows during routine reproduction services

    DEFF Research Database (Denmark)

    Viora, L; Denwood, M; Ellis, K

    2015-01-01

    Progesterone-based oestrus synchronisation protocols are frequently used for treatment of cows presented for examination during routine reproduction management service. This study aimed to evaluate the effect of the addition of gonadotrophin-releasing hormone (GnRH) at the start of a progesterone......-based oestrus synchronisation protocol for cows presented for examination during routine veterinary service on a commercial dairy farm over 10 months. Overall 139 animals were retained in the study, of which 78 received a standard progesterone-based treatment (STD) and 61 received the same treatment...

  1. EPA Region 1 - Map Layers for Valley ID Tool (Hosted Feature Service)

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Valley Service Feature Layer hosts spatial data for EPA Region 1's Valley Identification Tool. These layers contain attribute information added by EPA R1 GIS...

  2. SSWAP: A Simple Semantic Web Architecture and Protocol for semantic web services.

    Science.gov (United States)

    Gessler, Damian D G; Schiltz, Gary S; May, Greg D; Avraham, Shulamit; Town, Christopher D; Grant, David; Nelson, Rex T

    2009-09-23

    SSWAP (Simple Semantic Web Architecture and Protocol; pronounced "swap") is an architecture, protocol, and platform for using reasoning to semantically integrate heterogeneous disparate data and services on the web. SSWAP was developed as a hybrid semantic web services technology to overcome limitations found in both pure web service technologies and pure semantic web technologies. There are currently over 2400 resources published in SSWAP. Approximately two dozen are custom-written services for QTL (Quantitative Trait Loci) and mapping data for legumes and grasses (grains). The remaining are wrappers to Nucleic Acids Research Database and Web Server entries. As an architecture, SSWAP establishes how clients (users of data, services, and ontologies), providers (suppliers of data, services, and ontologies), and discovery servers (semantic search engines) interact to allow for the description, querying, discovery, invocation, and response of semantic web services. As a protocol, SSWAP provides the vocabulary and semantics to allow clients, providers, and discovery servers to engage in semantic web services. The protocol is based on the W3C-sanctioned first-order description logic language OWL DL. As an open source platform, a discovery server running at http://sswap.info (as in to "swap info") uses the description logic reasoner Pellet to integrate semantic resources. The platform hosts an interactive guide to the protocol at http://sswap.info/protocol.jsp, developer tools at http://sswap.info/developer.jsp, and a portal to third-party ontologies at http://sswapmeet.sswap.info (a "swap meet"). SSWAP addresses the three basic requirements of a semantic web services architecture (i.e., a common syntax, shared semantic, and semantic discovery) while addressing three technology limitations common in distributed service systems: i.e., i) the fatal mutability of traditional interfaces, ii) the rigidity and fragility of static subsumption hierarchies, and iii) the

  3. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Directory of Open Access Journals (Sweden)

    Aamir Shahzad

    2016-06-01

    Full Text Available Substantial changes have occurred in the Information Technology (IT sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  4. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-06-14

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.

  5. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

    Science.gov (United States)

    Shahzad, Aamir; Landry, René; Lee, Malrey; Xiong, Naixue; Lee, Jongho; Lee, Changhoon

    2016-01-01

    Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network. PMID:27314351

  6. Cross-Layer Active Predictive Congestion Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yinfeng Wu

    2009-10-01

    Full Text Available In wireless sensor networks (WSNs, there are numerous factors that may cause network congestion problems, such as the many-to-one communication modes, mutual interference of wireless links, dynamic changes of network topology and the memory-restrained characteristics of nodes. All these factors result in a network being more vulnerable to congestion. In this paper, a cross-layer active predictive congestion control scheme (CL-APCC for improving the performance of networks is proposed. Queuing theory is applied in the CL-APCC to analyze data flows of a single-node according to its memory status, combined with the analysis of the average occupied memory size of local networks. It also analyzes the current data change trends of local networks to forecast and actively adjust the sending rate of the node in the next period. In order to ensure the fairness and timeliness of the network, the IEEE 802.11 protocol is revised based on waiting time, the number of the node‟s neighbors and the original priority of data packets, which dynamically adjusts the sending priority of the node. The performance of CL-APCC, which is evaluated by extensive simulation experiments. is more efficient in solving the congestion in WSNs. Furthermore, it is clear that the proposed scheme has an outstanding advantage in terms of improving the fairness and lifetime of networks.

  7. Cross-layer active predictive congestion control protocol for wireless sensor networks.

    Science.gov (United States)

    Wan, Jiangwen; Xu, Xiaofeng; Feng, Renjian; Wu, Yinfeng

    2009-01-01

    In wireless sensor networks (WSNs), there are numerous factors that may cause network congestion problems, such as the many-to-one communication modes, mutual interference of wireless links, dynamic changes of network topology and the memory-restrained characteristics of nodes. All these factors result in a network being more vulnerable to congestion. In this paper, a cross-layer active predictive congestion control scheme (CL-APCC) for improving the performance of networks is proposed. Queuing theory is applied in the CL-APCC to analyze data flows of a single-node according to its memory status, combined with the analysis of the average occupied memory size of local networks. It also analyzes the current data change trends of local networks to forecast and actively adjust the sending rate of the node in the next period. In order to ensure the fairness and timeliness of the network, the IEEE 802.11 protocol is revised based on waiting time, the number of the node's neighbors and the original priority of data packets, which dynamically adjusts the sending priority of the node. The performance of CL-APCC, which is evaluated by extensive simulation experiments. is more efficient in solving the congestion in WSNs. Furthermore, it is clear that the proposed scheme has an outstanding advantage in terms of improving the fairness and lifetime of networks.

  8. Dynamic QoS management in Differentiated Services using bandwidth brokers, RSVP aggregation and load control protocols

    NARCIS (Netherlands)

    Westberg, Lars; Eriksson, Anders; Karagiannis, Georgios; Heijenk, Geert; Rexhepi, Vlora; Partain, David

    2001-01-01

    A method and network subsystem for providing on demand end to end Quality of Service (Qos) in a dynamic manner, use a combination of Resource Reservation Protocol (RSVP), load control protocol (and its successors) and Bandwidth Brokers (BBs)(1106) which communicate using a predetermined protocol.

  9. Dynamic QoS management in Differentiated Services using bandwidth brokers, RSVP aggregation and load control protocols

    NARCIS (Netherlands)

    Westberg, Lars; Eriksson, Anders; Karagiannis, Georgios; Heijenk, Geert; Rexhepi, Vlora; Partain, David

    2009-01-01

    A method and network subsystem for providing on demand end to end Quality of Service (Qos) in a dynamic manner, use a combination of Resource Reservation Protocol (RSVP), load control protocol (and its successors) and Bandwidth Brokers (BBs)(1106) which communicate using a predetermined protocol.

  10. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    M. Isabel Vara

    2015-07-01

    Full Text Available Service discovery plays an important role in mobile ad hoc networks (MANETs. The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2. In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1. In order to advertise services, we have added a new type-length-value structure (TLV to the OLSRv2 protocol, called service discovery message (SDM, according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV protocol, in terms of service discovery ratio, service latency and network overhead.

  11. Cross-Layer Service Discovery Mechanism for OLSRv2 Mobile Ad Hoc Networks.

    Science.gov (United States)

    Vara, M Isabel; Campo, Celeste

    2015-07-20

    Service discovery plays an important role in mobile ad hoc networks (MANETs). The lack of central infrastructure, limited resources and high mobility make service discovery a challenging issue for this kind of network. This article proposes a new service discovery mechanism for discovering and advertising services integrated into the Optimized Link State Routing Protocol Version 2 (OLSRv2). In previous studies, we demonstrated the validity of a similar service discovery mechanism integrated into the previous version of OLSR (OLSRv1). In order to advertise services, we have added a new type-length-value structure (TLV) to the OLSRv2 protocol, called service discovery message (SDM), according to the Generalized MANET Packet/Message Format defined in Request For Comments (RFC) 5444. Each node in the ad hoc network only advertises its own services. The advertisement frequency is a user-configurable parameter, so that it can be modified depending on the user requirements. Each node maintains two service tables, one to store information about its own services and another one to store information about the services it discovers in the network. We present simulation results, that compare our service discovery integrated into OLSRv2 with the one defined for OLSRv1 and with the integration of service discovery in Ad hoc On-demand Distance Vector (AODV) protocol, in terms of service discovery ratio, service latency and network overhead.

  12. Parametric Packet-Layer Model for Evaluation Audio Quality in Multimedia Streaming Services

    Science.gov (United States)

    Egi, Noritsugu; Hayashi, Takanori; Takahashi, Akira

    We propose a parametric packet-layer model for monitoring audio quality in multimedia streaming services such as Internet protocol television (IPTV). This model estimates audio quality of experience (QoE) on the basis of quality degradation due to coding and packet loss of an audio sequence. The input parameters of this model are audio bit rate, sampling rate, frame length, packet-loss frequency, and average burst length. Audio bit rate, packet-loss frequency, and average burst length are calculated from header information in received IP packets. For sampling rate, frame length, and audio codec type, the values or the names used in monitored services are input into this model directly. We performed a subjective listening test to examine the relationships between these input parameters and perceived audio quality. The codec used in this test was the Advanced Audio Codec-Low Complexity (AAC-LC), which is one of the international standards for audio coding. On the basis of the test results, we developed an audio quality evaluation model. The verification results indicate that audio quality estimated by the proposed model has a high correlation with perceived audio quality.

  13. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    Science.gov (United States)

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  14. Analysis of quality control protocol implementation of equipment in radiotherapy services

    International Nuclear Information System (INIS)

    Calcina, Carmen S. Guzman; Lima, Luciana P. de; Rubo, Rodrigo A.; Ferraz, Eduardo; Almeida, Adelaide de

    2000-01-01

    Considering the importance of the Quality Assurance in the radiotherapy services, there was an interest to make tests' evaluation for a Quality Control for the cobalt equipment, linear accelerator and simulator as a classification and comparison. The work proposed is a suggestion that can serve as tool for medical physicists that are starting to work in the radiotherapy area and for the most experts. The discussions were made by the gathering of local tests and official protocols, resulting in a minimum protocol as a suggestion for a routine work, emphasizing the periodicity and level of tolerance of each one of the tests. (author)

  15. A protocol for eliciting nonmaterial values through a cultural ecosystem services frame.

    Science.gov (United States)

    Gould, Rachelle K; Klain, Sarah C; Ardoin, Nicole M; Satterfield, Terre; Woodside, Ulalia; Hannahs, Neil; Daily, Gretchen C; Chan, Kai M

    2015-04-01

    Stakeholders' nonmaterial desires, needs, and values often critically influence the success of conservation projects. These considerations are challenging to articulate and characterize, resulting in their limited uptake in management and policy. We devised an interview protocol designed to enhance understanding of cultural ecosystem services (CES). The protocol begins with discussion of ecosystem-related activities (e.g., recreation, hunting) and management and then addresses CES, prompting for values encompassing concepts identified in the Millennium Ecosystem Assessment (2005) and explored in other CES research. We piloted the protocol in Hawaii and British Columbia. In each location, we interviewed 30 individuals from diverse backgrounds. We analyzed results from the 2 locations to determine the effectiveness of the interview protocol in elucidating nonmaterial values. The qualitative and spatial components of the protocol helped characterize cultural, social, and ethical values associated with ecosystems in multiple ways. Maps and situational, or vignette-like, questions helped respondents articulate difficult-to-discuss values. Open-ended prompts allowed respondents to express a diversity of ecosystem-related values and proved sufficiently flexible for interviewees to communicate values for which the protocol did not explicitly probe. Finally, the results suggest that certain values, those mentioned frequently throughout the interview, are particularly salient for particular populations. The protocol can provide efficient, contextual, and place-based data on the importance of particular ecosystem attributes for human well-being. Qualitative data are complementary to quantitative and spatial assessments in the comprehensive representation of people's values pertaining to ecosystems, and this protocol may assist in incorporating values frequently overlooked in decision making processes. © 2014 The Authors. Conservation Biology published by Wiley Periodicals

  16. Protocol for characterization of clay as a backfill and coverage layers for surface repository

    International Nuclear Information System (INIS)

    Santos, Daisy M.M.; Tello, Clédola C.O.

    2017-01-01

    The Radioactive Waste Management includes the operations since generation of the waste until its storage in repository, ensuring the protection of human beings and the environment from the possible negative impacts. The radioactive waste is segregated, treated, conditioned in suitable packages for posterior storage or disposal in repository. The 'RBMN Project' objective is to implement the repository for the disposal of low and intermediate level radioactive wastes generated by nuclear activities in Brazil, proposing a definitive solution for their storage. Engineered and natural barriers as the backfill and coverage layers will compose the disposal system of a near surface repository, concept proposed by the 'RBMN Project'. The use of these barriers aims to avoid or restrict the release of radionuclides from the waste to the human beings and environment. The waterproofing barriers are composed of clays. Certainly, for the national repository, will be used those clays existing in the place where it will be constructed. Them some basic tests will have to be carried out to verify the suitability of these clays as barriers. These tests were determined and performed with reference clay, a Brazilian bentonite constituted of 67.2% montmorillonite. The results were compared with national and international literature of materials with similar mineralogical features. The values found with 95% of confidence interval were 9.73±0,35 μm for granulometric size; 13,3±0,6% for the moisture content and 816±9 mmol.kg -1 for the capacity of cationic exchange. A protocol for characterization of clay was elaborated presenting these tests for it future use. (author)

  17. Protocol for characterization of clay as a backfill and coverage layers for surface repository

    Energy Technology Data Exchange (ETDEWEB)

    Santos, Daisy M.M.; Tello, Clédola C.O., E-mail: marymarchezini@gmail.com, E-mail: tellocc@cdtn.br [Centro de Desenvolvimento da Tecnologia Nuclear (CDTN/CNEN-MG), Belo Horizonte, MG (Brazil)

    2017-07-01

    The Radioactive Waste Management includes the operations since generation of the waste until its storage in repository, ensuring the protection of human beings and the environment from the possible negative impacts. The radioactive waste is segregated, treated, conditioned in suitable packages for posterior storage or disposal in repository. The 'RBMN Project' objective is to implement the repository for the disposal of low and intermediate level radioactive wastes generated by nuclear activities in Brazil, proposing a definitive solution for their storage. Engineered and natural barriers as the backfill and coverage layers will compose the disposal system of a near surface repository, concept proposed by the 'RBMN Project'. The use of these barriers aims to avoid or restrict the release of radionuclides from the waste to the human beings and environment. The waterproofing barriers are composed of clays. Certainly, for the national repository, will be used those clays existing in the place where it will be constructed. Them some basic tests will have to be carried out to verify the suitability of these clays as barriers. These tests were determined and performed with reference clay, a Brazilian bentonite constituted of 67.2% montmorillonite. The results were compared with national and international literature of materials with similar mineralogical features. The values found with 95% of confidence interval were 9.73±0,35 μm for granulometric size; 13,3±0,6% for the moisture content and 816±9 mmol.kg{sup -1} for the capacity of cationic exchange. A protocol for characterization of clay was elaborated presenting these tests for it future use. (author)

  18. Latency-Optimized and Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks: A Cross-Layer Approach

    Directory of Open Access Journals (Sweden)

    Cheng Xiuzhen

    2010-01-01

    Full Text Available Considering the energy constraint for fixed sensor nodes and the unacceptable long propagation delay, especially for latency sensitive applications of underwater acoustic sensor networks, we propose a MAC protocol that is latency-optimized and energy-efficient scheme and combines the physical layer and the MAC layer to shorten transmission delay. On physical layer, we apply convolution coding and interleaver for transmitted information. Moreover, dynamic code rate is exploited at the receiver side to accelerate data reception rate. On MAC layer, unfixed frame length scheme is applied to reduce transmission delay, and to ensure the data successful transmission rate at the same time. Furthermore, we propose a network topology: an underwater acoustic sensor network with mobile agent. Through fully utilizing the supper capabilities on computation and mobility of autonomous underwater vehicles, the energy consumption for fixed sensor nodes can be extremely reduced, so that the lifetime of networks is extended.

  19. Service commitments and capabilities across ArchiMate architectural layers

    NARCIS (Netherlands)

    Nardi, Julio Cesar; A. Almeida, João Paulo; Pereira, Maiara Candido; de Almeida Falbo, Ricardo; Iacob, Maria Eugenia; van Sinderen, Marten J.; Ferreira Pires, Luis

    ArchiMate is a widely adopted enterprise architecture modeling language that includes the “service‿ construct as a key structuring element across its enterprise layers. A previous analysis of the use of this construct within ArchiMate’s business layer concluded that it fails to represent some

  20. Formal Specification and Description Language and Message Sequence Chart to Model and Validate Session Initiation Protocol Services

    OpenAIRE

    Sa'ed Abed; Mohammad H. Al Shayeji; Ovais Ahmed; Sahel Alouneh

    2016-01-01

    Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol a...

  1. A Semantically Automated Protocol Adapter for Mapping SOAP Web Services to RESTful HTTP Format to Enable the Web Infrastructure, Enhance Web Service Interoperability and Ease Web Service Migration

    Directory of Open Access Journals (Sweden)

    Frank Doheny

    2012-04-01

    Full Text Available Semantic Web Services (SWS are Web Service (WS descriptions augmented with semantic information. SWS enable intelligent reasoning and automation in areas such as service discovery, composition, mediation, ranking and invocation. This paper applies SWS to a previous protocol adapter which, operating within clearly defined constraints, maps SOAP Web Services to RESTful HTTP format. However, in the previous adapter, the configuration element is manual and the latency implications are locally based. This paper applies SWS technologies to automate the configuration element and the latency tests are conducted in a more realistic Internet based setting.

  2. 78 FR 49693 - Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...

    Science.gov (United States)

    2013-08-15

    ...-Speech Services for Individuals with Hearing and Speech Disabilities, Report and Order (Order), document...] Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services; Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and Speech Disabilities...

  3. EPA Facility Registry Service (FRS): ALL FRS INTERESTS LAYER

    Data.gov (United States)

    U.S. Environmental Protection Agency — This data provides location and attribute information on all facilities in EPA's Facility Registry Service (FRS) for a internet web feature service . The FRS is an...

  4. EnviroAtlas National Layers Master Web Service

    Data.gov (United States)

    U.S. Environmental Protection Agency — This EnviroAtlas web service supports research and online mapping activities related to EnviroAtlas (https://www.epa.gov/enviroatlas). This web service includes...

  5. Internet Group Management Protocol for IPTV Services in Passive Optical Network

    Science.gov (United States)

    Lee, Eunjo; Park, Sungkwon

    We propose a new Internet group management protocol (IGMP) which can be used in passive optical network (PON) especially for IPTV services which dramatically reduces the channel change response time caused by traditional IGMP. In this paper, the newly proposed IGMP is introduced in detail and performance analysis is also included. Simulation results demonstrated the performance of the newly proposed IGMP, whereby, viewers can watch the shared IPTV channels without the channel change response time when channel request reaches a threshold.

  6. A protocol for a pragmatic randomized controlled trial evaluating outcomes of emergency nurse practitioner service.

    Science.gov (United States)

    Jennings, Natasha; Gardner, Glenn; O'Reilly, Gerard

    2014-09-01

    To evaluate emergency nurse practitioner service effectiveness on outcomes related to quality of care and service responsiveness. Increasing service pressures in the emergency setting have resulted in the adoption of service innovation models; the most common and rapidly expanding of these is the emergency nurse practitioner. The delivery of high quality patient care in the emergency department is one of the most important service indicators to be measured in health services today. The rapid uptake of emergency nurse practitioner service in Australia has outpaced the capacity to evaluate this model in outcomes related to safety and quality of patient care. Pragmatic randomized controlled trial at one site with 260 participants. This protocol describes a definitive prospective randomized controlled trial, which will examine the impact of emergency nurse practitioner service on key patient care and service indicators. The study control will be standard emergency department care. The intervention will be emergency nurse practitioner service. The primary outcome measure is pain score reduction and time to analgesia. Secondary outcome measures are waiting time, number of patients who did not wait, length of stay in the emergency department and representations within 48 hours. Scant research enquiry evaluating emergency nurse practitioner service on patient effectiveness and service responsiveness exists currently. This study is a unique trial that will test the effectiveness of the emergency nurse practitioner service on patients who present to the emergency department with pain. The research will provide an opportunity to further evaluate emergency nurse practitioner models of care and build research capacity into the workforce. Trial registration details: Australian and New Zealand Clinical Trials Registry dated 18th August 2013, ACTRN12613000933752. © 2014 John Wiley & Sons Ltd.

  7. Formal description of the OSI session layer: session service

    NARCIS (Netherlands)

    van Sinderen, Marten J.; van Eijk, P.H.J.; Vissers, C.A.; Diaz, M.

    1989-01-01

    The LOTOS formal description of the OSI session service is presented on basis of specification samples from the full description, giving account of how specification styles and session service architectural elements are reflected in the description. Both information (data types) and process

  8. Multi-layer service function chaining scheduling based on auxiliary graph in IP over optical network

    Science.gov (United States)

    Li, Yixuan; Li, Hui; Liu, Yuze; Ji, Yuefeng

    2017-10-01

    Software Defined Optical Network (SDON) can be considered as extension of Software Defined Network (SDN) in optical networks. SDON offers a unified control plane and makes optical network an intelligent transport network with dynamic flexibility and service adaptability. For this reason, a comprehensive optical transmission service, able to achieve service differentiation all the way down to the optical transport layer, can be provided to service function chaining (SFC). IP over optical network, as a promising networking architecture to interconnect data centers, is the most widely used scenarios of SFC. In this paper, we offer a flexible and dynamic resource allocation method for diverse SFC service requests in the IP over optical network. To do so, we firstly propose the concept of optical service function (OSF) and a multi-layer SFC model. OSF represents the comprehensive optical transmission service (e.g., multicast, low latency, quality of service, etc.), which can be achieved in multi-layer SFC model. OSF can also be considered as a special SF. Secondly, we design a resource allocation algorithm, which we call OSF-oriented optical service scheduling algorithm. It is able to address multi-layer SFC optical service scheduling and provide comprehensive optical transmission service, while meeting multiple optical transmission requirements (e.g., bandwidth, latency, availability). Moreover, the algorithm exploits the concept of Auxiliary Graph. Finally, we compare our algorithm with the Baseline algorithm in simulation. And simulation results show that our algorithm achieves superior performance than Baseline algorithm in low traffic load condition.

  9. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  10. A Layered Middleware Architecture for Automated Robot Services

    OpenAIRE

    Choi, Jongsun; Cho, Yongseong; Choi, Jaeyoung; Choi, Jongmyung

    2014-01-01

    These days, using robots has gradually been extending from the limited industrial areas in factories to service areas for the general public in everyday life. It is possible to imagine that end users easily control robots and they define new services by themselves as they wish in the near future. However, there are three issues to resolve to realize the future. Firstly, it is required to abstract robots’ behaviors from primitive robot functions, and secondly, we need context awareness in orde...

  11. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services

    Directory of Open Access Journals (Sweden)

    Alexandre Pinheiro

    2018-03-01

    Full Text Available Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.

  12. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services.

    Science.gov (United States)

    Pinheiro, Alexandre; Dias Canedo, Edna; de Sousa Junior, Rafael Timoteo; de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-03-02

    Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.

  13. Study protocol: A Montessori approach to dementia-related, non-residential respite services in Australia.

    Science.gov (United States)

    Hanna, Andrew; Donnelly, James; Aggar, Christina

    2018-03-27

    Given the social burden and significant cost of dementia care in Australia, finding evidence-based approaches that improve outcomes, maintain independence, and reduce the impact on patients and families is essential. Finding effective ways to train and assist the healthcare staff who support these individuals is also critical, as they are considered to be at risk of workplace stress, burnout, and other psychological disturbances which negatively affects standards of care. The current paper describes a protocol for evaluating the effects of a Montessori-based approach to dementia care, in non-residential respite centres. An 18 month prospective observational, cohort controlled design is suggested that will compare participants from a community respite service that has undergone a Montessori-based workplace culture change and those from a service that provides a person-centred 'care as usual' approach. To achieve this, the protocol includes the assessment of participants across multiple variables on a monthly basis including the cognitive, behavioural, and emotional functioning of clients with dementia, levels of caregiver burden experienced by informal carers, and burnout, compassion satisfaction and workplace engagement among respite staff. The protocol also employs a qualitative evaluation of program fidelity. This approach will provide further insight into the potential benefits of early intervention with Montessori approaches for persons living with dementia in the community, their caregivers, and the staff and volunteers who assist them. Copyright © 2018 Elsevier B.V. All rights reserved.

  14. Comparison of different histological protocols for the preservation and quantification of the intestinal mucus layer in pigs

    Directory of Open Access Journals (Sweden)

    Ilen Röhe

    2018-02-01

    Full Text Available The histological characterization of the intestinal mucus layer is important for many scientific experiments investigating the interaction between intestinal microbiota, mucosal immune response and intestinal mucus production. The aim of this study was to examine and compare different fixation protocols for displaying and quantifying the intestinal mucus layer in piglets and to test which histomorphological parameters may correlate with the determined mucus layer thickness. Jejunal and colonal tissue samples of weaned piglets (n=10 were either frozen in liquid nitrogen or chemically fixed using methacarn solution. The frozen tissue samples were cryosectioned and subsequently postfixed using three different postfixatives: paraformaldehyde vapor, neutrally buffered formalin solution and ethanol solution. After dehydration, methacarn fixed tissues were embedded in paraffin wax. Both sections of cryopreserved and methacarn fixed tissue samples were stained with Alcian blue (AB-PAS followed by the microscopically determination of the mucus layer thickness. Different pH values of the Alcian Blue staining solution and two mucus layer thickness measuring methods were compared. In addition, various histomorphological parameters of methacarn fixed tissue samples were evaluated including the number of goblet cells and the mucin staining area. Cryopreservation in combination with chemical postfixation led to mucus preservation in the colon of piglets allowing mucus thickness measurements. Mucus could be only partly preserved in cryosections of the jejunum impeding any quantitative description of the mucus layer thickness. The application of different postfixations, varying pH values of the AB solution and different mucus layer measuring methods led to comparable results regarding the mucus layer thickness. Methacarn fixation proved to be unsuitable for mucus depiction as only mucus patches were found in the jejunum or a detachment of the mucus layer from

  15. Comparison of different histological protocols for the preservation and quantification of the intestinal mucus layer in pigs.

    Science.gov (United States)

    Röhe, Ilen; Hüttner, Friedrich Joseph; Plendl, Johanna; Drewes, Barbara; Zentek, Jürgen

    2018-02-05

    The histological characterization of the intestinal mucus layer is important for many scientific experiments investigating the interaction between intestinal microbiota, mucosal immune response and intestinal mucus production. The aim of this study was to examine and compare different fixation protocols for displaying and quantifying the intestinal mucus layer in piglets and to test which histomorphological parameters may correlate with the determined mucus layer thickness. Jejunal and colonal tissue samples of weaned piglets (n=10) were either frozen in liquid nitrogen or chemically fixed using methacarn solution. The frozen tissue samples were cryosectioned and subsequently postfixed using three different postfixatives: paraformaldehyde vapor, neutrally buffered formalin solution and ethanol solution. After dehydration, methacarn fixed tissues were embedded in paraffin wax. Both sections of cryopreserved and methacarn fixed tissue samples were stained with Alcian blue (AB)-PAS followed by the microscopically determination of the mucus layer thickness. Different pH values of the Alcian Blue staining solution and two mucus layer thickness measuring methods were compared. In addition, various histomorphological parameters of methacarn fixed tissue samples were evaluated including the number of goblet cells and the mucin staining area. Cryopreservation in combination with chemical postfixation led to mucus preservation in the colon of piglets allowing mucus thickness measurements. Mucus could be only partly preserved in cryosections of the jejunum impeding any quantitative description of the mucus layer thickness. The application of different postfixations, varying pH values of the AB solution and different mucus layer measuring methods led to comparable results regarding the mucus layer thickness. Methacarn fixation proved to be unsuitable for mucus depiction as only mucus patches were found in the jejunum or a detachment of the mucus layer from the epithelium was

  16. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2012-08-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol to alleviate the unfairness problem in WMNs. Our protocol uses the age of packet as a priority metric for packet scheduling. Simulation is conducted to validate our model and to illustrate the fairness characteristics of our proposed MAC protocol. We conclude that we can achieve fairness with only little impact on network capacity.

  17. 78 FR 8030 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Science.gov (United States)

    2013-02-05

    ... Speech-to-Speech Services for Individuals With Hearing and Speech Disabilities AGENCY: Federal... Affairs Bureau at 202-418-0530 (voice), 202-418-0432 (TTY). Final Paperwork Reduction Act of 1995 Analysis... speech disability to engage in communication by wire or radio with one or more individuals, in a manner...

  18. 78 FR 53684 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Science.gov (United States)

    2013-08-30

    ..., and during regular business hours at the FCC Reference Information Center, Portals II, 445 12th Street... and persons using end user telephone equipment, such as a standard phone, smartphone, or computer. 2... displayed on a captioned telephone device, a computer, or a smartphone. The service also provides captions...

  19. The Palimpsest Layers of Pre-Service Teachers' Literacy Autobiographies

    Science.gov (United States)

    Bokhorst-Heng, Wendy D.; Flagg-Williams, Joan B.; West, Stewart

    2014-01-01

    In this article, we examine three literacy autobiographies written by pre-service teachers. Narratives are seen as not just stories relating a set of facts, but rather a means by which individuals interpret their experience. Literacy autobiographies are a reflective and interpretive account of one's development as a literate being. Using the tools…

  20. WCF multi-layer services development with Entity framework

    CERN Document Server

    Liu, Mike

    2014-01-01

    If you are a C#, VB.NET, or C++ developer and want to get started with WCF and Entity Framework, then this book is for you. Competence in Entity Framework will be needed to follow the examples in the book, but experience in creating WCF services using Entity Framework is not necessary. Developers and architects evaluating SOA implementation technologies for their company will find this book useful.

  1. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  2. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Nursimloo DeeyaS

    2008-01-01

    Full Text Available Abstract This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  3. A Two-Layered Mobility Architecture Using Fast Mobile IPv6 and Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Deeya S. Nursimloo

    2007-12-01

    Full Text Available This paper proposes an integrated mobility scheme that combines the procedures of fast handover for Mobile IPv6 (FMIPv6 and session initiation protocol (SIP mobility for realtime communications. This integrated approach is based on the context of the applications utilized. Furthermore, to reduce system redundancies and signaling loads, several functionalities of FMIPv6 and SIP have been integrated to optimize the integrated mobility scheme. The proposed scheme aims at reducing the handover latency and packet loss for an ongoing realtime traffic. Using ns-2 simulation, we analyze the performance of the proposed integrated scheme and compare it with the existing protocols for a VoIP and for a video stream traffic. This mobility architecture achieves lower handover delay and less packet loss than using either FMIPv6 or SIP and hence presents a powerful handover mobility scheme for next generation IP-based wireless systems.

  4. Protocol: A grounded theory of 'recovery'-perspectives of adolescent users of mental health services.

    Science.gov (United States)

    Palmquist, Lucianne; Patterson, Sue; O'Donovan, Analise; Bradley, Graham

    2017-07-20

    Policies internationally endorse the recovery paradigm as the appropriate foundation for youth mental health services. However, given that this paradigm is grounded in the views of adults with severe mental illness, applicability to youth services and relevance to young people is uncertain, particularly as little is known about young people's views. A comprehensive understanding of the experiences and expectations of young people is critical to developing youth mental health services that are acceptable, accessible, effective and relevant. To inform development of policy and youth services, the study described in this protocol aims to develop a comprehensive account of the experiences and expectations of 12-17 year olds as they encounter mental disorders and transition through specialist mental health services. Data will be analysed to model recovery from the adolescents' perspective. This grounded theory study will use quantitative and qualitative data collected in interviews with 12-17 year olds engaged with specialist Child/Youth Mental Health Service in Queensland, Australia. Interviews will explore adolescents' expectations and experiences of mental disorder, and of services, as they transition through specialist mental health services, including the meaning of their experiences and ideas of 'recovery' and how their experiences and expectations are shaped. Data collection and analysis will use grounded theory methods. Adolescents' experiences will be presented as a mid-range theory. The research will provide tangible recommendations for youth-focused mental health policy and practice. Findings will be disseminated within academic literature and beyond to participants, health professionals, mental health advocacy groups and policy and decision makers via publications, research summaries, conferences and workshops targeting different audiences. Ethical and research governance approvals have been obtained from relevant Human Research Ethics committees and all

  5. Transitions of Care from Child and Adolescent Mental Health Services to Adult Mental Health Services (TRACK Study: A study of protocols in Greater London

    Directory of Open Access Journals (Sweden)

    Ford Tamsin

    2008-06-01

    Full Text Available Abstract Background Although young people's transition from Child and Adolescent Mental Health Services (CAMHS to Adult Mental Health Services (AMHS in England is a significant health issue for service users, commissioners and providers, there is little evidence available to guide service development. The TRACK study aims to identify factors which facilitate or impede effective transition from CAHMS to AMHS. This paper presents findings from a survey of transition protocols in Greater London. Methods A questionnaire survey (Jan-April 2005 of Greater London CAMHS to identify transition protocols and collect data on team size, structure, transition protocols, population served and referral rates to AMHS. Identified transition protocols were subjected to content analysis. Results Forty two of the 65 teams contacted (65% responded to the survey. Teams varied in type (generic/targeted/in-patient, catchment area (locality-based, wider or national and transition boundaries with AMHS. Estimated annual average number of cases considered suitable for transfer to AMHS, per CAMHS team (mean 12.3, range 0–70, SD 14.5, n = 37 was greater than the annual average number of cases actually accepted by AMHS (mean 8.3, range 0–50, SD 9.5, n = 33. In April 2005, there were 13 active and 2 draft protocols in Greater London. Protocols were largely similar in stated aims and policies, but differed in key procedural details, such as joint working between CAHMS and AMHS and whether protocols were shared at Trust or locality level. While the centrality of service users' involvement in the transition process was identified, no protocol specified how users should be prepared for transition. A major omission from protocols was procedures to ensure continuity of care for patients not accepted by AMHS. Conclusion At least 13 transition protocols were in operation in Greater London in April 2005. Not all protocols meet all requirements set by government policy. Variation in

  6. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2012-11-01

    Full Text Available The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring.

  7. A transport layer protocol for the future high speed grid computing: SCTP versus fast tcp multihoming

    International Nuclear Information System (INIS)

    Arshad, M.J.; Mian, M.S.

    2010-01-01

    TCP (Transmission Control Protocol) is designed for reliable data transfer on the global Internet today. One of its strong points is its use of flow control algorithm that allows TCP to adjust its congestion window if network congestion is occurred. A number of studies and investigations have confirmed that traditional TCP is not suitable for each and every type of application, for example, bulk data transfer over high speed long distance networks. TCP sustained the time of low-capacity and short-delay networks, however, for numerous factors it cannot be capable to efficiently deal with today's growing technologies (such as wide area Grid computing and optical-fiber networks). This research work surveys the congestion control mechanism of transport protocols, and addresses the different issues involved for transferring the huge data over the future high speed Grid computing and optical-fiber networks. This work also presents the simulations to compare the performance of FAST TCP multihoming with SCTP (Stream Control Transmission Protocol) multihoming in high speed networks. These simulation results show that FAST TCP multihoming achieves bandwidth aggregation efficiently and outperforms SCTP multihoming under a similar network conditions. The survey and simulation results presented in this work reveal that multihoming support into FAST TCP does provide a lot of benefits like redundancy, load-sharing and policy-based routing, which largely improves the whole performance of a network and can meet the increasing demand of the future high-speed network infrastructures (such as in Grid computing). (author)

  8. The National Weather Service Ceilometer Planetary Boundary Layer Project

    Directory of Open Access Journals (Sweden)

    Hicks M.

    2016-01-01

    Full Text Available The National Weather Service (NWS is investigating the potential of utilizing the Automatic Surface Observing System’s (ASOS cloud base height indicator, the Vaisala CL31 ceilometer, to profile aerosols in the atmosphere. Field test sites of stand-alone CL31 ceilometers have been established, primarily, around the Washington DC metropolitan area, with additional systems in southwest USA and Puerto Rico. The CL31 PBL project examines the CL31 data collected for data quality, mixing height retrieval applicability, and its compliment to satellite data. This paper reviews the topics of the CL31 data quality and mixing height retrieval applicability.

  9. Study protocol: Evaluating the impact of a rural Australian primary health care service on rural health

    Directory of Open Access Journals (Sweden)

    Buykx Penny

    2011-03-01

    Full Text Available Abstract Background Rural communities throughout Australia are experiencing demographic ageing, increasing burden of chronic diseases, and de-population. Many are struggling to maintain viable health care services due to lack of infrastructure and workforce shortages. Hence, they face significant health disadvantages compared with urban regions. Primary health care yields the best health outcomes in situations characterised by limited resources. However, few rigorous longitudinal evaluations have been conducted to systematise them; assess their transferability; or assess sustainability amidst dynamic health policy environments. This paper describes the study protocol of a comprehensive longitudinal evaluation of a successful primary health care service in a small rural Australian community to assess its performance, sustainability, and responsiveness to changing community needs and health system requirements. Methods/Design The evaluation framework aims to examine the health service over a six-year period in terms of: (a Structural domains (health service performance; sustainability; and quality of care; (b Process domains (health service utilisation and satisfaction; and (c Outcome domains (health behaviours, health outcomes and community viability. Significant international research guided the development of unambiguous reliable indicators for each domain that can be routinely and unobtrusively collected. Data are to be collected and analysed for trends from a range of sources: audits, community surveys, interviews and focus group discussions. Discussion This iterative evaluation framework and methodology aims to ensure the ongoing monitoring of service activity and health outcomes that allows researchers, providers and administrators to assess the extent to which health service objectives are met; the factors that helped or hindered achievements; what worked or did not work well and why; what aspects of the service could be improved and how

  10. A service protocol for post-processing of medical images on the mobile device

    Science.gov (United States)

    He, Longjun; Ming, Xing; Xu, Lang; Liu, Qian

    2014-03-01

    With computing capability and display size growing, the mobile device has been used as a tool to help clinicians view patient information and medical images anywhere and anytime. It is uneasy and time-consuming for transferring medical images with large data size from picture archiving and communication system to mobile client, since the wireless network is unstable and limited by bandwidth. Besides, limited by computing capability, memory and power endurance, it is hard to provide a satisfactory quality of experience for radiologists to handle some complex post-processing of medical images on the mobile device, such as real-time direct interactive three-dimensional visualization. In this work, remote rendering technology is employed to implement the post-processing of medical images instead of local rendering, and a service protocol is developed to standardize the communication between the render server and mobile client. In order to make mobile devices with different platforms be able to access post-processing of medical images, the Extensible Markup Language is taken to describe this protocol, which contains four main parts: user authentication, medical image query/ retrieval, 2D post-processing (e.g. window leveling, pixel values obtained) and 3D post-processing (e.g. maximum intensity projection, multi-planar reconstruction, curved planar reformation and direct volume rendering). And then an instance is implemented to verify the protocol. This instance can support the mobile device access post-processing of medical image services on the render server via a client application or on the web page.

  11. The Influence of Collaborative Reflection and Think-Aloud Protocols on Pre-Service Teachers' Reflection: A Mixed Methods Approach

    Science.gov (United States)

    Epler, Cory M.; Drape, Tiffany A.; Broyles, Thomas W.; Rudd, Rick D.

    2013-01-01

    The purpose of this mixed methods study was to determine if there are differences in pre-service teachers' depth of reflection when using a written self-reflection form, a written self-reflection form and a think-aloud protocol, and collaborative reflection. Twenty-six pre-service teachers were randomly assigned to fourteen teaching teams. The…

  12. Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols

    NARCIS (Netherlands)

    Law, Y.W.; van Hoesel, L.F.W.; Doumen, J.M.; Hartel, Pieter H.; Havinga, Paul J.M.; Atluri, V.; Samarati, P.; Ning, P.; Du, W.

    2005-01-01

    A typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help prevent the jammer from taking actions based on the content of the

  13. A Survey on Application Layer Protocols for the Internet of Things

    OpenAIRE

    Karagiannis, Vasileios; Chatzimisios, Periklis; Vázquez-Gallego, Francisco; Alonso-Zárate, Jesús

    2015-01-01

    It has been more than fifteen years since the term Internet of Things (IoT) was introduced to the public. However, despite the efforts of research groups and innovative corporations, still today it is not possible to say that IoT is upon us. This is mainly due to the fact that a unified IoT architecture has not been yet clearly defined and there is no common agreement in defining protocols and standards for all IoT parts. The framework that current IoT platforms use consists mostly in technol...

  14. Optimizing the Information Presentation on Mining Potential by using Web Services Technology with Restful Protocol

    Science.gov (United States)

    Abdillah, T.; Dai, R.; Setiawan, E.

    2018-02-01

    This study aims to develop the application of Web Services technology with RestFul Protocol to optimize the information presentation on mining potential. This study used User Interface Design approach for the information accuracy and relevance as well as the Web Service for the reliability in presenting the information. The results show that: the information accuracy and relevance regarding mining potential can be seen from the achievement of User Interface implementation in the application that is based on the following rules: The consideration of the appropriate colours and objects, the easiness of using the navigation, and users’ interaction with the applications that employs symbols and languages understood by the users; the information accuracy and relevance related to mining potential can be observed by the information presented by using charts and Tool Tip Text to help the users understand the provided chart/figure; the reliability of the information presentation is evident by the results of Web Services testing in Figure 4.5.6. This study finds out that User Interface Design and Web Services approaches (for the access of different Platform apps) are able to optimize the presentation. The results of this study can be used as a reference for software developers and Provincial Government of Gorontalo.

  15. Bridging the gap between legacy services and Web Services

    DEFF Research Database (Denmark)

    Bissyandé, Tegawendé; Réveillère, Laurent; Bromberg, Yérom-David

    2010-01-01

    itself. In this paper, we introduce a generative language based approach for constructing wrappers to facilitate the migration of legacy service functionalities to Web Services. To this end, we have designed the Janus domain-specific language, which provides developers with a high-level way to describe......Web Services is an increasingly used instantiation of Service-Oriented Architectures (SOA) that relies on standard Internet protocols to produce services that are highly interoperable. Other types of services, relying on legacy application layer protocols, however, cannot be composed directly....... A promising solution is to implement wrappers to translate between the application layer protocols and the WS protocol. Doing so manually, however, requires a high level of expertise, in the relevant application layer protocols, in low-level network and system programming, and in the Web Service paradigm...

  16. A protocol for eliciting nonmaterial values through a cultural ecosystem services frame

    Science.gov (United States)

    Gould, Rachelle K; Klain, Sarah C; Ardoin, Nicole M; Satterfield, Terre; Woodside, Ulalia; Hannahs, Neil; Daily, Gretchen C; Chan, Kai M

    2015-01-01

    Stakeholders’ nonmaterial desires, needs, and values often critically influence the success of conservation projects. These considerations are challenging to articulate and characterize, resulting in their limited uptake in management and policy. We devised an interview protocol designed to enhance understanding of cultural ecosystem services (CES). The protocol begins with discussion of ecosystem-related activities (e.g., recreation, hunting) and management and then addresses CES, prompting for values encompassing concepts identified in the Millennium Ecosystem Assessment (2005) and explored in other CES research. We piloted the protocol in Hawaii and British Columbia. In each location, we interviewed 30 individuals from diverse backgrounds. We analyzed results from the 2 locations to determine the effectiveness of the interview protocol in elucidating nonmaterial values. The qualitative and spatial components of the protocol helped characterize cultural, social, and ethical values associated with ecosystems in multiple ways. Maps and situational, or vignette-like, questions helped respondents articulate difficult-to-discuss values. Open-ended prompts allowed respondents to express a diversity of ecosystem-related values and proved sufficiently flexible for interviewees to communicate values for which the protocol did not explicitly probe. Finally, the results suggest that certain values, those mentioned frequently throughout the interview, are particularly salient for particular populations. The protocol can provide efficient, contextual, and place-based data on the importance of particular ecosystem attributes for human well-being. Qualitative data are complementary to quantitative and spatial assessments in the comprehensive representation of people's values pertaining to ecosystems, and this protocol may assist in incorporating values frequently overlooked in decision making processes. Un Protocolo para Obtener Valores No Materiales por medio de un Marco de

  17. ANALISIS QOS PADA PEMBAGIAN BANDWIDTH DENGAN METODE LAYER 7 PROTOCOL, PCQ, HTB DAN HOTSPOT DI SMK SWASTA AL-WASHLIYAH PASAR SENEN

    Directory of Open Access Journals (Sweden)

    Dian Kurnia

    2017-07-01

    Full Text Available Pada penelitian ini akan dilakukan analisis QoS Pada Pembagian Bandwidth menggunakan metode HTB (Hierarchical Tocken Bucket, PCQ(Per Connection Queue  dengan Layer 7 protocol sebagai limit file berekstensi, PCQ dan Hotspot. Pada HTB menggunakan teknik antrian queue tree, PCQ dengan Layer 7 protocol, PCQ menggunakan teknik antrian simple queue, hotspot menggunakan teknik antrian simple queue. Sehingga didapat perbandingan dari metode HTB (Hierarchical Tocken Bucket, PCQ dengan Layer 7 protocol, PCQ dan hotspot akan diterapkan pada mikrotik RB750GL. Hasil akhir penelitian ini diukur dengan parameter-parameter QoS throughput, delay (latency, jitter (variasi kedatangan paket, Packet loss. Adapun hasil pengujian dalam penelitian ini dilakukan pada trafik jam sibuk untuk mengetahui sejauh mana kinerja performansi management bandwidth dengan metode-metode tersebut. Dari hasil penelitian untuk performance QoS yang lebih baik untuk memanagement bandwidth di dapat nilai throughput, jitter dan delay terbaik yaitu menggunakan metode HTB.

  18. Fast and easy protocol for the purification of recombinant S-layer protein for synthetic biology applications

    KAUST Repository

    Norville, Julie E.

    2011-06-17

    A goal of synthetic biology is to make biological systems easier to engineer. One of the aims is to design, with nanometer-scale precision, biomaterials with well-defined properties. The surface-layer protein SbpA forms 2D arrays naturally on the cell surface of Lysinibacillus sphaericus, but also as the purified protein in solution upon the addition of divalent cations. The high propensity of SbpA to form crystalline arrays, which can be simply controlled by divalent cations, and the possibility to genetically alter the protein, make SbpA an attractive molecule for synthetic biology. To be a useful tool, however, it is important that a simple protocol can be used to produce recombinant wild-type and modified SbpA in large quantities and in a biologically active form. The present study addresses this requirement by introducing a mild and non-denaturing purification protocol to produce milligram quantities of recombinant, active SbpA.

  19. Investigating And Evaluating Of Network Failures And Performance Over Distributed WAN In Application Protocol Layer

    Directory of Open Access Journals (Sweden)

    Enoch Okoh Kofi

    2015-08-01

    Full Text Available The Experiment was done to find out network failures and application performance relationship over distributed Wide Area Net WAN. In order to access related application over the cloud there must be an internet connectivity which will help the respective workstations to access the remote server for applications being deployed over the network. Bandwidth improvement helps in reducing utilization over the network and it also helps in improving Application Efficiency of these Applications in terms of Response Time. Routers were configured under Enhance Interior Gateway Routing Protocol EIGRP to reduce utilization and to ensure load sharing over the network. Three scenarios were modeled and their performance efficiency was evaluated. A modeled computer Network with and without a fail Router under different scenarios and such Network was simulated with emphasis on the Application Performance. The Experiment was done for fifty workstations under three scenarios and these three scenarios were accessed and evaluated on experimental basis using Riverbed modeler to show the Effect of Application Network performance. The performance results show that increasing the bandwidth reduces utilization and also with the failure of one communication bandwidth users can still access Network Application with a minimal cost.

  20. A Web Service Protocol Realizing Interoperable Internet of Things Tasking Capability

    Science.gov (United States)

    Huang, Chih-Yuan; Wu, Cheng-Hung

    2016-01-01

    The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring, and physical mashup applications can be constructed to improve human’s daily life. In general, IoT devices provide two main capabilities: sensing and tasking capabilities. While the sensing capability is similar to the World-Wide Sensor Web, this research focuses on the tasking capability. However, currently, IoT devices created by different manufacturers follow different proprietary protocols and are locked in many closed ecosystems. This heterogeneity issue impedes the interconnection between IoT devices and damages the potential of the IoT. To address this issue, this research aims at proposing an interoperable solution called tasking capability description that allows users to control different IoT devices using a uniform web service interface. This paper demonstrates the contribution of the proposed solution by interconnecting different IoT devices for different applications. In addition, the proposed solution is integrated with the OGC SensorThings API standard, which is a Web service standard defined for the IoT sensing capability. Consequently, the Extended SensorThings API can realize both IoT sensing and tasking capabilities in an integrated and interoperable manner. PMID:27589759

  1. A Web Service Protocol Realizing Interoperable Internet of Things Tasking Capability.

    Science.gov (United States)

    Huang, Chih-Yuan; Wu, Cheng-Hung

    2016-08-31

    The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring, and physical mashup applications can be constructed to improve human's daily life. In general, IoT devices provide two main capabilities: sensing and tasking capabilities. While the sensing capability is similar to the World-Wide Sensor Web, this research focuses on the tasking capability. However, currently, IoT devices created by different manufacturers follow different proprietary protocols and are locked in many closed ecosystems. This heterogeneity issue impedes the interconnection between IoT devices and damages the potential of the IoT. To address this issue, this research aims at proposing an interoperable solution called tasking capability description that allows users to control different IoT devices using a uniform web service interface. This paper demonstrates the contribution of the proposed solution by interconnecting different IoT devices for different applications. In addition, the proposed solution is integrated with the OGC SensorThings API standard, which is a Web service standard defined for the IoT sensing capability. Consequently, the Extended SensorThings API can realize both IoT sensing and tasking capabilities in an integrated and interoperable manner.

  2. MgAl-Layered Double Hydroxide Solid Base Catalysts for Henry Reaction: A Green Protocol

    Directory of Open Access Journals (Sweden)

    Magda H. Abdellattif

    2018-03-01

    Full Text Available A series of MgAl-layered double hydroxide (MgAl-HT, the calcined form at 500 °C (MgAlOx, and the rehydrated one at 25 °C (MgAl-HT-RH were synthesized. Physicochemical properties of the catalysts were characterized by X-ray diffraction (XRD and scanning electron microscopy (SEM. Surface area of the as-synthesized, calcined, and rehydrated catalysts was determined by N2 physisorption at −196 °C. CO2 temperature-programmed desorption (CO2-TPD was applied to determine the basic sites of catalysts. The catalytic test reaction was carried out using benzaldehyde and their derivatives with nitromethane and their derivatives. The Henry products (1–15 were obtained in a very good yield using MgAl-HT-RH catalyst either by conventional method at 90 °C in liquid phase or under microwave irradiation method. The mesoporous structure and basic nature of the rehydrated solid catalyst were responsible for its superior catalytic efficiency. The robust nature was determined by using the same catalyst five times, where the product % yield was almost unchanged significantly.

  3. Analiza protokola kvaliteta usluga telekomunikacionih mreža / Analysis of quality of service protocols in telecommunication networks

    Directory of Open Access Journals (Sweden)

    Milojko Jevtović

    2003-05-01

    Full Text Available Protokoli kvaliteta usluga (Quality of Service - QoS sadašnjih i budućih telekomunikacionih mreža razvijeni su, pored ostalog, sa ciljem da podrže različite klase usluga (Class of Service - CoS komunikaciju u realnom vremenu, kao i prenos multimedijalnih poruka preko paketskih IP (Internet Protocol mreža. U raduje dat pregled karakteristika tih protokola i ocena njihovih konkretnih mogućnosti u obezbeđenju kvaliteta usluga unutar sistema ('s vrha do dna', tj. vertikalno u OSI arhitekturi kao i 'horizontalno' odnosno s kraja na kraj veze, tj. između izvora i odredišta. / Today's and future telecommunication networks must enable transmission throughout heterogeneous environment, using different Quality of Service protocols, Quality of Service protocols use a variety of complementary mechanisms to enable deterministic end-to-end different data delivery. The analysis of these protocols and their efficiency in providing QoS and CoS has been given in this paper.

  4. Using a Simple, Free Voice-over-Internet Protocol Service to Add Interest to Lectures and Enhance Student Engagement

    Science.gov (United States)

    Beaton, Susan J.; Forster, Peter M.

    2013-01-01

    A large proportion of students in higher education report feeling bored during lectures, for example, Mann and Robinson (2009) put this figure at 60 per cent. This short article reviews our experiences of using a simple, free Voice-over-Internet Protocol (VoIP) service, Skype, to enhance the interest and engagement of students by holding a…

  5. If SWORD Is the Answer, What Is the Question?: Use of the Simple Web-Service Offering Repository Deposit Protocol

    Science.gov (United States)

    Lewis, Stuart; Hayes, Leonie; Newton-Wade, Vanessa; Corfield, Antony; Davis, Richard; Donohue, Tim; Wilson, Scott

    2009-01-01

    Purpose: The purpose of this paper is to describe the repository deposit protocol, Simple Web-service Offering Repository Deposit (SWORD), its development iteration, and some of its potential use cases. In addition, seven case studies of institutional use of SWORD are provided. Design/methodology/approach: The paper describes the recent…

  6. Internationalisation of information services for publishers' open access policies: the DINI multilingual integration layer

    Science.gov (United States)

    Scholze, Frank

    2008-01-01

    It is essential for the strategy of open access self-archiving that scientific authors are given comprehensive information on publisher copyright policies. DINI, the German Initiative for Networked Information, has developed a German (and potentially multilingual) interface to the English SHERPA/RoMEO service to provide additional information on German publishers' open access policies. As a next step, this interface was enhanced to an integration layer combining different sources on publisher copyright policies. This integration layer can be used in many different contexts. Together with the SHERPA/RoMEO team, DINI aims to build an international support structure for open access information. PMID:18662383

  7. EPA Region 1 - Map Layers for Valley ID Tool (Hosted Feature Service)

    Science.gov (United States)

    The Valley Service Feature Layer hosts spatial data for EPA Region 1's Valley Identification Tool. These layers contain attribute information added by EPA R1 GIS Center to help identify populated valleys:- Fac_2011NEI: Pollution sources selected from the National Emissions Inventory (EPA, 2011).- NE_Towns_PopValleys: New England Town polygons (courtesy USGS), with Population in Valleys and Population Density in Valleys calculated by EPA R1 GIS, from 2010 US Census blocks. - VT_E911: Vermont residences (courtesy VT Center for Geographic Information E-911).

  8. A New MAC Protocol with Pseudo-TDMA Behavior for Supporting Quality of Service in 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available A new medium access control (MAC protocol is proposed for quality-of-service (QoS support in wireless local area networks (WLAN. The protocol is an alternative to the recent enhancement 802.11e. A new priority policy provides the system with better performance by simulating time division multiple access (TDMA functionality. Collisions are reduced and starvation of low-priority classes is prevented by a distributed admission control algorithm. The model performance is found analytically extending previous work on this matter. The results show that a better organization of resources is achieved through this scheme. Throughput analysis is verified with OPNET simulations.

  9. Person-centered care planning and service engagement: a study protocol for a randomized controlled trial.

    Science.gov (United States)

    Stanhope, Victoria; Tondora, Janis; Davidson, Larry; Choy-Brown, Mimi; Marcus, Steven C

    2015-04-22

    interpretation of outcomes. The aim of this study is to generate valuable guidance for state systems engaged in scale-up and transformation efforts. Targeted staff selection for training to support sustainability will serve to provide further insight into important intervention implementation strategies. Person-centered care planning has the potential to enhance the impact of all evidence-based and recovery-oriented practices and bring practice into line with the emerging national guidelines in health care reform. This trial was registered with ClinicalTrials.gov (Identifier: NCT02299492) on 21 November 2014 as New York University Protocol Record PCCP-13-9762, Person-Centered Care Planning and Service Engagement.

  10. Longitudinal Evaluation of Transition Services (“LETS Study”: Protocol for outcome evaluation

    Directory of Open Access Journals (Sweden)

    Tsybina Irina

    2012-05-01

    Full Text Available Abstract Background Because of advances in medical treatment, most children with physical disabilities can expect to achieve near normal life spans. Typically, coordinated teams of health care providers in specialized pediatric settings care for these children. As these children reach adulthood, however, the availability of services and expertise changes because the adult health care system has different processes designed to meet their specialized needs. Gaps in continuity of care during the transition from pediatric to adult services, and associated poor health outcomes are well documented. In response, new models of care are being introduced to address the complex process of health care transition. This paper describes a study protocol of a client-centred, prospective, longitudinal, mixed-method evaluation of linked model of health care across the lifespan (the LIFEspan Model, offered by a pediatric rehabilitation centre and an adult rehabilitation centre. Method This project will include a process and an outcome evaluation of the LIFEspan Model. The process evaluation will detail the specific service delivery that occurs with respect to preparation for transition and transfer of care through chart audits of pediatric medical records and qualitative interviews with LIFEspan staff. The outcome evaluation will measure the effect of the model on: 1 maintaining continuity within the health care system from pediatric to adult care; and 2 secondary outcomes related to health, well-being, social participation, transition readiness, and health care utilization of youth with cerebral palsy and acquired brain injury. Standardized instruments will include Health Utilities Inventory, Assessment of Life Habits, Arc’s Self-Determination, Assessment of Health-Related Quality of Life, Partners in Health Questionnaire, Social Support Questionnaire, and Self-Efficacy for Managing Chronic Disease. Discussion The LETS study will be original in its undertaking

  11. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  12. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  13. The Geodetic Seamless Archive Centers Service Layer: A System Architecture for Federating Geodesy Data Repositories

    Science.gov (United States)

    McWhirter, J.; Boler, F. M.; Bock, Y.; Jamason, P.; Squibb, M. B.; Noll, C. E.; Blewitt, G.; Kreemer, C. W.

    2010-12-01

    Three geodesy Archive Centers, Scripps Orbit and Permanent Array Center (SOPAC), NASA's Crustal Dynamics Data Information System (CDDIS) and UNAVCO are engaged in a joint effort to define and develop a common Web Service Application Programming Interface (API) for accessing geodetic data holdings. This effort is funded by the NASA ROSES ACCESS Program to modernize the original GPS Seamless Archive Centers (GSAC) technology which was developed in the 1990s. A new web service interface, the GSAC-WS, is being developed to provide uniform and expanded mechanisms through which users can access our data repositories. In total, our respective archives hold tens of millions of files and contain a rich collection of site/station metadata. Though we serve similar user communities, we currently provide a range of different access methods, query services and metadata formats. This leads to a lack of consistency in the userís experience and a duplication of engineering efforts. The GSAC-WS API and its reference implementation in an underlying Java-based GSAC Service Layer (GSL) supports metadata and data queries into site/station oriented data archives. The general nature of this API makes it applicable to a broad range of data systems. The overall goals of this project include providing consistent and rich query interfaces for end users and client programs, the development of enabling technology to facilitate third party repositories in developing these web service capabilities and to enable the ability to perform data queries across a collection of federated GSAC-WS enabled repositories. A fundamental challenge faced in this project is to provide a common suite of query services across a heterogeneous collection of data yet enabling each repository to expose their specific metadata holdings. To address this challenge we are developing a "capabilities" based service where a repository can describe its specific query and metadata capabilities. Furthermore, the architecture of

  14. Energy consumption and quality of service in WBAN: A performance evaluation between cross-layer and IEEE802.15.4

    OpenAIRE

    Correa-Chica, Juan Camilo; Botero-Vega, Juan Felipe; Gaviria-Gómez, Natalia

    2017-01-01

    Abstract Different communication schemes for Wireless Body Area Networks (WBAN) pretend to achieve a fair tradeoff between efficient energy consumption and the accomplishment of performance metrics. Among those schemes are the Cross-layer protocols that constitute a good choice to achieve the aforementioned tradeoff by introducing novel protocol techniques which are away from the traditional communications model. In this work we assessed the performance of a WBAN cross-layer protocol stack by...

  15. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP

  16. Evaluation de la mise en ceuvre des services du protocole IPV6 ...

    African Journals Online (AJOL)

    At present, the configurations of networks are based on the protocol ipv4. The addresses ipv4 begin to run out. Groups of search work on the new version of the protocol IPV6 (in France, in United States, in Japan). Certain networks run under ipv6. However the great majority of the existing networks always use the ...

  17. Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT

    Directory of Open Access Journals (Sweden)

    Zahid Mahmood

    2017-10-01

    Full Text Available Internet-of-Things (IoT include a large number of devices that can communicate across different networks. Cyber-Physical Systems (CPS also includes a number of devices connected to the internet where wearable devices are also included. Both systems enable researchers to develop healthcare systems with additional intelligence as well as prediction capabilities both for lifestyle and in hospitals. It offers as much persistence as a platform to ubiquitous healthcare by using wearable sensors to transfer the information over servers, smartphones, and other smart devices in the Telecare Medical Information System (TMIS. Security is a challenging issue in TMIS, and resourceful access to health care services requires user verification and confidentiality. Existing schemes lack in ensuring reliable prescription safety along with authentication. This research presents a Secure Authentication and Prescription Safety (SAPS protocol to ensure secure communication between the patient, doctor/nurse, and the trusted server. The proposed procedure relies upon the efficient elliptic curve cryptosystem which can generate a symmetric secure key to ensure secure data exchange between patients and physicians after successful authentication of participants individually. A trusted server is involved for mutual authentication between parties and then generates a common key after completing the validation process. Moreover, the scheme is verified by doing formal modeling using Rubin Logic and validated using simulations in NS-2.35. We have analyzed the SAPS against security attacks, and then performance analysis is elucidated. Results prove the dominance of SAPS over preliminaries regarding mutual authentication, message integrity, freshness, and session key management and attack prevention.

  18. Non-intrusive Packet-Layer Model for Monitoring Video Quality of IPTV Services

    Science.gov (United States)

    Yamagishi, Kazuhisa; Hayashi, Takanori

    Developing a non-intrusive packet-layer model is required to passively monitor the quality of experience (QoE) during service. We propose a packet-layer model that can be used to estimate the video quality of IPTV using quality parameters derived from transmitted packet headers. The computational load of the model is lighter than that of the model that takes video signals and/or video-related bitstream information such as motion vectors as input. This model is applicable even if the transmitted bitstream information is encrypted because it uses transmitted packet headers rather than bitstream information. For developing the model, we conducted three extensive subjective quality assessments for different encoders and decoders (codecs), and video content. Then, we modeled the subjective video quality assessment characteristics based on objective features affected by coding and packet loss. Finally, we verified the model's validity by applying our model to unknown data sets different from training data sets used above.

  19. Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs with Extended Service Range

    Science.gov (United States)

    Choi, Woo-Yong

    2011-11-01

    In this paper, we propose the efficient reliable multicast MAC protocol by which the AP (Access Point) can transmit reliably its multicast data frames to the recipients in the AP's one-hop or two-hop transmission range. The AP uses the STAs (Stations) that are directly associated with itself as the relays for the data delivery to the remote recipients that cannot be reached directly from itself. Based on the connectivity information among the recipients, the reliable multicast MAC protocol optimizes the number of the RAK (Request for ACK) frame transmissions in a reasonable computational time. Numerical examples show that our proposed MAC protocol significantly enhances the MAC performance compared with the BMMM (Batch Mode Multicast MAC) protocol that is extended to support the recipients that are in the AP's one-hop or two-hop transmission range in IEEE 802.11 wireless LANs.

  20. A Business Evaluation Of The Next Generation Ipv6 Protocol In Fixed And Mobile Communication Services

    OpenAIRE

    Pau, Louis-François

    2002-01-01

    textabstractThis paper gives an analytical business model of the Internet IPv4 and IPv6 protocols ,focussing on the business implications of intrinsic technical properties of these protocols .The technical properties modeled in business terms are : address space, payload, autoconfiguration, IP mobility , security, and flow label. Three operational cash flow focussed performance indexes are defined for respectively an Internet operator or ISP, for the address domain owner, and for the end user...

  1. Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services

    Science.gov (United States)

    2018-01-01

    Cloud computing is considered an interesting paradigm due to its scalability, availability and virtually unlimited storage capacity. However, it is challenging to organize a cloud storage service (CSS) that is safe from the client point-of-view and to implement this CSS in public clouds since it is not advisable to blindly consider this configuration as fully trustworthy. Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content for verifications regarding data preservation. Due to these requirements, integrity, availability, privacy and trust are still challenging issues for the adoption of cloud storage services, especially when losing or leaking information can bring significant damage, be it legal or business-related. With such concerns in mind, this paper proposes an architecture for periodically monitoring both the information stored in the cloud and the service provider behavior. The architecture operates with a proposed protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services. Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance. PMID:29498641

  2. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Directory of Open Access Journals (Sweden)

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  3. Applying IPFIX Protocol for Detection of Distributed Denial of Service Attacks against Cloud Infrastructure

    Directory of Open Access Journals (Sweden)

    M. R. Mukhtarov

    2011-12-01

    Full Text Available The way of monitoring deviations in network traffic behavior inside “Cloud Infrastructure” using IPFIX protocol is suggested in the paper. The proposed algorithm is applied for registration of “Distributed Denial of Service” attacks against “Cloud Infrastructure”.

  4. A protocol for the development of Mediterranean climate services based on the experiences of the CLIM-RUN case studies

    Science.gov (United States)

    Goodess, Clare; Ruti, Paolo; Rousset, Nathalie

    2014-05-01

    During the closing stages of the CLIM-RUN EU FP7 project on Climate Local Information in the Mediterranean region Responding to User Needs, the real-world experiences encountered by the case-study teams are being assessed and synthesised to identify examples of good practice and, in particular, to produce the CLIM-RUN protocol for the development of Mediterranean climate services. The specific case studies have focused on renewable energy (Morocco, Spain, Croatia, Cyprus), tourism (Savoie, Tunisia, Croatia, Cyprus) and wild fires (Greece) as well as one cross-cutting case study (Veneto region). They have been implemented following a common programme of local workshops, questionnaires and interviews, with Climate Expert Team and Stakeholder Expert Team members collaborating to identify and translate user needs and subsequently develop climate products and information. Feedback from stakeholders has been essential in assessing and refining these products. The protocol covers the following issues: the overall process and methodological key stages; identification and selection of stakeholders; communication with stakeholders; identification of user needs; translation of needs; producing products; assessing and refining products; methodologies for evaluating the economic value of climate services; and beyond CLIM-RUN - the lessons learnt. Particular emphasis is given to stakeholder analysis in the context of the participatory, bottom-up approach promoted by CLIM-RUN and to the iterative approach taken in the development of climate products. Recommendations are also made for an envisioned three-tier business model for the development of climate services involving climate, intermediary and stakeholder tiers.

  5. Analysis of the high dose rate brachytherapy protocols of quality assurance programs of some local services, based on T G 40, T G 56 and ARCAL 30

    International Nuclear Information System (INIS)

    Guzman Calcina, Carmen S.; Almeida, Adelaide de; Rocha, Jose R. Oliveira; Universidade Estadual de Campinas, SP

    2001-01-01

    High dose rate brachytherapy has been increasingly recognized in most countries, and radiotherapy services using this equipment are encouraged to have a very efficient quality assurance program to ensure protection for patients, workers and other personnel involved. The objective of this paper was to determine the types of tests for high dose rate equipment required by official protocols (TG 40, TG 56 and ARCAL XXX) and to compare them with the types of tests utilized by some radiotherapy services. We concluded that: the protocol TG 56 is more extensive and complete than the other official protocols (T G 40 and ARCAL XXX); the protocols used by the services evaluated on this study were based on the protocol TG 56, and were concordant with the other official protocols. In these protocols annual tests were frequently replaced by tests performed quarterly or twice a year. This study established the types of test used and their frequency of utilization, and permitted the design of an optimized protocol that may help in the implementation of basic and indispensable tests in order to ensure patient adequate treatment and safety to personnel involved, and consequently improve high dose rate brachytherapy quality assurance. (author)

  6. Developing a Referral Protocol for Community-Based Occupational Therapy Services in Taiwan: A Logistic Regression Analysis.

    Science.gov (United States)

    Mao, Hui-Fen; Chang, Ling-Hui; Tsai, Athena Yi-Jung; Huang, Wen-Ni; Wang, Jye

    2016-01-01

    Because resources for long-term care services are limited, timely and appropriate referral for rehabilitation services is critical for optimizing clients' functions and successfully integrating them into the community. We investigated which client characteristics are most relevant in predicting Taiwan's community-based occupational therapy (OT) service referral based on experts' beliefs. Data were collected in face-to-face interviews using the Multidimensional Assessment Instrument (MDAI). Community-dwelling participants (n = 221) ≥ 18 years old who reported disabilities in the previous National Survey of Long-term Care Needs in Taiwan were enrolled. The standard for referral was the judgment and agreement of two experienced occupational therapists who reviewed the results of the MDAI. Logistic regressions and Generalized Additive Models were used for analysis. Two predictive models were proposed, one using basic activities of daily living (BADLs) and one using instrumental ADLs (IADLs). Dementia, psychiatric disorders, cognitive impairment, joint range-of-motion limitations, fear of falling, behavioral or emotional problems, expressive deficits (in the BADL-based model), and limitations in IADLs or BADLs were significantly correlated with the need for referral. Both models showed high area under the curve (AUC) values on receiver operating curve testing (AUC = 0.977 and 0.972, respectively). The probability of being referred for community OT services was calculated using the referral algorithm. The referral protocol facilitated communication between healthcare professionals to make appropriate decisions for OT referrals. The methods and findings should be useful for developing referral protocols for other long-term care services.

  7. Including 10-Gigabit-capable Passive Optical Network under End-to-End Generalized Multi-Protocol Label Switching Provisioned Quality of Service

    DEFF Research Database (Denmark)

    Brewka, Lukasz Jerzy; Gavler, Anders; Wessing, Henrik

    2012-01-01

    of the network where quality of service signaling is bridged. This article proposes strategies for generalized multi-protocol label switching control over next emerging passive optical network standard, i.e., the 10-gigabit-capable passive optical network. Node management and resource allocation approaches...... are discussed, and possible issues are raised. The analysis shows that consideration of a 10-gigabit-capable passive optical network as a generalized multi-protocol label switching controlled domain is valid and may advance end-to-end quality of service provisioning for passive optical network based customers.......End-to-end quality of service provisioning is still a challenging task despite many years of research and development in this area. Considering a generalized multi-protocol label switching based core/metro network and resource reservation protocol capable home gateways, it is the access part...

  8. Protocol: A grounded theory of ‘recovery’—perspectives of adolescent users of mental health services

    Science.gov (United States)

    Palmquist, Lucianne; Patterson, Sue; O'Donovan, Analise; Bradley, Graham

    2017-01-01

    Introduction Policies internationally endorse the recovery paradigm as the appropriate foundation for youth mental health services. However, given that this paradigm is grounded in the views of adults with severe mental illness, applicability to youth services and relevance to young people is uncertain, particularly as little is known about young people’s views. A comprehensive understanding of the experiences and expectations of young people is critical to developing youth mental health services that are acceptable, accessible, effective and relevant. Aim To inform development of policy and youth services, the study described in this protocol aims to develop a comprehensive account of the experiences and expectations of 12–17 year olds as they encounter mental disorders and transition through specialist mental health services. Data will be analysed to model recovery from the adolescents’ perspective. Method and analysis This grounded theory study will use quantitative and qualitative data collected in interviews with 12–17 year olds engaged with specialist Child/Youth Mental Health Service in Queensland, Australia. Interviews will explore adolescents’ expectations and experiences of mental disorder, and of services, as they transition through specialist mental health services, including the meaning of their experiences and ideas of ‘recovery’ and how their experiences and expectations are shaped. Data collection and analysis will use grounded theory methods. Ethics and dissemination Adolescents’ experiences will be presented as a mid-range theory. The research will provide tangible recommendations for youth-focused mental health policy and practice. Findings will be disseminated within academic literature and beyond to participants, health professionals, mental health advocacy groups and policy and decision makers via publications, research summaries, conferences and workshops targeting different audiences. Ethical and research governance approvals

  9. Compromises Between Quality of Service Metrics and Energy Consumption of Hierarchical and Flat Routing Protocols for Wireless Sensors Network

    Directory of Open Access Journals (Sweden)

    Abdelbari BEN YAGOUTA

    2016-11-01

    Full Text Available Wireless Sensor Network (WSN is wireless network composed of spatially distributed and tiny autonomous nodes, which cooperatively monitor physical or environmental conditions. Among the concerns of these networks is prolonging the lifetime by saving nodes energy. There are several protocols specially designed for WSNs based on energy conservation. However, many WSNs applications require QoS (Quality of Service criteria, such as latency, reliability and throughput. In this paper, we will compare three routing protocols for wireless sensors network LEACH (Low Energy Adaptive Clustering Hierarchy, AODV (Ad hoc on demand Distance Vector and LABILE (Link Quality-Based Lexical Routing using Castalia simulator in terms of energy consumption, throughput, reliability and latency time of packets received by sink under different conditions to determinate the best configurations that offers the most suitable compromises between energy conservation and all QoS metrics for each routing protocols. The results show that, the best configurations that offer the suitable compromises between energy conservation and all QoS metrics is a large number of deployed nodes with low packet rate for LEACH (300 nodes and 1 packet/s, a medium number of deployed nodes with low packet rate For AODV (100 nodes and 1 packet/s and a very low nodes density with low packet rate for LABILE (50 nodes and 1 packet/s.

  10. Ad hoc mobile wireless networks principles, protocols, and applications

    CERN Document Server

    Sarkar, Subir Kumar

    2013-01-01

    The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of serv

  11. An intelligent service-based layered architecture for e learning and assessment

    International Nuclear Information System (INIS)

    Javaid, Q.; Arif, F.

    2017-01-01

    The rapid advancement in ICT (Information and Communication Technology) is causing a paradigm shift in eLearning domain. Traditional eLearning systems suffer from certain shortcomings like tight coupling of system components, lack of personalization, flexibility, and scalability and performance issues. This study aims at addressing these challenges through an MAS (Multi Agent System) based multi-layer architecture supported by web services. The foremost objective of this study is to enhance learning process efficiency by provision of flexibility features for learning and assessment processes. Proposed architecture consists of two sub-system namely eLearning and eAssesssment. This architecture comprises of five distinct layers for each sub-system, with active agents responsible for miscellaneous tasks including content handling, updating, resource optimization, load handling and provision of customized environments for learners and instructors. Our proposed architecture aims at establishment of a facilitation level to learners as well as instructors for convenient acquisition and dissemination of knowledge. Personalization features like customized environments, personalized content retrieval and recommendations, adaptive assessment and reduced response time, are believed to significantly enhance learning and tutoring experience. In essence characteristics like intelligence, personalization, interactivity, usability, laidback accessibility and security, signify aptness of proposed architecture for improving conventional learning and assessment processes. Finally we have evaluated our proposed architecture by means of analytical comparison and survey considering certain quality attributes. (author)

  12. Development of a Behavior Change Intervention to Improve Sexual Health Service Use Among University Undergraduate Students: Mixed Methods Study Protocol.

    Science.gov (United States)

    Cassidy, Christine; Steenbeek, Audrey; Langille, Donald; Martin-Misener, Ruth; Curran, Janet

    2017-11-02

    approach will provide a comprehensive foundation to co-design a theory-based intervention with service users, health care providers, and administrators to improve sexual health service use among university students and ultimately improve their overall health and well-being. ©Christine Cassidy, Audrey Steenbeek, Donald Langille, Ruth Martin-Misener, Janet Curran. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 02.11.2017.

  13. 77 FR 43538 - Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to...

    Science.gov (United States)

    2012-07-25

    ... for a short period of time during the Commission's transition to the IP Relay registration system, the... Service against the record evidence of significant problems of misuse caused by the guest user procedure... the proposal in the 2006 FNPRM, including comment on the IRFA, of the possible significant economic...

  14. A Cross-Layer Wireless Sensor Network Energy-Efficient Communication Protocol for Real-Time Monitoring of the Long-Distance Electric Transmission Lines

    Directory of Open Access Journals (Sweden)

    Jun Yu

    2015-01-01

    Full Text Available Optimization of energy consumption in Wireless Sensor Network (WSN nodes has become a critical link that constrains the engineering application of the smart grid due to the fact that the smart grid is characterized by long-distance transmission in a special environment. The paper proposes a linear hierarchical network topological structure specific to WSN energy conservation in environmental monitoring of the long-distance electric transmission lines in the smart grid. Based on the topological structural characteristics and optimization of network layers, the paper also proposes a Topological Structure be Layered Configurations (TSLC routing algorithm to improve the quality of WSN data transmission performance. Coprocessing of the network layer and the media access control (MAC layer is achieved by using the cross-layer design method, accessing the status for the nodes in the network layer and obtaining the status of the network nodes of the MAC layer. It efficiently saves the energy of the whole network, improves the quality of the network service performance, and prolongs the life cycle of the network.

  15. Characteristics of Indigenous primary health care models of service delivery: a scoping review protocol.

    Science.gov (United States)

    Harfield, Stephen; Davy, Carol; Kite, Elaine; McArthur, Alexa; Munn, Zachary; Brown, Ngiare; Brown, Alex

    2015-11-01

    The objective of the scoping review is to identify and describe within the existing literature the characteristics (values, principles, components and suggest practical applications) of primary health care models of service delivery for Indigenous people. More specifically, the review question is:What are the characteristics (values, principles, components and suggested practical applications) of primary health care models of service delivery for Indigenous people?Findings from this scoping review will inform two systematic reviews. One of these will explore the acceptability and the other the effectiveness of identified characteristics. The scoping review will follow the JBI Scoping Review methodology as outlined in the 2015 Joanna Briggs Institute Reviewers' Manual. Indigenous populations in colonized countries experience worse health outcomes relative to their non-Indigenous counterparts. In Australia, in the period 2010 to 2012 the estimated gap in life expectancy between Aboriginal and Torres Strait Islander Australians compared to non-Indigenous Australians was 10 years Similar gaps in life expectancy between Indigenous and non-Indigenous have been demonstrated in other countries, such as New Zealand, Canada and the United StatesThe gap in life expectancy and the health disadvantage experienced by Indigenous people is in part the result of mainstream health services not adequately meeting the health needs of Indigenous people and Indigenous people's inability to access mainstream services Part of the solution has been the establishment of primary health care services for and in many cases run by Indigenous people. Indigenous primary health services have been developed to provide culturally appropriate services that meet the needs of local Indigenous communities.In Australia, the first Aboriginal medical service was established in 1971 in Redfern, New South Wales, by "community activists in response to ongoing discrimination against Aboriginal people within

  16. User's perspectives of barriers and facilitators to implementing quality colonoscopy services in Canada: a study protocol.

    Science.gov (United States)

    Jobin, Gilles; Gagnon, Marie Pierre; Candas, Bernard; Dubé, Catherine; Ben Abdeljelil, Anis; Grenier, Sonya

    2010-11-02

    Colorectal cancer (CRC) represents a serious and growing health problem in Canada. Colonoscopy is used for screening and diagnosis of symptomatic or high CRC risk individuals. Although a number of countries are now implementing quality colonoscopy services, knowledge synthesis of barriers and facilitators perceived by healthcare professionals and patients during implementation has not been carried out. In addition, the perspectives of various stakeholders towards the implementation of quality colonoscopy services and the need of an efficient organisation of such services have been reported in the literature but have not been synthesised yet. The present study aims to produce a comprehensive synthesis of actual knowledge on the barriers and facilitators perceived by all stakeholders to the implementation of quality colonoscopy services in Canada. First, we will conduct a comprehensive review of the scientific literature and other published documentation on the barriers and facilitators to implementing quality colonoscopy services. Standardised literature searches and data extraction methods will be used. The quality of the studies and their relevance to informing decisions on colonoscopy services implementation will be assessed. For each group of users identified, barriers and facilitators will be categorised and compiled using narrative synthesis and meta-analytical techniques. The principle factors identified for each group of users will then be validated for its applicability to various Canadian contexts using the Delphi study method. Following this study, a set of strategies will be identified to inform decision makers involved in the implementation of quality colonoscopy services across Canadian jurisdictions. This study will be the first to systematically summarise the barriers and facilitators to implementation of quality colonoscopy services perceived by different groups and to consider the local contexts in order to ensure the applicability of this

  17. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  18. Application Level Protocol Development for Library and Information Science Applications. Volume 1: Service Definition. Volume 2: Protocol Specification. Report No. TG.1.5; TG.50.

    Science.gov (United States)

    Aagaard, James S.; And Others

    This two-volume document specifies a protocol that was developed using the Reference Model for Open Systems Interconnection (OSI), which provides a framework for communications within a heterogeneous network environment. The protocol implements the features necessary for bibliographic searching, record maintenance, and mail transfer between…

  19. Adaptive Square-Shaped Trajectory-Based Service Location Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hwa-Jung Lim

    2010-04-01

    Full Text Available In this paper we propose an adaptive square-shaped trajectory (ASST-based service location method to ensure load scalability in wireless sensor networks. This first establishes a square-shaped trajectory over the nodes that surround a target point computed by the hash function and any user can access it, using the hash. Both the width and the size of the trajectory are dynamically adjustable, depending on the number of queries made to the service information on the trajectory. The number of sensor nodes on the trajectory varies in proportion to the changing trajectory shape, allowing high loads to be distributed around the hot spot area.

  20. Exploring a security protocol for secure service migration in commercial cloud environments

    OpenAIRE

    Karthick, Gayathri; Mapp, Glenford E.; Kammueller, Florian; Aiash, Mahdi

    2017-01-01

    Mobile users are making more demands of networks. They want to run applications such as network steaming of audio and video as well as immersive gaming that demand high Qualities-of-Service. One way to address this problem is by using mobile services that move around as users move around. This ensures that low latencies are maintained between the client and the server resulting in a better Quality-of-Experience. In addition, the advent of virtual machine technology for example, VMware, and co...

  1. Multiple wireless protocol advertising system, enabling automatic access selection and local services

    NARCIS (Netherlands)

    Houben, S.A.; Baken, N.; Herve, P.; Smets, R.

    2006-01-01

    We examined efficiency within wireless access options for mobile devices and discovered that a classic pitfall is revisited. As with the proliferation of services in incumbents’ portfolios, leading to a number of coexisting so-called ‘stove-pipes’, we see an isomorphic phenomenon evolving in

  2. Implementation of a High-Performance Cardiopulmonary Resuscitation Protocol at a Collegiate Emergency Medical Services Program

    Science.gov (United States)

    Stefos, Kathryn A.; Nable, Jose V.

    2016-01-01

    Out-of-hospital cardiac arrest (OHCA) is a significant public health issue. Although OHCA occurs relatively infrequently in the collegiate environment, educational institutions with on-campus emergency medical services (EMS) agencies are uniquely positioned to provide high-quality resuscitation care in an expedient fashion. Georgetown University's…

  3. GENERAL INFORMATION AND MAIN CHARACTERISTICS REGARDING WEB SERVICES. PROTOCOL SOAP AND REST

    Directory of Open Access Journals (Sweden)

    MIRONELA PIRNAU

    2009-05-01

    Full Text Available A web service represents a communication interface offered by the server, through that the clients (programs on other systems may require different information. The customer may vary, may be present on the same computer server, may be in the same local n

  4. Fast and easy protocol for the purification of recombinant S-layer protein for synthetic biology applications

    KAUST Repository

    Norville, Julie E.; Kelly, Deborah F.; Knight, Thomas F.; Belcher, Angela M.; Walz, Thomas

    2011-01-01

    A goal of synthetic biology is to make biological systems easier to engineer. One of the aims is to design, with nanometer-scale precision, biomaterials with well-defined properties. The surface-layer protein SbpA forms 2D arrays naturally

  5. A web service system supporting three-dimensional post-processing of medical images based on WADO protocol.

    Science.gov (United States)

    He, Longjun; Xu, Lang; Ming, Xing; Liu, Qian

    2015-02-01

    Three-dimensional post-processing operations on the volume data generated by a series of CT or MR images had important significance on image reading and diagnosis. As a part of the DIOCM standard, WADO service defined how to access DICOM objects on the Web, but it didn't involve three-dimensional post-processing operations on the series images. This paper analyzed the technical features of three-dimensional post-processing operations on the volume data, and then designed and implemented a web service system for three-dimensional post-processing operations of medical images based on the WADO protocol. In order to improve the scalability of the proposed system, the business tasks and calculation operations were separated into two modules. As results, it was proved that the proposed system could support three-dimensional post-processing service of medical images for multiple clients at the same moment, which met the demand of accessing three-dimensional post-processing operations on the volume data on the web.

  6. Effectiveness of various irrigation activation protocols and the self-adjusting file system on smear layer and debris removal.

    Science.gov (United States)

    Çapar, İsmail Davut; Aydinbelge, Hale Ari

    2014-01-01

    The purpose of the present study is to evaluate smear layer generation and residual debris after using self-adjusting file (SAF) or rotary instrumentation and to compare the debris and smear layer removal efficacy of the SAF cleaning/shaping irrigation system against final agitation techniques. One hundred and eight maxillary lateral incisor teeth were randomly divided into nine experimental groups (n = 12), and root canals were prepared using ProTaper Universal rotary files, with the exception of the SAF instrumentation group. During instrumentation, root canals were irrigated with a total of 16 mL of 5% NaOCl. For final irrigation, rotary-instrumented groups were irrigated with 10 mL of 17% EDTA and 10 mL of 5% NaOCl using different irrigation agitation regimens (syringe irrigation with needles, NaviTip FX, manual dynamic irrigation, CanalBrush, EndoActivator, EndoVac, passive ultrasonic irrigation (PUI), and SAF irrigation). In the SAF instrumentation group, root canals were instrumented for 4 min at a rate of 4 mL/min with 5% NaOCl and received a final flush with same as syringe irrigation with needles. The surface of the root dentin was observed using a scanning electron microscope. The SAF instrumentation group generated less smear layer and yielded cleaner canals compared to rotary instrumentation. The EndoActivator, EndoVac, PUI, and SAF irrigation groups increased the efficacy of irrigating solutions on the smear layer and debris removal. The SAF instrumentation yielded cleaner canal walls when compared to rotary instrumentation. None of the techniques completely removed the smear layer from the root canal walls. © 2014 Wiley Periodicals, Inc.

  7. Cross-Layer Resource Allocation for Variable Bit Rate Multiclass Services in a Multirate Multicarrier DS-CDMA Network

    Directory of Open Access Journals (Sweden)

    Kee-Chaing Chua

    2005-02-01

    Full Text Available An approximate analytical formulation of the resource allocation problem for handling variable bit rate multiclass services in a cellular round-robin carrier-hopping multirate multicarrier direct-sequence code-division multiple-access (MC-DS-CDMA system is presented. In this paper, all grade-of-service (GoS or quality-of-service (QoS requirements at the connection level, packet level, and link layer are satisfied simultaneously in the system, instead of being satisfied at the connection level or at the link layer only. The analytical formulation shows how the GoS/QoS in the different layers are intertwined across the layers. A novelty of this paper is that the outages in the subcarriers are minimized by spreading the subcarriers' signal-to-interference ratio evenly among all the subcarriers by using a dynamic round-robin carrier-hopping allocation scheme. A complete sharing (CS scheme with guard capacity is used for the resource sharing policy at the connection level based on the mean rates of the connections. Numerical results illustrate that significant gain in the system utilization is achieved through the joint coupling of connection/packet levels and link layer.

  8. 'PhysioDirect' telephone assessment and advice services for physiotherapy: protocol for a pragmatic randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Hopper Cherida

    2009-08-01

    Full Text Available Abstract Background Providing timely access to physiotherapy has long been a problem for the National Health Service in the United Kingdom. In an attempt to improve access some physiotherapy services have introduced a new treatment pathway known as PhysioDirect. Physiotherapists offer initial assessment and advice by telephone, supported by computerised algorithms, and patients are sent written self-management and exercise advice by post. They are invited for face-to-face treatment only when necessary. Although several such services have been developed, there is no robust evidence regarding clinical and cost-effectiveness, nor the acceptability of PhysioDirect. Methods/Design This protocol describes a multi-centre pragmatic individually randomised trial, with nested qualitative research. The aim is to determine the effectiveness, cost-effectiveness, and acceptability of PhysioDirect compared with usual models of physiotherapy based on patients going onto a waiting list and receiving face-to-face care. PhysioDirect services will be established in four areas in England. Adult patients in these areas with musculoskeletal problems who refer themselves or are referred by a primary care practitioner for physiotherapy will be invited to participate in the trial. About 1875 consenting patients will be randomised in a 2:1 ratio to PhysioDirect or usual care. Data about outcome measures will be collected at baseline and 6 weeks and 6 months after randomisation. The primary outcome is clinical improvement at 6 months; secondary outcomes include cost, waiting times, time lost from work and usual activities, patient satisfaction and preference. The impact of PhysioDirect on patients in different age-groups and with different conditions will also be examined. Incremental cost-effectiveness will be assessed in terms of quality adjusted life years in relation to cost. Qualitative methods will be used to explore factors associated with the success or failure of

  9. A Layered Approach to Critical Friendship as a Means to Support Pedagogical Innovation in Pre-Service Teacher Education

    Science.gov (United States)

    Fletcher, Tim; Ní Chróinín, Déirdre; O'Sullivan, Mary

    2016-01-01

    In this article we describe and interpret how two distinct layers of critical friendship were used to support a pedagogical innovation in pre-service teacher education. The innovation, "Learning about Meaningful Physical Education" (LAMPE), focuses on ways to teach future teachers to foster meaningful experiences for learners in physical…

  10. Elaboration of protocols as a guide in musculoskeletal ultrasound for radiology service of the Hospital Doctor Rafael A. Calderon Guardia

    International Nuclear Information System (INIS)

    Campos Hernandez, Luis Diego

    2010-01-01

    A protocol to guide residents and attending physicians at the Hospital Dr. Rafael Angel Calderon Guardia has been provided for regulating the work in the field the ultrasound of muscles, tendons and sonography. The staff has handled the ultrasound devices must understand the basis of the interaction of acoustic energy to the tissues and to know the methods and instruments have been used to produce and improve the quality of the image obtained. The guide ultrasound normal locomotor allowed to have a model for service members and medical imaging radiology hospital; it has been prepared through a comprehensive literature review based on textbooks and current articles concerning the most important theoretical bases of the Doppler study, which covers the assessment of shoulder, elbow, wrist, knee and ankle. The data obtained in the study process, facilitated access to printed and digital information, which has led to diagnostic certainty and reliability of results. (author) [es

  11. The impact of a bariatric rehabilitation service on weight loss and psychological adjustment - study protocol

    Directory of Open Access Journals (Sweden)

    Hollywood Amelia

    2012-04-01

    Full Text Available Abstract Background Bariatric surgery is currently the most effective form of obesity management for those whose BMI is greater than 40 (or 35 with co morbidities. A minority of patients, however, either do not show the desired loss of excess weight or show weight regain by follow up. Research highlights some of the reasons for this variability, most of which centres on the absence of any psychological support with patients describing how although surgery fixes their body, psychological issues relating to dietary control, self esteem, coping and emotional eating remain neglected. The present study aims to evaluate the impact of a health psychology led bariatric rehabilitation service (BRS on patient health outcomes. The bariatric rehabilitation service will provide information, support and mentoring pre and post surgery and will address psychological issues such as dietary control, self esteem, coping and emotional eating. The package reflects the rehabilitation services now common place for patients post heart attack and stroke which have been shown to improve patient health outcomes. Methods/Design The study is a randomised control trial and patients will be allocated to receive either usual care or the bariatric rehabilitation service pre and post bariatric surgery. Follow up measures of weight loss and psychological issues will be taken at baseline (2 weeks preoperatively, 3, 6 and 12 months postoperatively. The contents of the bariatric service and the follow up measures are based on previous pilot work and have been developed further by the research team working closely with two patient support groups (BOSPA & WLSinfo. This study will take place in St Richard's Hospital in Chichester in the UK. Discussion It is predicted that a bariatric rehabilitation service will improve weight loss following surgery and will also facilitate changes in other psychological variables such as quality of life, dietary control, self esteem, coping and

  12. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    performance data. These standard protocols and representations must support tasks such as profiling parallel applications, monitoring the status of computers and networks, and monitoring the performance of services provided by a computational grid. This paper describes a proposed protocol and data representation for the exchange of events in a distributed system. The protocol exchanges messages formatted in XML and it can be layered atop any low-level communication protocol such as TCP or UDP Further, we describe Java and C++ implementations of this protocol and discuss their performance. The next section will provide some further background information. Section 3 describes the main communication patterns of our protocol. Section 4 describes how we represent events and related information using XML. Section 5 describes our protocol and Section 6 discusses the performance of two implementations of the protocol. Finally, an appendix provides the XML Schema definition of our protocol and event information.

  13. Barriers and facilitators of access to maternal services for women with disabilities: scoping review protocol.

    Science.gov (United States)

    Mheta, Doreen; Mashamba-Thompson, Tivani P

    2017-05-16

    The Sustainable Development Goals (SDGs) emphasises the increasing equitable coverage of quality health care and provision of integrated services as means of reducing maternal mortality. Despite so much effort being placed on improved access to maternity health care, studies show that women with disabilities are being systemically excluded from the mainstream maternal health services. The proposed scoping review aims to map literature on the barriers and facilitators of access to maternal services for women with disabilities. The search strategy for this scoping review study will involve electronic databases including Pubmed, MEDLINE via EBSCOhost, CINAHL Plus with full text via EBSCOhost, Africa-Wide Info via EBSCOhost, JSTOR and Proquest Health and Medical Complete. Articles will also be searched through the "Cited by" search as well as citations included in the reference lists of included articles. A two-stage mapping strategy would be conducted. Stage 1 would be to screen studies through examining their titles. Furthermore, we will screen abstracts of the identified studies descriptively and by focus and method as stipulated by the inclusion and exclusion criteria. In stage 2, we will extract data from the included studies. A parallel screening and data extraction will be undertaken by two reviewers. We will access the quality of the included studies using the mixed methods appraisal tool (MMAT). We will use NVIVO version 10 to extract the relevant outcomes and thematic analysis of the studies. We anticipate to find relevant studies reporting evidence on the barriers and facilitators of access to maternal health services in Sub-Saharan Africa. The evidence obtained from the included studies when summarised will help guide future research. The study findings will be disseminated electronically and in print. In addition, it will be presented at conferences related to sexual reproductive health, maternal health care and reproductive health.

  14. Distributed Processing System for Restoration of Electric Power Distribution Network Using Two-Layered Contract Net Protocol

    Science.gov (United States)

    Kodama, Yu; Hamagami, Tomoki

    Distributed processing system for restoration of electric power distribution network using two-layered CNP is proposed. The goal of this study is to develop the restoration system which adjusts to the future power network with distributed generators. The state of the art of this study is that the two-layered CNP is applied for the distributed computing environment in practical use. The two-layered CNP has two classes of agents, named field agent and operating agent in the network. In order to avoid conflicts of tasks, operating agent controls privilege for managers to send the task announcement messages in CNP. This technique realizes the coordination between agents which work asynchronously in parallel with others. Moreover, this study implements the distributed processing system using a de-fact standard multi-agent framework, JADE(Java Agent DEvelopment framework). This study conducts the simulation experiments of power distribution network restoration and compares the proposed system with the previous system. We confirmed the results show effectiveness of the proposed system.

  15. Evaluating the implementation of a national clinical programme for diabetes to standardise and improve services: a realist evaluation protocol.

    Science.gov (United States)

    McHugh, S; Tracey, M L; Riordan, F; O'Neill, K; Mays, N; Kearney, P M

    2016-07-28

    Over the last three decades in response to the growing burden of diabetes, countries worldwide have developed national and regional multifaceted programmes to improve the monitoring and management of diabetes and to enhance the coordination of care within and across settings. In Ireland in 2010, against a backdrop of limited dedicated strategic planning and engrained variation in the type and level of diabetes care, a national programme was established to standardise and improve care for people with diabetes in Ireland, known as the National Diabetes Programme (NDP). The NDP comprises a range of organisational and service delivery changes to support evidence-based practices and policies. This realist evaluation protocol sets out the approach that will be used to identify and explain which aspects of the programme are working, for whom and in what circumstances to produce the outcomes intended. This mixed method realist evaluation will develop theories about the relationship between the context, mechanisms and outcomes of the diabetes programme. In stage 1, to identify the official programme theories, documentary analysis and qualitative interviews were conducted with national stakeholders involved in the design, development and management of the programme. In stage 2, as part of a multiple case study design with one case per administrative region in the health system, qualitative interviews are being conducted with frontline staff and service users to explore their responses to, and reasoning about, the programme's resources (mechanisms). Finally, administrative data will be used to examine intermediate implementation outcomes such as service uptake, acceptability, and fidelity to models of care. This evaluation is using the principles of realist evaluation to examine the implementation of a national programme to standardise and improve services for people with diabetes in Ireland. The concurrence of implementation and evaluation has enabled us to produce formative

  16. High-Performance CCSDS AOS Protocol Implementation in FPGA

    Science.gov (United States)

    Clare, Loren P.; Torgerson, Jordan L.; Pang, Jackson

    2010-01-01

    The Consultative Committee for Space Data Systems (CCSDS) Advanced Orbiting Systems (AOS) space data link protocol provides a framing layer between channel coding such as LDPC (low-density parity-check) and higher-layer link multiplexing protocols such as CCSDS Encapsulation Service, which is described in the following article. Recent advancement in RF modem technology has allowed multi-megabit transmission over space links. With this increase in data rate, the CCSDS AOS protocol implementation needs to be optimized to both reduce energy consumption and operate at a high rate.

  17. [Evaluation of implementation of the protocol for managing tuberculosis/ human immunodeficiency virus coinfection in specialized care services in ceará state].

    Science.gov (United States)

    de Paula, Silvia Helena Bastos; Martins, Telma Alves; Santiago Borges, Sheila Maria; de Oliveira Nogueira, Christiana Maria; Freire, Valderina Ramos

    2017-05-25

    Identify barriers and strategies for implementation of the protocol for managing tuberculosis/ human immunodeficiency virus (TB/HIV) coinfection in specialized care services in Ceará state, through evaluation research. The study followed iPIER methodology, a new initiative to help improve the implementation of health programs through the use of research that is conducted as a part of the implementation process. Data were collected on the structure and processes of 22 services and barriers were explored in four focus groups with 28 participants, from the standpoint of the health team, administrators, and users. The discussions were transcribed and interpreted with regard to the objectives of the study. The information on structure and process revealed that six services manage TB/HIV coinfection and 16 do not. The barriers were: team members were unaware of the protocol; lack of clinical practice guidelines in the services; specialized care services working at all three levels of the health system; inadequate spaces for treatment of airborne diseases; and lack of communication with primary health care sectors for patient transfers. The results were discussed with teams and administrators in seminars held in the services and with program managers for sexually transmitted infections, human immunodeficiency virus, AIDS, hepatitis, and tuberculosis. Direct dialogue between administrators, implementers, users, and researchers generated knowledge about the services and led to joint preparation of modifications in workflow aimed at acceptance and use of the protocol; however, users continue to resist adherence to treatment.

  18. Protocol Interoperability Between DDN and ISO (Defense Data Network and International Organization for Standardization) Protocols

    Science.gov (United States)

    1988-08-01

    services and protocols above the transport layer are usually implemented as user- callable utilities on the host computers, it is desirable to offer them...Networks, Prentice-hall, New Jersey, 1987 [ BOND 87] Bond , John, "Parallel-Processing Concepts Finally Come together in Real Systems", Computer Design

  19. Understanding HIV-positive patients' preferences for healthcare services: a protocol for a discrete choice experiment

    Science.gov (United States)

    Youssef, Elaney; Cooper, Vanessa; Miners, Alec; Llewellyn, Carrie; Pollard, Alex; Lagarde, Mylene; Sachikonye, Memory; Sabin, Caroline; Foreman, Claire; Perry, Nicky; Nixon, Eileen; Fisher, Martin

    2016-01-01

    Introduction While the care of HIV-positive patients, including the detection and management of comorbidities, has historically been provided in HIV specialist outpatient clinics, recent years have seen a greater involvement of non-HIV specialists and general practitioners (GPs). The aim of this study is to determine whether patients would prefer to see their GP or HIV physician given general symptoms, and to understand what aspects of care influence their preferences. Methods/analysis We have developed and piloted a discrete choice experiment (DCE) to better understand patients' preferences for care of non-HIV-related acute symptoms. The design of the DCE was informed by our exploratory research, including the findings of a systematic literature review and a qualitative study. Additional questionnaire items have been included to measure demographics, service use and experience of non-HIV illnesses and quality of life (EQ5D). We plan to recruit 1000 patients from 14 HIV clinics across South East England. Data will be analysed using random-effects logistic regression and latent class analysis. ORs and 95% CIs will be used to estimate the relative importance of each of the attribute levels. Latent class analysis will identify whether particular groups of people value the service attribute levels differently. Ethics/dissemination Ethical approval for this study was obtained from the Newcastle and North Tyneside Research Ethics Committee (reference number 14/NE/1193). The results will be disseminated at national and international conferences and peer-reviewed publications. A study report, written in plain English, will be made available to all participants. The Patient Advisory Group will develop a strategy for wider dissemination of the findings to patients and the public. PMID:27431895

  20. Quantifying Queensland patients with cancer health service usage and costs: study protocol.

    Science.gov (United States)

    Callander, Emily; Topp, Stephanie M; Larkins, Sarah; Sabesan, Sabe; Bates, Nicole

    2017-01-24

    The overall mortality rate for cancer has declined in Australia. However, socioeconomic inequalities exist and the out-of-pocket costs incurred by patients in Australia are high compared with some European countries. There is currently no readily available data set to provide a systematic means of measuring the out-of-pocket costs incurred by patients with cancer within Australia. The primary aim of the project is to quantify the direct out-of-pocket healthcare expenditure of individuals in the state of Queensland, who are diagnosed with cancer. This project will build Australia's first model (called CancerCostMod) of out-of-pocket healthcare expenditure of patients with cancer using administrative data from Queensland Cancer Registry, for all individuals diagnosed with any cancer in Queensland between 1 July 2011 and 30 June 2012, linked to their Admitted Patient Data Collection, Emergency Department Information System, Medicare Benefits Schedule and Pharmaceutical Benefits Scheme records from 1 July 2011 to 30 June 2015. No identifiable information will be provided to the authors. The project will use a combination of linear and logistic regression modelling, Cox proportional hazards modelling and machine learning to identify differences in survival, total health system expenditure, total out-of-pocket expenditure and high out-of-pocket cost patients, adjusting for demographic and clinical confounders, and income group, Indigenous status and geographic location. Results will be analysed separately for different types of cancer. Human Research Ethics approval has been obtained from the Townsville Hospital and Health Service Human Research Ethics Committee (HREC/16/QTHS/110) and James Cook University Human Research Ethics Committee (H6678). Permission to waive consent has been sought from Queensland Health under the Public Health Act 2005. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to

  1. Quality of Service over Specific Link Layers: state of the art report

    NARCIS (Netherlands)

    van der Zee, Martin; Ait Yaiz, R.; Heijenk, Geert

    The Integrated Services concept is proposed as an enhancement to the current Internet architecture, to provide a better Quality of Service (QoS) than that provided by the traditional Best-Effort service. The features of the Integrated Services are explained in this report. To support Integrated

  2. Intersectoral approaches and integrated services in achieving the right to health for refugees upon resettlement: a scoping review protocol.

    Science.gov (United States)

    Javadi, Dena; Langlois, Etienne V; Ho, Shirley; Friberg, Peter; Tomson, Göran

    2017-08-30

    Global insecurity and climate change are exacerbating the need for improved management of refugee resettlement services. International standards hold states responsible for the protection of the right of non-citizens to an adequate standard of physical and mental health while recognising the importance of social determinants of health. However, programmes to protect refugees' right to health often lack coordination and monitoring. This paper describes the protocol for a scoping review to explore barriers and facilitators to the integration of health services for refugees; the content, process and actors involved in protecting refugee health; and the extent to which intersectoral approaches are leveraged to protect refugees' right to health on resettlement, especially for vulnerable groups such as women and children. Peer-reviewed (through four databases including MEDLINE, Web of Science, Global Health and PsycINFO) and grey literature were searched to identify programmes and interventions designed to promote refugee health in receiving countries. Two reviewers will screen articles and abstract data. Two frameworks for integration and intersectoral action will be applied to understand how and why certain approaches work while others do not and to identify the actors involved in achieving success at different levels of integration as defined by these frameworks. Findings from the scoping review will be shared in relevant conferences and meetings. A brief will be created with lessons learnt from successful programmes to inform decision making in design of refugee programmes and services. Ethical approval is not required as human subjects are not involved. Registered on Open Science Framework at https://osf.io/gt9ck/. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  3. Advancing Migrant Access to Health Services in Europe (AMASE): Protocol for a Cross-sectional Study.

    Science.gov (United States)

    Fakoya, Ibidun; Álvarez-Del Arco, Débora; Monge, Susana; Copas, Andrew J; Gennotte, Anne-Francoise; Volny-Anne, Alain; Göpel, Siri; Touloumi, Giota; Prins, Maria; Barros, Henrique; Staehelin, Cornelia; Del Amo, Julia; Burns, Fiona M

    2016-05-16

    Migrants form a substantial proportion of the population affected by the human immunodeficiency virus (HIV) epidemic in Europe, yet HIV prevention for this population is hindered by poor understanding of access to care and of postmigration transmission dynamics. We present the design and methods of the advancing Migrant Access to health Services in Europe (aMASE) study, the first European cross-cultural study focused on multiple migrant populations. It aims to identify the structural, cultural, and financial barriers to HIV prevention, diagnosis, and treatment and to determine the likely country of HIV acquisition in HIV-positive migrant populations. We delivered 2 cross-sectional electronic surveys across 10 countries (Belgium, France, Germany, Greece, Italy, the Netherlands, Portugal, Spain, Switzerland, and United Kingdom). A clinic survey aimed to recruit up to 2000 HIV-positive patients from 57 HIV clinics in 9 countries. A unique study number linked anonymized questionnaire data to clinical records data (viral loads, CD4 cell counts, viral clades, etc). This questionnaire was developed by expert panel consensus and cognitively tested, and a pilot study was carried out in 2 countries. A Web-based community survey (n=1000) reached those living with HIV but not currently accessing HIV clinics, as well as HIV-negative migrants. It was developed in close collaboration with a community advisory group (CAG) made up of representatives from community organizations in 9 of the participating countries. The CAG played a key role in data collection by promoting the survey to higher-risk migrant groups (sub-Saharan Africans, Latin Americans, men who have sex with men, and people who inject drugs). The questionnaires have considerable content overlap, allowing for comparison. Questions cover ethnicity, migration, immigration status, HIV testing and treatment, health-seeking behavior, sexual risk, and drug use. The electronic questionnaires, which were available in 15

  4. Telemedical support for prehospital Emergency Medical Service (TEMS trial): study protocol for a randomized controlled trial.

    Science.gov (United States)

    Stevanovic, Ana; Beckers, Stefan Kurt; Czaplik, Michael; Bergrath, Sebastian; Coburn, Mark; Brokmann, Jörg Christian; Hilgers, Ralf-Dieter; Rossaint, Rolf

    2017-01-26

    Increasing numbers of emergency calls, shortages of Emergency Medical Service (EMS), physicians, prolonged emergency response times and regionally different quality of treatment by EMS physicians require improvement of this system. Telemedical solutions have been shown to be beneficial in different emergency projects, focused on specific disease patterns. Our previous pilot studies have shown that the implementation of a holistic prehospital EMS teleconsultation system, between paramedics and experienced tele-EMS physicians, is safe and feasible in different emergency situations. We aim to extend the clinical indications for this teleconsultation system. We hypothesize that the use of a tele-EMS physician is noninferior regarding the occurrence of system-induced patient adverse events and superior regarding secondary outcome parameters, such as the quality of guideline-conforming treatment and documentation, when compared to conventional EMS-physician treatment. Three thousand and ten patients will be included in this single-center, open-label, randomized controlled, noninferiority trial with two parallel arms. According to the inclusion criteria, all emergency cases involving adult patients who require EMS-physician treatment, excluding life-threatening cases, will be randomly assigned by the EMS dispatching center into two groups. One thousand five hundred and five patients in the control group will be treated by a conventional EMS physician on scene, and 1505 patients in the intervention group will be treated by paramedics who are concurrently instructed by the tele-EMS physicians at the teleconsultation center. The primary outcome measure will include the rate of treatment-specific adverse events in relation to the kind of EMS physician used. The secondary outcome measures will record the specific treatment-associated quality indicators. The evidence underlines the better quality of service using telemedicine networks between medical personnel and medical

  5. Monitoring the impact of the DRG payment system on nursing service context factors in Swiss acute care hospitals: Study protocol

    Science.gov (United States)

    Spirig, Rebecca; Spichiger, Elisabeth; Martin, Jacqueline S.; Frei, Irena Anna; Müller, Marianne; Kleinknecht, Michael

    2014-01-01

    Aims: With this study protocol, a research program is introduced. Its overall aim is to prepare the instruments and to conduct the first monitoring of nursing service context factors at three university and two cantonal hospitals in Switzerland prior to the introduction of the reimbursement system based on Diagnosis Related Groups (DRG) and to further develop a theoretical model as well as a methodology for future monitoring following the introduction of DRGs. Background: DRG was introduced to all acute care hospitals in Switzerland in 2012. In other countries, DRG introduction led to rationing and subsequently to a reduction in nursing care. As result, nursing-sensitive patient outcomes were seriously jeopardised. Switzerland has the opportunity to learn from the consequences experienced by other countries when they introduced DRGs. Their experiences highlight that DRGs influence nursing service context factors such as complexity of nursing care or leadership, which in turn influence nursing-sensitive patient outcomes. For this reason, the monitoring of nursing service context factors needs to be an integral part of the introduction of DRGs. However, most acute care hospitals in Switzerland do not monitor nursing service context data. Nursing managers and hospital executive boards will be in need of this data in the future, in order to distribute resources effectively. Methods/Design: A mixed methods design in the form of a sequential explanatory strategy was chosen. During the preparation phase, starting in spring 2011, instruments were selected and prepared, and the access to patient and nursing data in the hospitals was organized. Following this, online collection of quantitative data was conducted in fall 2011. In summer 2012, qualitative data was gathered using focus group interviews, which helped to describe the processes in more detail. During 2013 and 2014, an integration process is being conducted involving complementing, comparing and contrasting

  6. Monitoring the impact of the DRG payment system on nursing service context factors in Swiss acute care hospitals: Study protocol.

    Science.gov (United States)

    Spirig, Rebecca; Spichiger, Elisabeth; Martin, Jacqueline S; Frei, Irena Anna; Müller, Marianne; Kleinknecht, Michael

    2014-01-01

    With this study protocol, a research program is introduced. Its overall aim is to prepare the instruments and to conduct the first monitoring of nursing service context factors at three university and two cantonal hospitals in Switzerland prior to the introduction of the reimbursement system based on Diagnosis Related Groups (DRG) and to further develop a theoretical model as well as a methodology for future monitoring following the introduction of DRGs. DRG was introduced to all acute care hospitals in Switzerland in 2012. In other countries, DRG introduction led to rationing and subsequently to a reduction in nursing care. As result, nursing-sensitive patient outcomes were seriously jeopardised. Switzerland has the opportunity to learn from the consequences experienced by other countries when they introduced DRGs. Their experiences highlight that DRGs influence nursing service context factors such as complexity of nursing care or leadership, which in turn influence nursing-sensitive patient outcomes. For this reason, the monitoring of nursing service context factors needs to be an integral part of the introduction of DRGs. However, most acute care hospitals in Switzerland do not monitor nursing service context data. Nursing managers and hospital executive boards will be in need of this data in the future, in order to distribute resources effectively. A mixed methods design in the form of a sequential explanatory strategy was chosen. During the preparation phase, starting in spring 2011, instruments were selected and prepared, and the access to patient and nursing data in the hospitals was organized. Following this, online collection of quantitative data was conducted in fall 2011. In summer 2012, qualitative data was gathered using focus group interviews, which helped to describe the processes in more detail. During 2013 and 2014, an integration process is being conducted involving complementing, comparing and contrasting quantitative and qualitative findings

  7. Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment

    Directory of Open Access Journals (Sweden)

    Byunggil Lee

    2014-01-01

    Full Text Available International Association of Lighthouse Authorities (IALA is developing the standard intersystem VTS exchange format (IVEF protocol for exchange of navigation and vessel information between VTS systems and between VTS and vessels. VTS (vessel traffic system is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realization of e-Navigation as shore side collaboration for maritime safety. And IVEF (inter-VTS data exchange format for inter-VTS network has become a hot research topic of VTS system. Currently, the IVEF developed by the International Association of Lighthouse Authorities (IALA does not include any highly trusted certification technology for the connectors. The output of standardization is distributed as the IALA recommendation V-145, and the protocol is implemented with an open source. The IVEF open source, however, is the code used to check the functions of standard protocols. It is too slow to be used in the field and requires a large memory. And the vessel traffic information requires high security since it is highly protected by the countries. Therefore, this paper suggests the authentication protocol to increase the security of the VTS systems using the main certification server and IVEF.

  8. M-Health Service for Train Passengers Using Mobile GPS System: An ArchiMate Service Layer Model

    Directory of Open Access Journals (Sweden)

    MUHAMMAD SAJID

    2017-01-01

    Full Text Available EA (Enterprise Architecture is an instrument that is employed to describe the organization?s structure, business layout and operations within the IT (Information Technology environment. Different types of organizations extensively employed EA for aligning their business and operations with IT resources. EA may also be employed in non-organizational setting such as service providing agencies; rescue, medical emergency and education services. This paper suggests an EAF (Enterprise Architecture Framework for non-organizational setting by critically analyzing the top four EAs. The paper also proposes a new m-Health service model based on the mobile GPS (Global Positioning System for train/rail passengers by employing the ArchiMate modeling language and compares the proposed model with existing service providers.

  9. Effect of Duration of Irrigation with Sodium Hypochlorite in Clinical Protocol of MTAD on Removal of Smear Layer and Creating Dentinal Erosion

    Science.gov (United States)

    Lotfi, Mehrdad; Moghaddam, Negar; Vosoughhosseini, Sepideh; Zand, Vahid; Saghiri, Mohammad Ali

    2012-01-01

    Background and aims The aim of the present study was to compare 1.3% sodium hypochlorite (NaOCl) in MTAD (mixture of tetracycline isomer, acid, and detergent) for the removal of the smear layer and induction of canal erosion. Materials and methods 38 maxillary incisors were divided in three experimental groups of 10 and two positive and negative control groups of each 4 teeth, and prepared using rotary files. In test groups, 1.3% NaOCl was used for 5, 10 and 20 minutes during preparation followed by MTAD as the final rinse. In negative control group, 5.25% NaOCl was used for 10 minutes followed by 17% Ethylenediamine Tetra-Acetic Acid (EDTA) as the final rinse. In positive control group, dis-tilled water was used for 10 minutes during preparation and then as the final rinse. The samples were examined under scan-ning electron microscope, and the smear layer and dentinal erosion scores were recorded. Results Five and 10 min groups had significant differences with 20 min group (p < 0.05). In apical third, 5 and 10 min groups had also significant differences with 20 min (p < 0.05). In the coronal thirds, when the time of irrigation with 1.3% NaOCl increased from 5 min to 20 min, erosion also increased significantly. However, 5 and 10 min groups had no signifi-cant differences with negative control group. Conclusion The use of 1.3% sodium hypochlorite for 5 and 10 minutes in the MTAD protocol removes the smear layer in the coronal and middle thirds but does not induce erosion. PMID:22991642

  10. Developing a Mass Casualty Surge Capacity Protocol for Emergency Medical Services to Use for Patient Distribution.

    Science.gov (United States)

    Shartar, Samuel E; Moore, Brooks L; Wood, Lori M

    2017-12-01

    Metropolitan areas must be prepared to manage large numbers of casualties related to a major incident. Most US cities do not have adequate trauma center capacity to manage large-scale mass casualty incidents (MCIs). Creating surge capacity requires the distribution of casualties to hospitals that are not designated as trauma centers. Our objectives were to extrapolate MCI response research into operational objectives for MCI distribution plan development; formulate a patient distribution model based on research, hospital capacities, and resource availability; and design and disseminate a casualty distribution tool for use by emergency medical services (EMS) personnel to distribute patients to the appropriate level of care. Working with hospitals within the region, we refined emergency department surge capacity for MCIs and developed a prepopulated tool for EMS providers to use to distribute higher-acuity casualties to trauma centers and lower-acuity casualties to nontrauma hospitals. A mechanism to remove a hospital from the list of available resources, if it is overwhelmed with patients who self-transport to the location, also was put into place. The number of critically injured survivors from an MCI has proven to be consistent, averaging 7% to 10%. Moving critically injured patients to level 1 trauma centers can result in a 25% reduction in mortality, when compared with care at nontrauma hospitals. US cities face major gaps in the surge capacity needed to manage an MCI. Sixty percent of "walking wounded" casualties self-transport to the closest hospital(s) to the incident. Directing critically ill patients to designated trauma centers has the potential to reduce mortality associated with the event. When applied to MCI responses, damage-control principles reduce resource utilization and optimize surge capacity. A universal system for mass casualty triage was identified and incorporated into the region's EMS. Flagship regional coordinating hospitals were designated

  11. Virtual Fiber Networking and Impact of Optical Path Grooming on Creating Efficient Layer One Services

    Science.gov (United States)

    Naruse, Fumisato; Yamada, Yoshiyuki; Hasegawa, Hiroshi; Sato, Ken-Ichi

    This paper presents a novel “virtual fiber” network service that exploits wavebands. This service provides virtual direct tunnels that directly convey wavelength paths to connect customer facilities. To improve the resource utilization efficiency of the service, a network design algorithm is developed that can allow intermediate path grooming at limited nodes and can determine the best node location. Numerical experiments demonstrate the effectiveness of the proposed service architecture.

  12. RANCANG BANGUN WEB SERVICE PEMBERITAHUAN DINI TERINTEGRASI VOICE OVER INTERNET PROTOCOL DAN KOMUNIKASI SELULER UNTUK KEAMANAN LINGKUNGAN PERUMAHAN

    Directory of Open Access Journals (Sweden)

    Gusti Agung Ayu Putri

    2009-12-01

    Full Text Available Kejahatan, khususnya perampokan di rumah tangga di Bali akhir-akhir ini menunjukkan kecenderungan yang meningkat baik secara kuantitas maupun kualitas. Secara kualitas kejahatan yang terjadi bukan hanya terbatas pada pencurian, akan tetapi sampai pembunuhan. Pengakuan seorang penjahat yang melakukan pembunuhan menunjukkan bahwa pembunuhan dilakukan bila korban melihat dan karenanya dapat mengidentifikasi penjahat. Jika dalam rumah tangga tertimpa kejadian darurat seperti perampokan atau kecelakaan, permintaan bantuan cepat bisa dilakukan dengan menekan nomor telepon tertentu yang berbeda untuk setiap kejadian dengan menggunakan telepon seluler. Melalui pengintegrasian Web Service dengan perangkat jaringan komunikasi seluler dan Voice of Over Internet Protocol (VOIP, maka pesan sms cepat bisa dikirimkan ke tetangga atau instansi terkait. Selain itu suatu perangkat lunak Open Source Software (OSS dapat menjadi solusi alternative pemakaian properiaty software. Pengembangan aplikasi menjadi sangat relevan dan penting karena adanya dukungan pemerintah Indonesia bagi pemanfaatan OSS melalui program Indonesia Goes Open Source (IGOS sejak tahun 2004. Dengan demikian diharapkan pemanfaatan Teknologi Informasi dan komunikasi ini melalui permintaan bantuan cepat terhadap kejadian darurat dapat meningkatkan keamanan dan kenyamanan rumah tangga . Lebih jauh aplikasi system ini diharapkan bermanfaat lebih luas seperti di obyek pariwisata dan masyarakat luas umumnya.

  13. Smear layer removal evaluation of different protocol of Bio Race file and XP- endo Finisher file in corporation with EDTA 17% and NaOCl.

    Science.gov (United States)

    Zand, Vahid; Mokhtari, Hadi; Reyhani, Mohammad-Frough; Nahavandizadeh, Neda; Azimi, Shahram

    2017-11-01

    The aim of the present study was to compare the amount of the smear layer remaining in prepared root canals with different protocols of Bio RaCe files and XP-endo Finisher file (XPF) in association with 17% EDTA and sodium hypochlorite solution. A total of 68 extracted single-rooted teeth were randomly divided into 4 experimental groups (n=14) and two control groups (n=6). The root canals were prepared with Bio RaCe files (FKG Dentaire, Switzerland) using the crown-down technique based on manufacturer's instructions and irrigated according to the following irrigation techniques: Group 1: XPF with 2 mL of 2.5% NaOCl for 1 minute. Group 2:, XPF with 1 mL of 17% EDTA for one minute. Group 3: XPF was used for 1 minute in association with normal saline solution. Group 4: XP-endo Finisher file for 30 seconds in association with 2.5% NaOCl and 17% EDTA for 30 seconds. The negative control group: NaOCl (2.5%) was used during root canal preparation, followed by irrigation with 17% EDTA at the end of root canal preparation. The positive control group: Normal saline solution was used for irrigation during root canal preparation. In all the groups, during preparation of the root canals with Bio RaCe file, 20 mL of 2.5% NaOCl was used for root canal irrigation and at the end of the procedural steps 20 mL of normal saline solution was used as a final irrigant. The samples were analyzed under SEM at ×1000‒2000 magnification and evaluated using Torabinejad scoring system. Data were analyzed with non-parametric Kruskal-Wallis test and post hoc Mann-Whitney U test, using SPSS. Statistical significant was defined at P <0.05. The results of the study showed the least amount of the smear layer at coronal, middle and apical thirds of the root canals in groups 2, which was not significantly different from the negative control group ( P <0.5). Under the limitations of the present study, use of a combination of NaOCl and EDTA in association with XPF exhibited the best efficacy for the

  14. Designing platform independent mobile apps and services

    CERN Document Server

    Heckman, Rocky

    2016-01-01

    This book explains how to help create an innovative and future proof architecture for mobile apps by introducing practical approaches to increase the value and flexibility of their service layers and reduce their delivery time. Designing Platform Independent Mobile Apps and Services begins by describing the mobile computing landscape and previous attempts at cross platform development. Platform independent mobile technologies and development strategies are described in chapter two and three. Communication protocols, details of a recommended five layer architecture, service layers, and the data abstraction layer are also introduced in these chapters. Cross platform languages and multi-client development tools for the User Interface (UI) layer, as well as message processing patterns and message routing of the Service Int rface (SI) layer are explained in chapter four and five. Ways to design the service layer for mobile computing, using Command Query Responsibility Segregation (CQRS) and the Data Abstraction La...

  15. Protocol independent transmission method in software defined optical network

    Science.gov (United States)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  16. Measuring service quality trade-offs in Asian distribution channels: A multi-layer perspective

    NARCIS (Netherlands)

    Wetzels, M.G.M.; Ruyter, de J.C.; Lemmink, J.G.A.M.

    2000-01-01

    In international marketing channels customer service has become an important factor in supplier and purchase decisions. In evaluating supplier performance several trade-offs are taken into account by actors operating at various channel levels. These are trade-offs among customer service elements and

  17. Effects of a peer support programme for youth social services employees experiencing potentially traumatic events: a protocol for a prospective cohort study.

    Science.gov (United States)

    Guay, Stephane; Tremblay, Nicole; Goncalves, Jane; Bilodeau, Henriette; Geoffrion, Steve

    2017-06-24

    The use of peer support programmes to help workers experiencing potentially traumatic events (PTE) has increased in high-risk organisations in the last decades. However, the scientific evidence of its effectiveness is still very limited. This paper aims to describe the protocol of a prospective cohort study that assesses the efficacy of a peer support programme among youth social services employees exposed to a PTE at work on psychological well-being, work functioning and needs of support. This is a mixed-methods prospective study that will examine workers' evolution four times over a 12-month period in Canada. This study involves: (1) quantitative data obtained through self-administrated questionnaires among 222 workers, and (2) qualitative in-depth interviews with a subsample of 45 workers. This study will compare findings from a cohort who received the support of a peer following a PTE (peer support-experimental protocol) as part of the experimental protocol of the Montreal Youth Social Services-University Institute (MYSS-UI), the second group of workers did not ask for the peer support (no peer support-experimental protocol) but was part of MYSS-UI, and the third group received standard organisational support from the Monteregie Youth Social Services (MYSS) (standard organisational protocol). The protocol and informed consent form complied with the ethics guidelines of the MYSS-UI. The Research Ethics Board of MYSS-UI and MYSS reviewed and accepted the protocol as required. The results of the study will be published in peer-reviewed journals, presented at research and general public conferences, disseminated via a public report for the institute that funded the project and for all workers. Results of this study will influence decision making regarding intervention policies following PTE and peer support interventions may be expanded throughout the youth social services in Canada and worldwide. © Article author(s) (or their employer(s) unless otherwise stated

  18. Study protocol for a controlled trial of Strengths Model Case Management in mental health services in Hong Kong.

    Science.gov (United States)

    Tsoi, Wing-See Emily; Tse, Samson; Fukui, Sadaaki; Jones, Steven

    2015-10-06

    Although strengths-based models are popular within recovery-oriented approaches, there is still a lack of conclusive research to guide how they should be implemented. A recent meta-analysis confirmed the lack of clarity in how this perspective is operationalised and that fidelity monitoring during the implementation process is lacking. Hence, there is a clear need to evaluate the feasibility of delivering and evaluating a clearly operationalised strengths-based intervention that incorporates fidelity checks to inform more definitive research. This protocol therefore describes a controlled trial of Strengths Model Case Management (SMCM), a complex intervention, for people with severe mental illnesses in Hong Kong. This trial follows the guidelines of the Medical Research Council as a phase 2 trial. Hence, it is a pilot study that tests the feasibility and effectiveness of the model. This is a 9-month controlled trial that uses the Kansas Model. Participants and a matched control group are recruited on a voluntary basis, after screening for eligibility. Effectiveness of the SMCM will be measured through outcome measures taken at baseline, the mid-point and at the end of the trial. Outcomes for service users include personal recovery, hope, subjective well-being, psychiatric symptoms, perceived level of recovery features within the organisation, therapeutic alliance and achievement of recovery goals. Outcomes for care workers will include job burnout, organisational features of recovery and perceived supervisory support. With a 2×3 analysis of variance design and a moderate intervention effect (Cohen's d=0.50), a total of 86 participants will be needed for a statistical power of 0.80. Ethical approval has been obtained from the Human Research Ethics Committee for Non-Clinical Faculties at The University of Hong Kong (HRECNCF: EA140913). Australian New Zealand Clinical Trial Registry (ACTRN)12613001120763. Published by the BMJ Publishing Group Limited. For permission

  19. Applications and methods utilizing the Simple Semantic Web Architecture and Protocol (SSWAP for bioinformatics resource discovery and disparate data and service integration

    Directory of Open Access Journals (Sweden)

    Nelson Rex T

    2010-06-01

    Full Text Available Abstract Background Scientific data integration and computational service discovery are challenges for the bioinformatic community. This process is made more difficult by the separate and independent construction of biological databases, which makes the exchange of data between information resources difficult and labor intensive. A recently described semantic web protocol, the Simple Semantic Web Architecture and Protocol (SSWAP; pronounced "swap" offers the ability to describe data and services in a semantically meaningful way. We report how three major information resources (Gramene, SoyBase and the Legume Information System [LIS] used SSWAP to semantically describe selected data and web services. Methods We selected high-priority Quantitative Trait Locus (QTL, genomic mapping, trait, phenotypic, and sequence data and associated services such as BLAST for publication, data retrieval, and service invocation via semantic web services. Data and services were mapped to concepts and categories as implemented in legacy and de novo community ontologies. We used SSWAP to express these offerings in OWL Web Ontology Language (OWL, Resource Description Framework (RDF and eXtensible Markup Language (XML documents, which are appropriate for their semantic discovery and retrieval. We implemented SSWAP services to respond to web queries and return data. These services are registered with the SSWAP Discovery Server and are available for semantic discovery at http://sswap.info. Results A total of ten services delivering QTL information from Gramene were created. From SoyBase, we created six services delivering information about soybean QTLs, and seven services delivering genetic locus information. For LIS we constructed three services, two of which allow the retrieval of DNA and RNA FASTA sequences with the third service providing nucleic acid sequence comparison capability (BLAST. Conclusions The need for semantic integration technologies has preceded

  20. Exploring U.S Cropland - A Web Service based Cropland Data Layer Visualization, Dissemination and Querying System (Invited)

    Science.gov (United States)

    Yang, Z.; Han, W.; di, L.

    2010-12-01

    The National Agricultural Statistics Service (NASS) of the USDA produces the Cropland Data Layer (CDL) product, which is a raster-formatted, geo-referenced, U.S. crop specific land cover classification. These digital data layers are widely used for a variety of applications by universities, research institutions, government agencies, and private industry in climate change studies, environmental ecosystem studies, bioenergy production & transportation planning, environmental health research and agricultural production decision making. The CDL is also used internally by NASS for crop acreage and yield estimation. Like most geospatial data products, the CDL product is only available by CD/DVD delivery or online bulk file downloading via the National Research Conservation Research (NRCS) Geospatial Data Gateway (external users) or in a printed paper map format. There is no online geospatial information access and dissemination, no crop visualization & browsing, no geospatial query capability, nor online analytics. To facilitate the application of this data layer and to help disseminating the data, a web-service based CDL interactive map visualization, dissemination, querying system is proposed. It uses Web service based service oriented architecture, adopts open standard geospatial information science technology and OGC specifications and standards, and re-uses functions/algorithms from GeoBrain Technology (George Mason University developed). This system provides capabilities of on-line geospatial crop information access, query and on-line analytics via interactive maps. It disseminates all data to the decision makers and users via real time retrieval, processing and publishing over the web through standards-based geospatial web services. A CDL region of interest can also be exported directly to Google Earth for mashup or downloaded for use with other desktop application. This web service based system greatly improves equal-accessibility, interoperability, usability

  1. A Power-Efficient Access Point Operation for Infrastructure Basic Service Set in IEEE 802.11 MAC Protocol

    Directory of Open Access Journals (Sweden)

    Hua Ye Ming

    2006-01-01

    Full Text Available Infrastructure-based wireless LAN technology has been widely used in today's personal communication environment. Power efficiency and battery management have been the center of attention in the design of handheld devices with wireless LAN capability. In this paper, a hybrid protocol named improved PCF operation is proposed, which intelligently chooses the access point- (AP- assisted DCF (distributed coordinator function and enhanced PCF (point coordinator function transmission mechanism of IEEE 802.11 protocol in an infrastructure-based wireless LAN environment. Received signal strength indicator (RSSI is used to determine the tradeoff between direct mobile-to-mobile transmission and transmission routed by AP. Based on the estimation, mobile stations can efficiently communicate directly instead of being routed through AP if they are in the vicinity of each other. Furthermore, a smart AP protocol is proposed as extension to the improved PCF operation by utilizing the historical end-to-end delay information to decide the waking up time of mobile stations. Simulation results show that using the proposed protocol, energy consumption of mobile devices can be reduced at the cost of slightly longer end-to-end packet delay compared to traditional IEEE 802.11 PCF protocol. However, in a non-time-critical environment, this option can significantly prolong the operation time of mobile devices.

  2. Elaboration of angio-CT protocols and CT venography in the radiology service of Hospital Calderon Guardia

    International Nuclear Information System (INIS)

    Valverde Sanchez, Allan

    2009-01-01

    A review and analysis was made of the existing literature of publications in medical journals of radiology. Angio-CT protocols and venography have been the sources most used in hospitals.The topics to be reviewed are: the pathogenesis and tomographic findings of major vascular pathologies of the aorta at the thoracic, abdominal, peripheral arterial system of the upper and lower limbs; as well as, to level of the inferior vein cava, vascular pathologies in the kidney, hepatic, pulmonary and splanchnic circulation, neck trauma and complications have been associated with vascular injury with CT correlation. CT angiography protocols related to pathology of the chest are focused, also, the abdomen, upper and lower limbs and neck trauma and CT venography protocol for the valuation of the inferior vein cava and the deep veins of the lower limbs have been described. The approach and treatment of vascular pathologies related have been provided. (author) [es

  3. Supporting reputation based trust management enhancing security layer for cloud service models

    Science.gov (United States)

    Karthiga, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.

    2017-11-01

    In the existing system trust between cloud providers and consumers is inadequate to establish the service level agreement though the consumer’s response is good cause to assess the overall reliability of cloud services. Investigators recognized the significance of trust can be managed and security can be provided based on feedback collected from participant. In this work a face recognition system that helps to identify the user effectively. So we use an image comparison algorithm where the user face is captured during registration time and get stored in database. With that original image we compare it with the sample image that is already stored in database. If both the image get matched then the users are identified effectively. When the confidential data are subcontracted to the cloud, data holders will become worried about the confidentiality of their data in the cloud. Encrypting the data before subcontracting has been regarded as the important resources of keeping user data privacy beside the cloud server. So in order to keep the data secure we use an AES algorithm. Symmetric-key algorithms practice a shared key concept, keeping data secret requires keeping this key secret. So only the user with private key can decrypt data.

  4. Development of a management protocol for the reduction of fuel consumption and decreasing of the emanations of CO2 as contaminant of environment in air service companies

    International Nuclear Information System (INIS)

    Montoya Maroto, Manuel

    2012-01-01

    A management protocol is developed for air services companies to improve the eco-efficiency of its processes. The application of operational procedures have allowed the reduction of fuel consumption and decreased the emanations of CO 2 into the environment. The methodology of the research has consisted in quantitative and qualitative analysis of the variables and processes that have influenced significantly in the operation of airline fleet. An integral analysis is realized of the procedures of management and use of resources in the cockpits of the aircraft (Cockpit Resource Management) and navigation based in performance (NBP). The results of analysis are used to elaborate a protocol to minimize the fuel consumption and energy through the application of practices and operational procedures more efficient and safe. The environmental burdens associated with the services that are provided in the airline industry are minimized. The application of methods of improvement and procedures that are updated continuously have achieved the sustainability of the protocol. The operational procedures are applied to decrease the fuel consumption. Sensitization programs are developed for the utilization of more efficient operational practices and friendly with the environment. An incentive program is implemented to optimize the fuel consumption safely by pilots. A new procedure of flight scheduling is modified based on performance of the pilots and fleet degradation factors, assigning the pilots who have had higher consumption to airplanes with lower degradation, and the pilots who have had lower consumption, to airplanes with higher degradation. A self-liquidating incentive plan is developed based on the savings achieved in the operation in high-performance, could reinforce the change of attitude necessary for the group of pilots can support the implementation of the protocol [es

  5. Web services interface to EPICS channel access

    Institute of Scientific and Technical Information of China (English)

    DUAN Lei; SHEN Liren

    2008-01-01

    Web services is used in Experimental Physics and Industrial Control System (EPICS). Combined with EPICS Channel Access protocol, Web services' high usability, platform independence and language independence can be used to design a fully transparent and uniform software interface layer, which helps us complete channel data acquisition, modification and monitoring functions. This software interface layer, a cross-platform of cross-language,has good interopcrability and reusability.

  6. Web services interface to EPICS channel access

    International Nuclear Information System (INIS)

    Duan Lei; Shen Liren

    2008-01-01

    Web services is used in Experimental Physics and Industrial Control System (EPICS). Combined with EPICS Channel Access protocol, Web services high usability, platform independence and language independence can be used to design a fully transparent and uniform software interface layer, which helps us complete channel data acquisition, modification and monitoring functions. This software interface layer, a cross-platform of cross-language, has good interoperability and reusability. (authors)

  7. Helping Pre-Service Mathematics Teachers Connect Theory and Practice: Using Reading, Writing, and Observation Protocols to Structure Field Experiences

    Science.gov (United States)

    Cross, Stephanie Behm; Bayazit, Nermin Tosmur

    2014-01-01

    The authors designed the project described her in order to address their students' expressed frustrations at the perceived disconnect between theory and practice. The project combined course readings, journaling, collaboratively created observation protocols, and classroom observation into a semester-long iterative assignment. The students' work…

  8. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  9. Modelling the protocol stack in NCS with deterministic and stochastic petri net

    Science.gov (United States)

    Hui, Chen; Chunjie, Zhou; Weifeng, Zhu

    2011-06-01

    Protocol stack is the basis of the networked control systems (NCS). Full or partial reconfiguration of protocol stack offers both optimised communication service and system performance. Nowadays, field testing is unrealistic to determine the performance of reconfigurable protocol stack; and the Petri net formal description technique offers the best combination of intuitive representation, tool support and analytical capabilities. Traditionally, separation between the different layers of the OSI model has been a common practice. Nevertheless, such a layered modelling analysis framework of protocol stack leads to the lack of global optimisation for protocol reconfiguration. In this article, we proposed a general modelling analysis framework for NCS based on the cross-layer concept, which is to establish an efficiency system scheduling model through abstracting the time constraint, the task interrelation, the processor and the bus sub-models from upper and lower layers (application, data link and physical layer). Cross-layer design can help to overcome the inadequacy of global optimisation based on information sharing between protocol layers. To illustrate the framework, we take controller area network (CAN) as a case study. The simulation results of deterministic and stochastic Petri-net (DSPN) model can help us adjust the message scheduling scheme and obtain better system performance.

  10. Trade restrictions as a means of enforcing compliance with international environmental law. Montreal Protocol on Substances that Deplete the Ozone Layer

    International Nuclear Information System (INIS)

    Lang, W.

    1996-01-01

    The contribution reviews primarily Art. 4 of the Montreal Protocol and its efficiency for enforcing compliance with obligations under international environmental law and discusses aspects of possible conflicts with GATT law. (CB)

  11. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  12. Layered stigma among health-care and social service providers toward key affected populations in Jamaica and The Bahamas.

    Science.gov (United States)

    Rogers, S J; Tureski, K; Cushnie, A; Brown, A; Bailey, A; Palmer, Q

    2014-01-01

    While considerable research has documented stigma toward key populations affected by HIV and AIDS - men who have sex with men (MSM), sex workers (SWs) - it provided limited empirical evidence on the presence of layered stigma among health-care professionals providing services for these populations. C-Change conducted a survey among 332 staff of health-care and social service agencies in Jamaica and The Bahamas to understand the levels of stigma toward people living with HIV (PLHIV), including MSM and SWs and factors associated with stigma. While most health-care professionals responding to the survey said that PLHIV, MSM, and SWs deserved quality care, they expressed high levels of blame and negative judgments, especially toward MSM and SWs. Across a stigma assessment involving eight vignette characters, the highest levels of stigma were expressed toward PLHIV who were also MSM or SWs, followed by PLHIV, MSM, and SWs. Differences were assessed by gender, country, type of staff, type of agency, and exposure to relevant training. Findings indicate higher reported stigma among nonclinical vs. clinical staff, staff who worked in general vs. MSM/SW-friendly health facilities, and among untrained vs. training staff. This implies the need for targeted staff capacity strengthening as well as improved facility environments that are MSM/SW-friendly.

  13. 78 FR 49717 - Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...

    Science.gov (United States)

    2013-08-15

    ... disabilities about the availability of this service. 3. The Commission would like to learn more about the... better educate the public about the purpose and functions of STS and provides the Commission with... (IP Relay) and video relay service (VRS), the Commission should bundle national STS outreach efforts...

  14. The CORE Service Improvement Programme for mental health crisis resolution teams: study protocol for a cluster-randomised controlled trial.

    Science.gov (United States)

    Lloyd-Evans, Brynmor; Fullarton, Kate; Lamb, Danielle; Johnston, Elaine; Onyett, Steve; Osborn, David; Ambler, Gareth; Marston, Louise; Hunter, Rachael; Mason, Oliver; Henderson, Claire; Goater, Nicky; Sullivan, Sarah A; Kelly, Kathleen; Gray, Richard; Nolan, Fiona; Pilling, Stephen; Bond, Gary; Johnson, Sonia

    2016-03-22

    As an alternative to hospital admission, crisis resolution teams (CRTs) provide intensive home treatment to people experiencing mental health crises. Trial evidence supports the effectiveness of the CRT model, but research suggests that the anticipated reductions in inpatient admissions and increased user satisfaction with acute care have been less than hoped for following the scaling up of CRTs nationally in England, as mandated by the National Health Service (NHS) Plan in 2000. The organisation and service delivery of the CRTs vary substantially. This may reflect the lack of a fully specified CRT model and the resources to enhance team model fidelity and to improve service quality. We will evaluate the impact of a CRT service improvement programme over a 1-year period on the service users' experiences of care, service use, staff well-being, and team model fidelity. Twenty-five CRTs from eight NHS Trusts across England will be recruited to this cluster-randomised trial: 15 CRTs will be randomised to receive the service improvement programme over a 1-year period, and ten CRTs will not receive the programme. Data will be collected from 15 service users and all clinical staff from each participating CRT at baseline and at the end of the intervention. Service use data will be collected from the services' electronic records systems for two 6-month periods: the period preceding and the period during months 7-12 of the intervention. The study's primary outcome is service user satisfaction with CRT care, measured using a client satisfaction questionnaire. Secondary outcomes include the following: perceived continuity of care, hospital admission rates and bed use, rates of readmission to acute care following CRT support, staff morale, job satisfaction, and general health. The adherence of the services to a model of best practice will be assessed at baseline and follow-up. Outcomes will be compared between the intervention and control teams, adjusting for baseline

  15. Development of youth friendly family medicine services in Bosnia and Herzegovina: protocol for a cluster randomized controlled trial.

    Science.gov (United States)

    Haller, Dagmar M; Narring, Françoise; Chondros, Patty; Pejic, Daliborka; Sredic, Ana; Huseinagic, Senad; Perone, Nicolas; Sanci, Lena A; Meynard, Anne

    2014-01-01

    Young people face many barriers in accessing health services that are responsive to their needs. The World Health Organization has led a call to develop services that address these barriers, i.e. youth-friendly health services. Addressing the needs of young people is one of the priorities of Foundation fami, an organisation working in collaboration with the Swiss Federal Department of Development and Cooperation and Geneva University Hospitals to develop quality family medicine services in Bosnia and Herzegovina. This paper describes the design of a trial to assess the effectiveness of a multifaceted intervention involving family medicine teams (primary care doctors and nurses) to improve the youth-friendliness of family medicine services in Bosnia and Herzegovina. This is a stratified cluster randomised trial with a repeated cross-sectional design involving 59 health services in 10 municipalities of the canton of Zenica in Bosnia and Herzegovina. Municipalities were the unit of randomisation: five municipalities were randomised to the intervention arm and five to a wait-list control arm. Family medicine teams in the intervention arm were invited to participate in an interactive training program about youth-friendly service principles and change processes within their service. The primary outcome was the youth-friendliness of the primary care service measured using the YFHS-WHO + questionnaire, a validated tool which young people aged 15 to 24 years complete following a family medicine consultation. A total of 600 young people aged 15 to 24 years were invited to participate and complete the YFHS-WHO + questionnaire: 300 (30 per municipality) at baseline, and 300 at follow-up, three to five months after the training program. The results of this trial should provide much awaited evidence about the development of youth-friendly primary care services and inform their further development both in Bosnia and Herzegovina and worldwide. Australian New Zealand

  16. Effects and meanings of a person-centred and health-promoting intervention in home care services - a study protocol of a non-randomised controlled trial.

    Science.gov (United States)

    Bölenius, Karin; Lämås, Kristina; Sandman, Per-Olof; Edvardsson, David

    2017-02-16

    The literature indicates that current home care service are largely task oriented with limited focus on the involvement of the older people themselves, and studies show that lack of involvement might reduce older people's quality of life. Person-centred care has been shown to improve the satisfaction with care and quality of life in older people cared for in hospitals and nursing homes, with limited published evidence about the effects and meanings of person-centred interventions in home care services for older people. This study protocol outlines a study aiming to evaluate such effects and meanings of a person-centred and health-promoting intervention in home aged care services. The study will take the form of a non-randomised controlled trial with a before/after approach. It will include 270 older people >65 years receiving home care services, 270 relatives and 65 staff, as well as a matched control group of equal size. All participants will be recruited from a municipality in northern Sweden. The intervention is based on the theoretical concepts of person-centredness and health-promotion, and builds on the four pedagogical phases of: theory apprehension, experimental learning, operationalization, and clinical supervision. Outcome assessments will focus on: a) health and quality of life (primary outcomes), thriving and satisfaction with care for older people; b) caregiver strain, informal caregiving engagement and relatives' satisfaction with care: c) job satisfaction and stress of conscience among care staff (secondary outcomes). Evaluation will be conducted by means of self-reported questionnaires and qualitative research interviews. Person-centred home care services have the potential to improve the recurrently reported sub-standard experiences of home care services, and the results can point the way to establishing a more person-centred and health-promoting model for home care services for older people. NCT02846246 .

  17. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  18. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  19. Qualitative study investigating the commissioning process for older people's services provided by third sector organisations: SOPRANO study protocol.

    Science.gov (United States)

    Sands, Gina; Chadborn, Neil; Craig, Chris; Gladman, John

    2016-05-18

    The commissioning of third sector services for older people may influence the quality, availability and coordination of services for older people. The SOPRANO study aims to understand the relationships between and processes of commissioning bodies and third sector organisations providing health and social care services for older people. This qualitative study will be based in the East Midlands region of England. An initial scoping survey of commissioners will give an overview of services to maintain the health and well-being of older people in the community that are commissioned. Following this, semistructured interviews will be conducted with 4 sample groups: health and social care commissioners, service provider managers, service provider case workers and older service users. A sample size of 10-15 participants in each of the 4 groups is expected to be sufficient to reach data saturation, resulting in a final expected sample size of 40-60 participants. Informed consent will be gained from all participants, and those unable to provide informed consent will be excluded. The interview data will be analysed by 2 researchers using framework content analysis. Approval for the study has been gained from the University of Nottingham School of Medicine ethical review board, and the relevant approvals have been gained from the National Health Service (NHS) research and development departments for interviewing NHS staff. Early engagement with a wide range of stakeholders will ensure that the research findings are extensively disseminated to relevant stakeholders (including commissioners and third sector providers) in an accessible format using the extensive communication networks available to the National Institute for Health Research (NIHR) Collaboration for Leadership in Applied Health Research and Care CLAHRCs (applied health research organisations covering all of England). The study will also be disseminated through academic routes such as conference presentations and

  20. Study protocol for a pragmatic randomised controlled trial evaluating efficacy of a smoking cessation e-'Tabac Info Service': ee-TIS trial.

    Science.gov (United States)

    Cambon, L; Bergman, P; Le Faou, Al; Vincent, I; Le Maitre, B; Pasquereau, A; Arwidson, P; Thomas, D; Alla, F

    2017-02-24

    A French national smoking cessation service, Tabac Info Service, has been developed to provide an adapted quitline and a web and mobile application involving personalised contacts (eg, questionnaires, advice, activities, messages) to support smoking cessation. This paper presents the study protocol of the evaluation of the application (e-intervention Tabac Info Service (e-TIS)). The primary objective is to assess the efficacy of e-TIS. The secondary objectives are to (1) describe efficacy variations with regard to users' characteristics, (2) analyse mechanisms and contextual conditions of e-TIS efficacy. The study design is a two-arm pragmatic randomised controlled trial including a process evaluation with at least 3000 participants randomised to the intervention or to the control arm (current practices). Inclusion criteria are: aged 18 years or over, current smoker, having completed the online consent forms, possessing a mobile phone with android or apple systems and using mobile applications, wanting to stop smoking sooner or later. The primary outcome is the point prevalence abstinence of 7 days at 6 months later. Data will be analysed in intention to treat (primary) and per protocol analyses. A logistic regression will be carried out to estimate an OR (95% CI) for efficacy. A multivariate multilevel analysis will explore the influence on results of patients' characteristics (sex, age, education and socioprofessional levels, dependency, motivation, quit experiences) and contextual factors, conditions of use, behaviour change techniques. The study protocol was reviewed by the ethical and deontological institutional review board of the French Institute for Public Health Surveillance on 18 April 2016. The findings of this study will allow us to characterise the efficacy of e-TIS and conditions of its efficacy. These findings will be disseminated through peer-reviewed articles. NCT02841683; Pre-results. Published by the BMJ Publishing Group Limited. For

  1. Impact of mobile phone-based technology to improve health, population and nutrition services in Rural Bangladesh: a study protocol.

    Science.gov (United States)

    Uddin, Jasim; Biswas, Tuhin; Adhikary, Gourab; Ali, Wazed; Alam, Nurul; Palit, Rajesh; Uddin, Nizam; Uddin, Aftab; Khatun, Fatema; Bhuiya, Abbas

    2017-07-06

    Mobile phone-based technology has been used in improving the delivery of healthcare services in many countries. However, data on the effects of this technology on improving primary healthcare services in resource-poor settings are limited. The aim of this study is to develop and test a mobile phone-based system to improve health, population and nutrition services in rural Bangladesh and evaluate its impact on service delivery. The study will use a quasi-experimental pre-post design, with intervention and comparison areas. Outcome indicators will include: antenatal care (ANC), delivery care, postnatal care (PNC), neonatal care, expanded programme on immunization (EPI) coverage, and contraceptive prevalence rate (CPR). The study will be conducted over a period of 30 months, using the existing health systems of Bangladesh. The intervention will be implemented through the existing service-delivery personnel at various primary-care levels, such as community clinic, union health and family welfare centre, and upazila health complex. These healthcare providers will be given mobile phones equipped with Apps for sending text and voice messages, along with the use of Internet and device for data-capturing. Training on handling of the Smartphones, data-capturing and monitoring will be given to selected service providers. They will also be trained on inputs, editing, verifying, and monitoring the outcome variables. Mobile phone-based technology has the potential to improve primary healthcare services in low-income countries, like Bangladesh. It is expected that our study will contribute to testing and developing a mobile phone-based intervention to improve the coverage and quality of services. The learning can be used in other similar settings in the low-and middle-income countries.

  2. Multi-media communication system: Upper layers in the OSI reference model

    NARCIS (Netherlands)

    Zafirovic-Vukotic, M.; Niemegeers, I.G.M.M.

    1992-01-01

    The structuring, services, and major protocol functions that are required in the upper layers of the OSI reference model in order to support end-to-end multimedia communication, assuming a simple transport service, are examined. It is assumed that variable-bit-rate (VBR) coding techniques will be

  3. Enriching Discovery Layers: A Product Comparison of Content Enrichment Services Syndetic Solutions and Content Café 2

    Directory of Open Access Journals (Sweden)

    Allison DaSilva

    2014-10-01

    Full Text Available A comparative analysis of content enrichment services, Syndetic Solutions and Content Café 2, was undertaken to explore which service would provide public library users with a superior online search and discovery experience through the enriched data elements offered, specifically looking at the cover image data element and exploring what factors impact the display of said element. A data-set of 250 items in five different formats, including books, CDs, DVDs, e-books, and video games, was searched in four North American public libraries’ discovery layers to compare the integration, extent, and quality of the cover image data element supplied by Syndetic Solutions and Content Café 2. Based on an analysis of the URLs, ISBNs, and UPCs for each of the 250 items, it was determined that the integration, and therefore the display, of the cover image data element was impacted by: (1 whether or not an ISBN or UPC was listed in the MARC bibliographic record; (2 which ISBN or UPC was listed, as items could potentially have more than one; (3 the inclusion of both ISBNs and UPCs in the record and the settings of the discovery tool; (4 the order in which the ISBNs or UPCs were listed in the record; and (5 whether or not Syndetic Solutions or Content Café 2 had the image data in its database at the time of the search. The quality of the cover image displayed was found to be impacted by the size requested by the library and the size of the image provided by the publisher. These findings may also have implications for the integration of other enriched data elements.

  4. The CIRCuiTS study (Implementation of cognitive remediation in early intervention services): protocol for a randomised controlled trial.

    Science.gov (United States)

    Wykes, Til; Joyce, Eileen; Velikonja, Tjasa; Watson, Andrew; Aarons, Gregory; Birchwood, Max; Cella, Matteo; Dopson, Sue; Fowler, David; Greenwood, Kathy; Johnson, Sonia; McCrone, Paul; Perez, Jesus; Pickles, Andrew; Reeder, Clare; Rose, Diana; Singh, Swaran; Stringer, Dominic; Taylor, Matthew; Taylor, Rumina; Upthegrove, Rachel

    2018-03-15

    Cognitive problems in people with schizophrenia predict poor functional recovery even with the best possible rehabilitation opportunities and optimal medication. A psychological treatment known as cognitive remediation therapy (CRT) aims to improve cognition in neuropsychiatric disorders, with the ultimate goal of improving functional recovery. Studies suggest that intervening early in the course of the disorder will have the most benefit, so this study will be based in early intervention services, which treat individuals in the first few years following the onset of the disorder. The overall aim is to investigate different methods of CRT. This is a multicentre, randomised, single-blinded, controlled trial based in early intervention services in National Health Service Mental Health Trusts in six English research sites. Three different methods of providing CRT (intensive, group, and independent) will be compared with treatment as usual. We will recruit 720 service users aged between 16 and 45 over 3 years who have a research diagnosis of non-affective psychosis and will be at least 3 months from the onset of the first episode of psychosis. The primary outcome measure will be the degree to which participants have achieved their stated goals using the Goal Attainment Scale. Secondary outcome measures will include improvements in cognitive function, social function, self-esteem, and clinical symptoms. It has already been established that cognitive remediation improves cognitive function in people with schizophrenia. Successful implementation in mental health services has the potential to change the recovery trajectory of individuals with schizophrenia-spectrum disorders. However, the best mode of implementation, in terms of efficacy, service user and team preference, and cost-effectiveness is still unclear. The CIRCuiTS trial will provide guidance for a large-scale roll-out of CRT to mental health services where cognitive difficulties impact recovery and resilience

  5. Study protocol for two randomized controlled trials examining the effectiveness and safety of current weekend allied health services and a new stakeholder-driven model for acute medical/surgical patients versus no weekend allied health services.

    Science.gov (United States)

    Haines, Terry P; O'Brien, Lisa; Mitchell, Deb; Bowles, Kelly-Ann; Haas, Romi; Markham, Donna; Plumb, Samantha; Chiu, Timothy; May, Kerry; Philip, Kathleen; Lescai, David; McDermott, Fiona; Sarkies, Mitchell; Ghaly, Marcelle; Shaw, Leonie; Juj, Genevieve; Skinner, Elizabeth H

    2015-04-02

    , and patient discharge destination, satisfaction, and functional independence at discharge. This is the world's first application of the recently described non-inferiority (roll-in) stepped wedge trial design, and the largest investigation of the effectiveness of weekend allied health services on acute medical surgical wards to date. Australian New Zealand Clinical Trials Registry. ACTRN12613001231730 (first study) and ACTRN12613001361796 (second study). Was this trial prospectively registered?: Yes. Date registered: 8 November 2013 (first study), 12 December 2013 (second study). Anticipated completion: June 2015. Protocol version: 1. Role of trial sponsor: KP and DL are directly employed by one of the trial sponsors, their roles were: KP assisted with overall development of research design and assisted with overall project management; DL contributed to project management, administration and communications strategy.

  6. Uncovering Discovery Layer Services

    Science.gov (United States)

    Kennedy, Sean P.

    2014-01-01

    Today's electronic information landscape is growing exponentially with no signs of slowing. This poses a significant challenge for academic libraries. Librarians must continually learn and adapt to harness this explosion of resources. To fulfill their claim as the leaders in the information field they must be effective in providing access and…

  7. Moving towards an enhanced community palliative support service (EnComPaSS): protocol for a mixed method study.

    Science.gov (United States)

    Arris, Steven M; Fitzsimmons, Deborah A; Mawson, Susan

    2015-04-30

    The challenge of an ageing population and consequential increase of long term conditions means that the number of people requiring palliative care services is set to increase. One UK hospice is introducing new information and communication technologies to support the redesign of their community services; improve experiences of existing patients; and allow efficient and effective provision of their service to more people. Community Palliative Care Nurses employed by the hospice will be equipped with a mobile platform to improve communication, enable accurate and efficient collection of clinical data at the bedside, and provide access to clinical records at the point of care through an online digital nursing dashboard. It is believed that this will ensure safer clinical interventions, enable delegated specialist care deployment, support the clinical audit of patient care and improve patient safety and patient/carer experience. Despite current attempts to evaluate the implementation of such technology into end of life care pathways, there is still limited evidence supporting the notion that this can be sustained within services and implemented to scale. This study presents an opportunity to carry out a longitudinal evaluation of the implementation of innovative technology to provide evidence for designing more efficient and effective community palliative care services. A mixed methods approach will be used to understand a wide range of organisational, economic, and patient-level factors. The first stage of the project will involve the development of an organisational model incorporating proposed changes resulting from the introduction of new novel mobile technologies. This model will guide stage two, which will consist of gathering and analysing primary evidence. Data will be collected using interviews, focus groups, observation, routinely collected data and documents. The implementation of this new approach to community-based palliative care delivery will require

  8. Evidence-based new service package vs. routine service package for smoking cessation to prevent high risk patients from cardiovascular diseases (CVD): study protocol for randomized controlled trial.

    Science.gov (United States)

    Aung, Myo Nyein; Yuasa, Motoyuki; Lorga, Thaworn; Moolphate, Saiyud; Fukuda, Hiroshi; Kitajima, Tsutomu; Yokokawa, Hirohide; Minematsu, Kazuo; Tanimura, Susumu; Hiratsuka, Yoshimune; Ono, Koichi; Naunboonruang, Prissana; Thinuan, Payom; Kawai, Sachio; Suya, Yaoyanee; Chumvicharana, Somboon; Marui, Eiji

    2013-12-05

    Smoking cessation is a high-priority intervention to prevent CVD events and deaths in developing countries. While several interventions to stop smoking have been proved successful, the question of how to increase their effectiveness and practicality in developing countries remains. In this study, a newly devised evidence-based smoking cessation service package will be compared with the existing service in a randomized controlled trial within the community setting of Thailand. This randomized control trial will recruit 440 current smokers at CVD risk because of being diabetic and/or hypertensive. Informed, consented participants will be randomly allocated into the new service-package arm and the routine service arm. The study will take place in the non-communicable disease clinics of the Maetha District Hospital, Lampang, northern Thailand. The new smoking-cessation service-package comprises (1) regular patient motivation and coaching from the same primary care nurse over a 3-month period; (2) monthly application of piCO + smokerlyzer to sustain motivation of smoker's quitting attempt and provide positive feedback over a 3-month period; (3) assistance by an assigned family member; (4) nicotine replacement chewing gum to relieve withdrawal symptoms. This new service will be compared with the traditional routine service comprising the 5A approach in a 1-year follow-up. Participants who consent to participate in the study but refuse to attempt quitting smoking will be allocated to the non-randomized arm, where they will be just followed up and monitored. Primary outcome of the study is smoking cessation rate at 1-year follow-up proven by breath analysis measuring carbomonoxide in parts per million in expired air. Secondary outcomes are smoking cessation rate at the 6-month follow-up, blood pressure and heart rate, CVD risk according to the Framingham general cardiovascular risk score, CVD events and deaths at the 12-month follow-up, and the cost-effectiveness of the

  9. Analisa Perbandingan Quality Of Service (QoS) pada Jaringan Backbone Non-MPLS dengan Jaringan Backbone MPLS Menggunakan Routing Protocol OSPF di PT. Telekomunikasi Indonesia, Tbk. Witel Ridar Riau

    OpenAIRE

    Silaban, Nestor Hasudungan; Sari, Linna Oktaviana; Anhar, Anhar

    2015-01-01

    The development of telecommunications technology based on Internet Protocol (IP) is now growing with the competitiveness of the telecommunications company to improve the quality of service to consumers. It can be obtained by increasing the quality backbone network using Multi Protocol Label Switching (MPLS). MPLS is a new technology to forward the packet to the backbone network without changing the existing network structure. The main idea is to construct a replacement MPLS paths using label ...

  10. Evaluating weather factors and material response during outdoor exposure to determine accelerated test protocols for predicting service life

    Science.gov (United States)

    R. Sam Williams; Steven Lacher; Corey Halpin; Christopher White

    2005-01-01

    To develop service life prediction methods for the study of sealants, a fully instrumented weather station was installed at an outdoor test site near Madison, WI. Temperature, relative humidiy, rainfall, ultraviolet (UV) radiation at 18 wavelengths, and wind speed and direction are being continuously measured and stored. The weather data can be integrated over time to...

  11. A Peer-Led Electronic Mental Health Recovery App in an Adult Mental Health Service: Study Protocol for a Pilot Trial.

    Science.gov (United States)

    Gulliver, Amelia; Banfield, Michelle; Reynolds, Julia; Miller, Sarah; Galati, Connie; Morse, Alyssa R

    2017-12-07

    There is growing demand for peer workers (people who use their own lived experience to support others in their recovery) to work alongside consumers to improve outcomes and recovery. Augmenting the workforce with peer workers has strong capacity to enhance mental health and recovery outcomes and make a positive contribution to the workforce within mental health systems and to the peer workers themselves. Technology-based applications are highly engaging and desirable methods of service delivery. This project is an exploratory proof-of-concept study, which aims to determine if a peer worker-led electronic mental (e-mental) health recovery program is a feasible, acceptable, and effective adjunct to usual treatment for people with moderate to severe mental illness. The study design comprises a recovery app intervention delivered by a peer worker to individual consumers at an adult mental health service. Evaluation measures will be conducted at post-intervention. To further inform the acceptability and feasibility of the model, consumers will be invited to participate in a focus group to discuss the program. The peer worker, peer supervisor, and key staff at the mental health service will also be individually interviewed to further evaluate the feasibility of the program within the health service and further inform its future development. The program will be delivered over a period of approximately 4 months, commencing June 2017. If the peer worker-led recovery app is found to be feasible, acceptable, and effective, it could be used to improve recovery in mental health service consumers. ©Amelia Gulliver, Michelle Banfield, Julia Reynolds, Sarah Miller, Connie Galati, Alyssa R Morse. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 07.12.2017.

  12. Linked symptom monitoring and depression treatment programmes for specialist cancer services: protocol for a mixed-methods implementation study.

    Science.gov (United States)

    Wanat, Marta; Walker, Jane; Burke, Katy; Sevdalis, Nick; Richardson, Alison; Mulick, Amy; Frost, Chris; Sharpe, Michael

    2017-07-02

    There is growing awareness that cancer services need to address patients' well-being as well as treating their cancer. We developed systematic approaches to (1) monitoring patients' symptoms including depression using a 'Symptom Monitoring Service' and (2) providing treatment for those with major depression using a programme called 'Depression Care for People with Cancer'. Used together, these two programmes were found to be highly effective and cost-effective in clinical trials. The overall aims of this project are to: (1) study the process of introducing these programmes into routine clinical care in a large cancer service, (2) identify the challenges associated with implementation and how these are overcome, (3) determine their effectiveness in a routine non-research setting and (4) describe patients' and clinicians' experience of the programmes. This is a mixed-methods longitudinal implementation study. We will study the process of implementation in three phases (April 2016-December 2018): 'Pre-implementation' (setting up of the new programmes), 'Early Implementation' (implementation of the programmes in a small number of clinics) and 'Implementation and Maintenance' (implementation in the majority of clinics). We will use the following methods of data collection: (1) contemporaneous logs of the implementation process, (2) interviews with healthcare professionals and managers, (3) interviews with patients and (4) routinely collected clinical data. The study has been reviewed by a joint committee of Oxford University Hospitals National Health Service Foundation Trust Research and Development Department and the University of Oxford's Clinical Trials and Research Governance Department and judged to be service evaluation, not requiring ethics committee approval. The findings of this study will guide the scaling up implementation of the programmes across the UK and will enable us to construct an implementation toolkit. We will disseminate our findings in

  13. Co-creating and Evaluating a Web-app Mapping Real-World Health Care Services for Students: The servi-Share Protocol.

    Science.gov (United States)

    Montagni, Ilaria; Langlois, Emmanuel; Wittwer, Jérôme; Tzourio, Christophe

    2017-02-16

    from the involvement of stakeholders (eg, students and health care providers) to correctly identify the real-world health care services to be displayed. ©Ilaria Montagni, Emmanuel Langlois, Jérôme Wittwer, Christophe Tzourio. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 16.02.2017.

  14. Linking families with pre-school children from healthcare services to community resources: a systematic review protocol.

    Science.gov (United States)

    Burns, Jacky; Conway, David I; Gnich, Wendy; Macpherson, Lorna M D

    2017-03-08

    Poor health and health inequalities persist despite increasing investment in health improvement programmes across high-income countries. Evidence suggests that to reduce health inequalities, a range of activities targeted at different levels within society and throughout the life course should be employed. There is a particular focus on addressing inequalities in early years as this may influence the experience of health in adulthood. To address the wider determinants of health at a community level, a key intervention which can be considered is supporting patients to access wider community resources. This can include processes such as signposting, referral and facilitation. There is a lack of evidence synthesis in relation to the most effective methods for linking individuals from health services to other services within communities, especially when considering interventions aimed at families with young children. The aim of this study is to understand the way health services can best help parents, carers and families with pre-school children to engage with local services, groups and agencies to address their wider health and social needs. The review may inform future guidance to support families to address wider determinants of health. The study is a systematic review, and papers will be identified from the following electronic databases: Web of Science, Embase, MEDLINE and CINAHL. A grey literature search will be conducted using an internet search engine and specific grey literature databases (TRiP, EThOS and Open Grey). Reference lists/bibliographies of selected papers will be searched. Quality will be assessed using the Effective Public Health Practice Project Quality Assessment Tool for quantitative studies and the CASP tool for qualitative studies. Data will be synthesised in a narrative form and weighted by study quality. It is important to understand how health services can facilitate access to wider services for their patients to address the wider

  15. Identifying models of delivery, care domains and quality indicators relevant to palliative day services: a scoping review protocol.

    Science.gov (United States)

    O'Connor, Seán R; Dempster, Martin; McCorry, Noleen K

    2017-05-16

    With an ageing population and increasing numbers of people with life-limiting illness, there is a growing demand for palliative day services. There is a need to measure and demonstrate the quality of these services, but there is currently little agreement on which aspects of care should be used to do this. The aim of the scoping review will be to map the extent, range and nature of the evidence around models of delivery, care domains and existing quality indicators used to evaluate palliative day services. Electronic databases (MEDLINE, EMBASE, CINAHL, PsycINFO, Cochrane Central Register of Controlled Trials) will be searched for evidence using consensus development methods; randomised or quasi-randomised controlled trials; mixed methods; and prospective, longitudinal or retrospective case-control studies to develop or test quality indicators for evaluating palliative care within non-residential settings, including day hospices and community or primary care settings. At least two researchers will independently conduct all searches, study selection and data abstraction procedures. Meta-analyses and statistical methods of synthesis are not planned as part of the review. Results will be reported using numerical counts, including number of indicators in each care domain and by using qualitative approach to describe important indicator characteristics. A conceptual model will also be developed to summarise the impact of different aspects of quality in a palliative day service context. Methodological quality relating to indicator development will be assessed using the Appraisal of Indicators through Research and Evaluation (AIRE) tool. Overall strength of evidence will be assessed using the Grading of Recommendations, Assessment, Development, and Evaluation (GRADE) system. Final decisions on quality assessment will be made via consensus between review authors. Identifying, developing and implementing evidence-based quality indicators is critical to the evaluation and

  16. Redesigning a University Entrance Interview Protocol: A Case Study with Pre-Service Elementary School Teachers in Korea

    Directory of Open Access Journals (Sweden)

    Jinwon Chung

    2017-11-01

    Full Text Available In Korea, a national university admission is made based on a variety of factors like Grade Point Average(GPA, Statement of Purpose(SOP, Letters of Recommendation, as well as other achievement records and/or descriptions of specific qualifications. In reviewing applications, the admissions committee considers GPA, SOP, recommendation letters and other factors are also taken into consideration in the interview process. An interview test is designed to measure the overall ability of pre-service teachers, particularly focusing on their character and nature. Thus, the purpose of this study is intended to understand the admission processes of a national university in Korea, and to design the interview test questions to choose the ideal pre-service teachers who are to work in the public elementary school after graduation. In order to answer this question, a survey questionnaire was distributed to 478 college students and then results were collected and analysed.

  17. Linked symptom monitoring and depression treatment programmes for specialist cancer services: protocol for a mixed-methods implementation study

    Science.gov (United States)

    Walker, Jane; Burke, Katy; Sevdalis, Nick; Richardson, Alison; Mulick, Amy; Frost, Chris; Sharpe, Michael

    2017-01-01

    Introduction There is growing awareness that cancer services need to address patients’ well-being as well as treating their cancer. We developed systematic approaches to (1) monitoring patients’ symptoms including depression using a ‘Symptom Monitoring Service’ and (2) providing treatment for those with major depression using a programme called ‘Depression Care for People with Cancer’. Used together, these two programmes were found to be highly effective and cost-effective in clinical trials. The overall aims of this project are to: (1) study the process of introducing these programmes into routine clinical care in a large cancer service, (2) identify the challenges associated with implementation and how these are overcome, (3) determine their effectiveness in a routine non-research setting and (4) describe patients’ and clinicians’ experience of the programmes. Methods and analysis This is a mixed-methods longitudinal implementation study. We will study the process of implementation in three phases (April 2016–December 2018): ‘Pre-implementation’ (setting up of the new programmes), ‘Early Implementation’ (implementation of the programmes in a small number of clinics) and ‘Implementation and Maintenance’ (implementation in the majority of clinics). We will use the following methods of data collection: (1) contemporaneous logs of the implementation process, (2) interviews with healthcare professionals and managers, (3) interviews with patients and (4) routinely collected clinical data. Ethics and dissemination The study has been reviewed by a joint committee of Oxford University Hospitals National Health Service Foundation Trust Research and Development Department and the University of Oxford’s Clinical Trials and Research Governance Department and judged to be service evaluation, not requiring ethics committee approval. The findings of this study will guide the scaling up implementation of the programmes across the UK and will enable

  18. Health services research in patients with breast cancer (CAMISS-prospective): study protocol for an observational prospective study

    OpenAIRE

    García-Gutierrez, Susana; Orive, Miren; Sarasqueta, Cristina; Legarreta, Maria Jose; Gonzalez, Nerea; Redondo, Maximino; Rivero, Amado; Serrano-Aguilar, Pedro; Castells, Xavier; Quintana, Jose Maria; Sala, Maria

    2018-01-01

    Background Though breast cancer remains a major health problem, there is a lack of information on health care provided to patients with this disease and associated costs. In addition, there is a need to update and validate risk stratification tools in Spain. Our purpose is to evaluate the health services provided for breast cancer in Spain, from screening and diagnosis to treatment and prognosis. Methods Prospective cohort study involving 13 hospitals in Spain with a follow-up period of up to...

  19. Evaluation of current Australian health service accreditation processes (ACCREDIT-CAP): protocol for a mixed-method research project.

    Science.gov (United States)

    Hinchcliff, Reece; Greenfield, David; Moldovan, Max; Pawsey, Marjorie; Mumford, Virginia; Westbrook, Johanna Irene; Braithwaite, Jeffrey

    2012-01-01

    Accreditation programmes aim to improve the quality and safety of health services, and have been widely implemented. However, there is conflicting evidence regarding the outcomes of existing programmes. The Accreditation Collaborative for the Conduct of Research, Evaluation and Designated Investigations through Teamwork-Current Accreditation Processes (ACCREDIT-CAP) project is designed to address key gaps in the literature by evaluating the current processes of three accreditation programmes used across Australian acute, primary and aged care services. The project comprises three mixed-method studies involving documentary analyses, surveys, focus groups and individual interviews. Study samples will comprise stakeholders from across the Australian healthcare system: accreditation agencies; federal and state government departments; consumer advocates; professional colleges and associations; and staff of acute, primary and aged care services. Sample sizes have been determined to ensure results allow robust conclusions. Qualitative information will be thematically analysed, supported by the use of textual grouping software. Quantitative data will be subjected to a variety of analytical procedures, including descriptive and comparative statistics. The results are designed to inform health system policy and planning decisions in Australia and internationally. The project has been approved by the University of New South Wales Human Research Ethics Committee (approval number HREC 10274). Results will be reported to partner organisations, healthcare consumers and other stakeholders via peer-reviewed publications, conference and seminar presentations, and a publicly accessible website.

  20. Sink-oriented Dynamic Location Service Protocol for Mobile Sinks with an Energy Efficient Grid-Based Approach

    Directory of Open Access Journals (Sweden)

    Hyunseung Choo

    2009-03-01

    Full Text Available Sensor nodes transmit the sensed information to the sink through wireless sensor networks (WSNs. They have limited power, computational capacities and memory. Portable wireless devices are increasing in popularity. Mechanisms that allow information to be efficiently obtained through mobile WSNs are of significant interest. However, a mobile sink introduces many challenges to data dissemination in large WSNs. For example, it is important to efficiently identify the locations of mobile sinks and disseminate information from multi-source nodes to the multi-mobile sinks. In particular, a stationary dissemination path may no longer be effective in mobile sink applications, due to sink mobility. In this paper, we propose a Sink-oriented Dynamic Location Service (SDLS approach to handle sink mobility. In SDLS, we propose an Eight-Direction Anchor (EDA system that acts as a location service server. EDA prevents intensive energy consumption at the border sensor nodes and thus provides energy balancing to all the sensor nodes. Then we propose a Location-based Shortest Relay (LSR that efficiently forwards (or relays data from a source node to a sink with minimal delay path. Our results demonstrate that SDLS not only provides an efficient and scalable location service, but also reduces the average data communication overhead in scenarios with multiple and moving sinks and sources.

  1. Sink-oriented Dynamic Location Service Protocol for Mobile Sinks with an Energy Efficient Grid-Based Approach.

    Science.gov (United States)

    Jeon, Hyeonjae; Park, Kwangjin; Hwang, Dae-Joon; Choo, Hyunseung

    2009-01-01

    Sensor nodes transmit the sensed information to the sink through wireless sensor networks (WSNs). They have limited power, computational capacities and memory. Portable wireless devices are increasing in popularity. Mechanisms that allow information to be efficiently obtained through mobile WSNs are of significant interest. However, a mobile sink introduces many challenges to data dissemination in large WSNs. For example, it is important to efficiently identify the locations of mobile sinks and disseminate information from multi-source nodes to the multi-mobile sinks. In particular, a stationary dissemination path may no longer be effective in mobile sink applications, due to sink mobility. In this paper, we propose a Sink-oriented Dynamic Location Service (SDLS) approach to handle sink mobility. In SDLS, we propose an Eight-Direction Anchor (EDA) system that acts as a location service server. EDA prevents intensive energy consumption at the border sensor nodes and thus provides energy balancing to all the sensor nodes. Then we propose a Location-based Shortest Relay (LSR) that efficiently forwards (or relays) data from a source node to a sink with minimal delay path. Our results demonstrate that SDLS not only provides an efficient and scalable location service, but also reduces the average data communication overhead in scenarios with multiple and moving sinks and sources.

  2. Cross-Layer Handover Scheme for Multimedia Communications in Next Generation Wireless Networks

    Directory of Open Access Journals (Sweden)

    Lin Chun-Cheng

    2010-01-01

    Full Text Available In order to achieve seamless handover for real-time applications in the IP Multimedia Subsystem (IMS of next generation network, a multiprotocol combined handover mechanism is proposed in this paper. We combine SIP (Session Initiation Protocol, FMIP (Fast Mobile IPv6 Protocol, and MIH (Media Independent Handover protocols by cross-layer design and optimize those protocols' signaling flows to improve the performance of vertical handover. Theoretical analysis and simulation results illustrate that our proposed mechanism performs better than the original SIP and MIH combined handover mechanism in terms of service interruption time and packet loss.

  3. Does Interpersonal Psychotherapy improve clinical care for adolescents with depression attending a rural child and adolescent mental health service? Study protocol for a cluster randomised feasibility trial

    Directory of Open Access Journals (Sweden)

    Villanueva Elmer V

    2007-10-01

    -class correlation coefficient will be calculated and used to inform sample size calculations for subsequent large-scale trials. Qualitative data regarding process implementation will be collected quarterly from focus groups with participating clinicians over 18 months, plus phone interviews with participating adolescents and parent/guardians at 12 weeks and 24 weeks of treatment. The focus group qualitative data will be analysed using a Fourth Generation Evaluation methodology that includes a constant comparative cyclic analysis method. Discussion This study protocol will be informative for researchers and clinicians interested in considering, designing and/or conducting cluster randomised trials within community practice such as mental health services. Trial Registration Australian Clinical Trials Registry ACTRNO12607000324415

  4. Effectiveness of a lifestyle exercise program for older people receiving a restorative home care service: study protocol for a pragmatic randomised controlled trial.

    Science.gov (United States)

    Burton, Elissa; Lewin, Gill; Clemson, Lindy; Boldy, Duncan

    2013-10-18

    Restorative home care services help older people maximise their independence using a multi-dimensional approach. They usually include an exercise program designed to improve the older person's strength, balance and function. The types of programs currently offered require allocation of time during the day to complete specific exercises. This is not how the majority of home care clients prefer to be active and may be one of the reasons that few older people do the exercises regularly and continue the exercises post discharge.This paper describes the study protocol to test whether a Lifestyle Functional Exercise (LiFE) program: 1) is undertaken more often; 2) is more likely to be continued over the longer term; and, 3) will result in greater functional gains compared to a standard exercise program for older people receiving a restorative home care service. A pragmatic randomised controlled trial (RCT) design was employed with two study arms: LiFE program (intervention) and the current exercise program (control). Silver Chain, a health and community care organisation in Perth, Western Australia. One hundred and fifty restorative home care clients, aged 65 years and older. The primary outcome is a composite measure incorporating balance, strength and mobility. Other outcome measures include: physical functioning, falls efficacy, and levels of disability and functioning. If LiFE is more effective than the current exercise program, the evidence will be presented to the service management accompanied by the recommendation that it be adopted as the generic exercise program to be used within the restorative home care service. Australian and New Zealand Clinical Trials Registry ACTRN12611000788976.

  5. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  6. The effectiveness of M-health technologies for improving health and health services: a systematic review protocol

    Directory of Open Access Journals (Sweden)

    Patel Vikram

    2010-10-01

    Full Text Available Abstract Background The application of mobile computing and communication technology is rapidly expanding in the fields of health care and public health. This systematic review will summarise the evidence for the effectiveness of mobile technology interventions for improving health and health service outcomes (M-health around the world. Findings To be included in the review interventions must aim to improve or promote health or health service use and quality, employing any mobile computing and communication technology. This includes: (1 interventions designed to improve diagnosis, investigation, treatment, monitoring and management of disease; (2 interventions to deliver treatment or disease management programmes to patients, health promotion interventions, and interventions designed to improve treatment compliance; and (3 interventions to improve health care processes e.g. appointment attendance, result notification, vaccination reminders. A comprehensive, electronic search strategy will be used to identify controlled studies, published since 1990, and indexed in MEDLINE, EMBASE, PsycINFO, Global Health, Web of Science, the Cochrane Library, or the UK NHS Health Technology Assessment database. The search strategy will include terms (and synonyms for the following mobile electronic devices (MEDs and a range of compatible media: mobile phone; personal digital assistant (PDA; handheld computer (e.g. tablet PC; PDA phone (e.g. BlackBerry, Palm Pilot; Smartphone; enterprise digital assistant; portable media player (i.e. MP3 or MP4 player; handheld video game console. No terms for health or health service outcomes will be included, to ensure that all applications of mobile technology in public health and health services are identified. Bibliographies of primary studies and review articles meeting the inclusion criteria will be searched manually to identify further eligible studies. Data on objective and self-reported outcomes and study quality will

  7. Barriers and facilitators to the integration of mental health services into primary health care: a systematic review protocol.

    Science.gov (United States)

    Wakida, Edith K; Akena, Dickens; Okello, Elialilia S; Kinengyere, Alison; Kamoga, Ronald; Mindra, Arnold; Obua, Celestino; Talib, Zohray M

    2017-08-25

    Mental health is an integral part of health and well-being and yet health systems have not adequately responded to the burden of mental disorders. Integrating mental health services into primary health care (PHC) is the most viable way of closing the treatment gap and ensuring that people get the mental health care they need. PHC was formally adapted by the World Health Organization (WHO), and they have since invested enormous amounts of resources across the globe to ensure that integration of mental health services into PHC works. This review will use the SPIDER (Sample, Phenomenon of Interest, Design, Evaluation, Research type) framework approach to identify experiences of mental health integration into PHC; the findings will be reported using the "Best fit" framework synthesis. PubMed, EMBASE, PsycINFO, and Cochrane Central Register of Controlled trials (CENTRAL) will be searched including other sources like the WHO website and OpenGrey database. Assessment of bias and quality will be done at study level using two separate tools to check for the quality of evidence presented. Data synthesis will take on two synergistic approaches (qualitative and quantitative studies). Synthesizing evidence from countries across the globe will provide useful insights into the experiences of integrating mental health services into PHC and how the barriers and challenges have been handled. The findings will be useful to a wide array of stakeholders involved in the implementation of the mental health integration into PHC. The SPIDER framework has been chosen for this review because of its suitable application to qualitative and mixed methods research and will be used as a guide when selecting articles for inclusion. Data extracted will be synthesized using the "Best fit" framework because it has been used before and proved its suitability in producing new conceptual models for explaining decision-making and possible behaviors. Synthesizing evidence from countries across the globe

  8. The effectiveness of M-health technologies for improving health and health services: a systematic review protocol.

    Science.gov (United States)

    Free, Caroline; Phillips, Gemma; Felix, Lambert; Galli, Leandro; Patel, Vikram; Edwards, Philip

    2010-10-06

    The application of mobile computing and communication technology is rapidly expanding in the fields of health care and public health. This systematic review will summarise the evidence for the effectiveness of mobile technology interventions for improving health and health service outcomes (M-health) around the world. To be included in the review interventions must aim to improve or promote health or health service use and quality, employing any mobile computing and communication technology. This includes: (1) interventions designed to improve diagnosis, investigation, treatment, monitoring and management of disease; (2) interventions to deliver treatment or disease management programmes to patients, health promotion interventions, and interventions designed to improve treatment compliance; and (3) interventions to improve health care processes e.g. appointment attendance, result notification, vaccination reminders.A comprehensive, electronic search strategy will be used to identify controlled studies, published since 1990, and indexed in MEDLINE, EMBASE, PsycINFO, Global Health, Web of Science, the Cochrane Library, or the UK NHS Health Technology Assessment database. The search strategy will include terms (and synonyms) for the following mobile electronic devices (MEDs) and a range of compatible media: mobile phone; personal digital assistant (PDA); handheld computer (e.g. tablet PC); PDA phone (e.g. BlackBerry, Palm Pilot); Smartphone; enterprise digital assistant; portable media player (i.e. MP3 or MP4 player); handheld video game console. No terms for health or health service outcomes will be included, to ensure that all applications of mobile technology in public health and health services are identified. Bibliographies of primary studies and review articles meeting the inclusion criteria will be searched manually to identify further eligible studies. Data on objective and self-reported outcomes and study quality will be independently extracted by two review

  9. Protocol and baseline data from The Inala Chronic Disease Management Service evaluation study: a health services intervention study for diabetes care.

    Science.gov (United States)

    Askew, Deborah A; Jackson, Claire L; Ware, Robert S; Russell, Anthony

    2010-05-24

    Type 2 Diabetes Mellitus is one of the most disabling chronic conditions worldwide, resulting in significant human, social and economic costs and placing huge demands on health care systems. The Inala Chronic Disease Management Service aims to improve the efficiency and effectiveness of care for patients with type 2 diabetes who have been referred by their general practitioner to a specialist diabetes outpatient clinic. Care is provided by a multidisciplinary, integrated team consisting of an endocrinologist, diabetes nurse educators, General Practitioner Clinical Fellows (general practitioners who have undertaken focussed post-graduate training in complex diabetes care), and allied health personnel (a dietitian, podiatrist and psychologist). Using a geographical control, this evaluation study tests the impact of this model of diabetes care provided by the service on patient outcomes compared to usual care provided at the specialist diabetes outpatient clinic. Data collection at baseline, 6 and 12-months will compare the primary outcome (glycaemic control) and secondary outcomes (serum lipid profile, blood pressure, physical activity, smoking status, quality of life, diabetes self-efficacy and cost-effectiveness). This model of diabetes care combines the patient focus and holistic care valued by the primary care sector with the specialised knowledge and skills of hospital diabetes care. Our study will provide empirical evidence about the clinical effectiveness of this model of care. Australian New Zealand Clinical Trials Registry ACTRN12608000010392.

  10. A two-state comparative implementation of peer-support intervention to link veterans to health-related services after incarceration: a study protocol.

    Science.gov (United States)

    Simmons, Molly M; Fincke, Benjamin G; Drainoni, Mari-Lynn; Kim, Bo; Byrne, Tom; Smelson, David; Casey, Kevin; Ellison, Marsha L; Visher, Christy; Blue-Howells, Jessica; McInnes, D Keith

    2017-09-12

    this project, including training materials, peer guidebooks, and implementation strategies can be adapted by other states and regions that wish to enhance services for veterans (or other populations) leaving incarceration. A larger cluster-randomized implementation-effectiveness study is planned. This protocol is registered with clinicaltrials.gov on November 4, 2016 and was assigned the number NCT02964897 .

  11. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  12. Economic and quality of care evaluation of dialysis service models in remote Australia: protocol for a mixed methods study.

    Science.gov (United States)

    Gorham, Gillian; Howard, Kirsten; Togni, Samantha; Lawton, Paul; Hughes, Jaquelyne; Majoni, Sandawana William; Brown, Sarah; Barnes, Sue; Cass, Alan

    2017-05-03

    Australia's Northern Territory (NT) has the country's highest incidence and prevalence of kidney disease. Indigenous people from remote areas suffer the heaviest disease burden. Concerns regarding cost and sustainability limit the provision of dialysis treatments in remote areas and most Indigenous people requiring dialysis relocate to urban areas. However, this dislocation of people from their family, community and support networks may prove more costly when the broader health, societal and economic consequences for the individual, family and whole of government are considered. The Dialysis Models of Care Study is a large cross organisation mixed methods study. It includes a retrospective (2000-2014) longitudinal data linkage study of two NT cohorts: Renal Cohort 1- comprising approximately 2000 adults who received dialysis and Renal Cohort 2- comprising approximately 400 children of those adults. Linkage of administrative data sets from the Australian and New Zealand Dialysis and Transplant Registry, NT Departments of Health, Housing and Education by a specialist third party (SA/NT Datalink) will enable extraction of activity, financial and outcome data. Interviews with patients, clinicians and service providers, using a snowball technique, will canvass relevant issues and assist in determining the full costs and impacts of the five most used dialysis Models of Care. The study uses a mixed methods approach to investigate the quantitative and qualitative dimensions of the full costs and outcomes associated with the choice of particular dialysis models of care for any given patient. The study includes a large data linkage component that for the first time links health, housing and education data to fully analyse and evaluate the impact on patients, their families and the broader community, resulting from the relocation of people for treatment. The study will generate a large amount of activity, financial and qualitative data that will investigate health costs less

  13. Protocol for the evaluation of a digital storytelling approach to address stigma and improve readiness to seek services among veterans.

    Science.gov (United States)

    Bunnell, Brian E; Davidson, Tatiana M; Hamblen, Jessica L; Cook, Danna L; Grubaugh, Anouk L; Lozano, Brian E; Tuerk, Peter W; Ruggiero, Kenneth J

    2017-01-01

    Research suggests that at least 10% of veterans returning from Iraq and Afghanistan meet criteria for posttraumatic stress disorder (PTSD) related to their military experiences. National dissemination initiatives have increased veterans' access to best-practice interventions. However, treatment-seeking remains low among veterans with PTSD, often due to perceived stigma and other associated barriers. The National Center for PTSD recently developed and launched AboutFace , a digital storytelling (DST) resource designed to help veterans recognize PTSD and motivate them to seek evidence-based treatment. The Ralph H. Johnson Veterans Affairs Medical Center (VAMC) and the National Center for PTSD have partnered to conduct pilot work to evaluate veterans' reactions to AboutFace to set the stage for a large-scale study to examine whether AboutFace effectively reduces stigma and improves attitudes toward treatment-seeking among veterans. If effective, this DST approach may serve as a valuable national model for a variety of treatment-seeking populations. During the first phase of the pilot, in-person usability assessments of AboutFace will be conducted via semi-structured interviews with 20 veterans. Audio recordings of interviews will undergo transcription and coding. A report of the results of qualitative analyses of these interviews will be provided to the National Center for PTSD and will inform revisions to the site. In the second phase of the pilot, 60 veterans referred to a specialized PTSD clinic will be recruited to demonstrate and refine the methodology that we propose to use in a larger randomized controlled trial evaluation of AboutFace . Veterans will be randomly assigned to receive AboutFace plus standard education vs . standard education alone. Baseline and 2-week telephone assessments will be conducted with participating veterans to measure stigma, attitudes toward seeking mental health services, and treatment access/engagement. The feedback we receive in

  14. Developing a service user informed intervention to improve participation and ability to perform daily activities in primary Sjögren's syndrome: a mixed-methods study protocol.

    Science.gov (United States)

    Hackett, Katie L; Newton, Julia L; Deane, Katherine H O; Rapley, Tim; Deary, Vincent; Kolehmainen, Niina; Lendrem, Dennis; Ng, Wan-Fai

    2014-08-21

    A significant proportion of patients with primary Sjögren's syndrome (PSS) is functionally impaired and experience difficulties participating in various aspects of everyday life. There is currently no evidence of efficacy for non-pharmacological interventions aimed specifically at supporting the patients with PSS to improve their participation and ability to perform daily activities. This paper describes a research protocol for a mixed-methods study to develop an intervention to improve these outcomes. The protocol follows the Medical Research Council framework for complex interventions. We will use group concept mapping with the patients, adults who live with them and healthcare professionals to identify factors which prevent people with PSS from participating in daily life and performing daily activities. The factors will be prioritised by participants for importance and feasibility and will inform an intervention to be delivered within a National Health Service (NHS) setting. Evidence-based intervention techniques will be identified for the prioritised factors and combined into a deliverable intervention package. Key stakeholders will comment on the intervention content and mode of delivery through focus groups, and the data will be used to refine the intervention. The acceptability and feasibility of the refined intervention will be evaluated in a future study. The study has been approved by an NHS Research Ethics Committee, REC Reference: 13/NI/0190. The findings of this study will be disseminated in peer-reviewed journals and through presentation at national and international conferences. UKCRN Study ID: 15939. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  15. Short message service (SMS)-based intervention targeting alcohol consumption among university students: study protocol of a randomized controlled trial.

    Science.gov (United States)

    Thomas, Kristin; Bendtsen, Marcus; Linderoth, Catharina; Karlsson, Nadine; Bendtsen, Preben; Müssener, Ulrika

    2017-04-04

    Despite significant health risks, heavy drinking of alcohol among university students is a widespread problem; excessive drinking is part of the social norm. A growing number of studies indicate that short message service (SMS)-based interventions are cost-effective, accessible, require limited effort by users, and can enable continuous, real-time, brief support in real-world settings. Although there is emerging evidence for the effect of SMS-based interventions in reducing alcohol consumption, more research is needed. This study aims to test the effectiveness of a newly developed SMS-based intervention targeting excessive alcohol consumption among university and college students in Sweden. The study is a two-arm randomized controlled trial with an intervention (SMS programme) and a control (treatment as usual) group. Outcome measures will be investigated at baseline and at 3-month follow up. The primary outcome is total weekly alcohol consumption. Secondary outcomes are frequency of heavy episodic drinking, highest estimated blood alcohol concentration and number of negative consequences due to excessive drinking. This study contributes knowledge on the effect of automatized SMS support to reduce excessive drinking among students compared with existing support such as Student Health Centres. ISRCTN.com, ISRCTN95054707 . Registered on 31 August 2016.

  16. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  17. Cardiovascular disease medication health literacy among Indigenous peoples: design and protocol of an intervention trial in Indigenous primary care services.

    Science.gov (United States)

    Crengle, Sue; Smylie, Janet; Kelaher, Margaret; Lambert, Michelle; Reid, Susan; Luke, Joanne; Anderson, Ian; Harré Hindmarsh, Jennie; Harwood, Matire

    2014-07-12

    Cardiovascular diseases (CVD) are leading causes of mortality and morbidity among Indigenous people in New Zealand, Australia and Canada and are a major driver of the inequities in life expectancy between Indigenous and non-Indigenous people in these countries. Evidence-based pharmaceutical management of CVD can significantly reduce mortality and morbidity for persons diagnosed with CVD or for those at intermediate or high risk of CVD. Health literacy has been identified as a major barrier in the communication and implementation of appropriate pharmaceutical management plans for CVD. Addressing health literacy is particularly relevant in Indigenous populations where there are unique health and adult literacy challenges. This study will examine the effect of a customized, structured CVD medication programme, delivered by health professionals, on the health literacy of Indigenous people with, or at risk, of CVD. Primary outcomes are patient's knowledge about CVD medications; secondary outcomes examine changes in health literacy skills and practices. The study will employ a multi-site pre-post design with multiple measurement points to assess intervention efficacy. Participants will be recruited from four Indigenous primary care services in Australia, Canada and New Zealand. Three educational sessions will be delivered over four weeks. A tablet application will support the education sessions and produce a customized pill card for each participant. Participants will be provided with written information about CVD medications. Medication knowledge scores, and specific health literacy skills and practices will be assessed before and after the three sessions. Statistical analyses will identify significant changes in outcomes over each session, and from the pre-session one to post-session three time points. This study will make an important contribution to understanding the effect of a structured primary care-based intervention on CVD health literacy in Indigenous

  18. Screening and brief interventions for hazardous and harmful alcohol use in probation services: a cluster randomised controlled trial protocol

    Directory of Open Access Journals (Sweden)

    Myles Judy

    2009-11-01

    Full Text Available Abstract Background A large number of randomised controlled trials in health settings have consistently reported positive effects of brief intervention in terms of reductions in alcohol use. However, although alcohol misuse is common amongst offenders, there is limited evidence of alcohol brief interventions in the criminal justice field. This factorial pragmatic cluster randomised controlled trial with Offender Managers (OMs as the unit of randomisation will evaluate the effectiveness and cost-effectiveness of different models of screening to identify hazardous and harmful drinkers in probation and different intensities of brief intervention to reduce excessive drinking in probation clients. Methods and design Ninety-six OMs from 9 probation areas across 3 English regions (the North East Region (n = 4 and London and the South East Regions (n = 5 will be recruited. OMs will be randomly allocated to one of three intervention conditions: a client information leaflet control condition (n = 32 OMs; 5-minute simple structured advice (n = 32 OMs and 20-minute brief lifestyle counselling delivered by an Alcohol Health Worker (n = 32 OMs. Randomisation will be stratified by probation area. To test the relative effectiveness of different screening methods all OMs will be randomised to either the Modified Single Item Screening Questionnaire (M-SASQ or the Fast Alcohol Screening Test (FAST. There will be a minimum of 480 clients recruited into the trial. There will be an intention to treat analysis of study outcomes at 6 and 12 months post intervention. Analysis will include client measures (screening result, weekly alcohol consumption, alcohol-related problems, re-offending, public service use and quality of life and implementation measures from OMs (the extent of screening and brief intervention beyond the minimum recruitment threshold will provide data on acceptability and feasibility of different models of brief intervention. We will also examine the

  19. Screening and brief interventions for hazardous and harmful alcohol use in probation services: a cluster randomised controlled trial protocol.

    Science.gov (United States)

    Newbury-Birch, Dorothy; Bland, Martin; Cassidy, Paul; Coulton, Simon; Deluca, Paolo; Drummond, Colin; Gilvarry, Eilish; Godfrey, Christine; Heather, Nick; Kaner, Eileen; Myles, Judy; Oyefeso, Adenekan; Parrott, Steve; Perryman, Katherine; Phillips, Tom; Shenker, Don; Shepherd, Jonathan

    2009-11-18

    A large number of randomised controlled trials in health settings have consistently reported positive effects of brief intervention in terms of reductions in alcohol use. However, although alcohol misuse is common amongst offenders, there is limited evidence of alcohol brief interventions in the criminal justice field. This factorial pragmatic cluster randomised controlled trial with Offender Managers (OMs) as the unit of randomisation will evaluate the effectiveness and cost-effectiveness of different models of screening to identify hazardous and harmful drinkers in probation and different intensities of brief intervention to reduce excessive drinking in probation clients. Ninety-six OMs from 9 probation areas across 3 English regions (the North East Region (n = 4) and London and the South East Regions (n = 5)) will be recruited. OMs will be randomly allocated to one of three intervention conditions: a client information leaflet control condition (n = 32 OMs); 5-minute simple structured advice (n = 32 OMs) and 20-minute brief lifestyle counselling delivered by an Alcohol Health Worker (n = 32 OMs). Randomisation will be stratified by probation area. To test the relative effectiveness of different screening methods all OMs will be randomised to either the Modified Single Item Screening Questionnaire (M-SASQ) or the Fast Alcohol Screening Test (FAST). There will be a minimum of 480 clients recruited into the trial. There will be an intention to treat analysis of study outcomes at 6 and 12 months post intervention. Analysis will include client measures (screening result, weekly alcohol consumption, alcohol-related problems, re-offending, public service use and quality of life) and implementation measures from OMs (the extent of screening and brief intervention beyond the minimum recruitment threshold will provide data on acceptability and feasibility of different models of brief intervention). We will also examine the practitioner and organisational factors

  20. Health services research in patients with breast cancer (CAMISS-prospective): study protocol for an observational prospective study.

    Science.gov (United States)

    García-Gutierrez, Susana; Orive, Miren; Sarasqueta, Cristina; Legarreta, Maria Jose; Gonzalez, Nerea; Redondo, Maximino; Rivero, Amado; Serrano-Aguilar, Pedro; Castells, Xavier; Quintana, Jose Maria; Sala, Maria

    2018-01-08

    Though breast cancer remains a major health problem, there is a lack of information on health care provided to patients with this disease and associated costs. In addition, there is a need to update and validate risk stratification tools in Spain. Our purpose is to evaluate the health services provided for breast cancer in Spain, from screening and diagnosis to treatment and prognosis. Prospective cohort study involving 13 hospitals in Spain with a follow-up period of up to 5 years after diagnostic biopsy. Eligibility criteria: Patients diagnosed with breast cancer between April 2013 and May 2015 that have consented to participate in the study. Data will be collected on the following: pre-intervention medical history, biological, clinical, and sociodemographic characteristics, mode of cancer detection, hospital admission, treatment, and outcomes up to 5 years after initial treatment. Questionnaires about quality of life (EuroQoL EQ-5D-5 L, the European Organization For Research And Treatment Of Cancer Core Quality Of Life Questionnaire EORTC QLQ-C30 join to the specific breast cancer module (QLQ-BR23), as well as Hospital Anxiety and Depression Scale were completed by the patients before the beginning of the initial treatment and at the end of follow-up period, 2 years later. The end-points of the study were changes in health-related quality of life, recurrence, complications and readmissions at 2 and 5 years after initial treatment. Descriptive statistics will be calculated and multivariate models will be used where appropriate to adjust for potential confounders. In order to create and validate a prediction model, split validation and bootstrapping will be performed. Cost analysis will be carried out from the perspective of a national health system. The results of this coordinated project are expected to generate scientifically valid and clinically and socially important information to inform the decision-making of managers and the authorities responsible for

  1. Quality of Service Model on Data Link Layer for Mission Critical Traffic on IEEE 802.11g Networks in Infrastructure Mode

    Directory of Open Access Journals (Sweden)

    Gerald B. Fuenmayor-Rivadeneira

    2013-11-01

    Full Text Available This article presents a synthesized review as state of the art of the study of QoS for mission-critical traffic in wireless local area networks that use the IEEE 802.11g protocol. This is to highlight previous research for their contribution will constitute a reference to guide a proposed new approach to ensuring the quality of service for this type of traffic using the above protocol. The review is based on academic and business items made during the current five years. As a result of this review it is evident that there have been many efforts to address the issue but there are still gaps in the characterization of mission-critical traffic and ensuring quality of service for the same, due the new applications and the large host of WiFi networks in business and government, which has led to increased demand for access channels and, therefore, a challenge to the progress already known, such as IEEE 802.1q.

  2. Using patients' experiences of adverse events to improve health service delivery and practice: protocol of a data linkage study of Australian adults age 45 and above.

    Science.gov (United States)

    Walton, Merrilyn; Jorm, Christine; Smith-Merry, Jennifer; Harrison, Reema; Manias, Elizabeth; Iedema, Rick; Kelly, Patrick

    2014-10-13

    Evidence of patients' experiences is fundamental to creating effective health policy and service responses, yet is missing from our knowledge of adverse events. This protocol describes explorative research redressing this significant deficit; investigating the experiences of a large cohort of recently hospitalised patients aged 45 years and above in hospitals in New South Wales (NSW), Australia. The 45 and Up Study is a cohort of 265,000 adults aged 45 years and above in NSW. Patients who were hospitalised between 1 January and 30 June 2014 will be identified from this cohort using data linkage and a random sample of 20,000 invited to participate. A cross-sectional survey (including qualitative and quantitative components) will capture patients' experiences in hospital and specifically of adverse events. Approximately 25% of respondents are likely to report experiencing an adverse event. Quantitative components will capture the nature and type of events as well as common features of patients' experiences. Qualitative data provide contextual knowledge of their condition and care and the impact of the event on individuals. Respondents who do not report an adverse event will report their experience in hospital and be the control group. Statistical and thematic analysis will be used to present a patient perspective of their experiences in hospital; the characteristics of patients experiencing an adverse event; experiences of information sharing after an event (open disclosure) and the other avenues of redress pursued. Interviews with key policymakers and a document analysis will be used to create a map of the current practice. Dissemination via a one-day workshop, peer-reviewed publications and conference presentations will enable effective clinical responses and service provision and policy responses to adverse events to be developed. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  3. Audit of HIV counselling and testing services among primary healthcare facilities in Cameroon: a protocol for a multicentre national cross-sectional study.

    Science.gov (United States)

    Tianyi, Frank-Leonel; Tochie, Joel Noutakdie; Agbor, Valirie Ndip; Kadia, Benjamin Momo

    2018-03-01

    HIV testing is an invaluable entry point to prevention, care and treatment services for people living with HIV and AIDS. Poor adherence to recommended protocols and guidelines reduces the performance of rapid diagnostic tests, leading to misdiagnosis and poor estimation of HIV seroprevalence. This study seeks to evaluate the adherence of primary healthcare facilities in Cameroon to recommended HIV counselling and testing (HCT) procedures and the impact this may have on the reliability of HIV test results. This will be an analytical cross-sectional study involving primary healthcare facilities from all the 10 regions of Cameroon, selected by a multistaged random sampling of primary care facilities in each region. The study will last for 9 months. A structured questionnaire will be used to collect general information concerning the health facility, laboratory and other departments involved in the HCT process. The investigators will directly observe at least 10 HIV testing processes in each facility and fill out the checklist accordingly. Clearance has been obtained from the National Ethical Committee to carry out the study. Informed consent will be sought from the patients to observe the HIV testing process. The final study will be published in a peer-reviewed journal and the findings presented to health policy-makers and the general public. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  4. Sub-Transport Layer Coding

    DEFF Research Database (Denmark)

    Hansen, Jonas; Krigslund, Jeppe; Roetter, Daniel Enrique Lucani

    2014-01-01

    Packet losses in wireless networks dramatically curbs the performance of TCP. This paper introduces a simple coding shim that aids IP-layer traffic in lossy environments while being transparent to transport layer protocols. The proposed coding approach enables erasure correction while being...... oblivious to the congestion control algorithms of the utilised transport layer protocol. Although our coding shim is indifferent towards the transport layer protocol, we focus on the performance of TCP when ran on top of our proposed coding mechanism due to its widespread use. The coding shim provides gains...

  5. Improving implementation of evidence-based practice in mental health service delivery: protocol for a cluster randomised quasi-experimental investigation of staff-focused values interventions.

    Science.gov (United States)

    Williams, Virginia; Oades, Lindsay G; Deane, Frank P; Crowe, Trevor P; Ciarrochi, Joseph; Andresen, Retta

    2013-07-02

    There is growing acceptance that optimal service provision for individuals with severe and recurrent mental illness requires a complementary focus on medical recovery (i.e., symptom management and general functioning) and personal recovery (i.e., having a 'life worth living'). Despite significant research attention and policy-level support, the translation of this vision of healthcare into changed workplace practice continues to elude. Over the past decade, evidence-based training interventions that seek to enhance the knowledge, attitudes, and skills of staff working in the mental health field have been implemented as a primary redress strategy. However, a large body of multi-disciplinary research indicates disappointing rates of training transfer. There is an absence of empirical research that investigates the importance of worker-motivation in the uptake of desired workplace change initiatives. 'Autonomy' is acknowledged as important to human effectiveness and as a correlate of workplace variables like productivity, and wellbeing. To our knowledge, there have been no studies that investigate purposeful and structured use of values-based interventions to facilitate increased autonomy as a means of promoting enhanced implementation of workplace change. This study involves 200 mental health workers across 22 worksites within five community-managed organisations in three Australian states. It involves cluster-randomisation of participants within organisation, by work site, to the experimental (values) condition, or the control (implementation). Both conditions receive two days of training focusing on an evidence-based framework of mental health service delivery. The experimental group receives a third day of values-focused intervention and 12 months of values-focused coaching. Well-validated self-report measures are used to explore variables related to values concordance, autonomy, and self-reported implementation success. Audits of work files and staff work samples

  6. Services

    International Nuclear Information System (INIS)

    Hardeman, F.

    1998-01-01

    The objectives of the services section is (1) to offer complete services in health-physics measurements according to international quality standards, (2) to improve continuously these measurement techniques and to follow up international recommendations and legislation concerning the surveillance of workers, (3) to support and advise nuclear and non-nuclear industry on problems of radioactive contamination. Achievements related to gamma spectrometry, whole-body counting, beta and alpha spectrometry, dosimetry, radon measurements, calibration, instrumentation, and neutron activation analysis are described

  7. The implementation and evaluation of an evidence-based statewide prehospital pain management protocol developed using the national prehospital evidence-based guideline model process for emergency medical services.

    Science.gov (United States)

    Brown, Kathleen M; Hirshon, Jon Mark; Alcorta, Richard; Weik, Tasmeen S; Lawner, Ben; Ho, Shiu; Wright, Joseph L

    2014-01-01

    In 2008, the National Highway Traffic Safety Administration funded the development of a model process for the development and implementation of evidence-based guidelines (EBGs) for emergency medical services (EMS). We report on the implementation and evaluation of an evidence-based prehospital pain management protocol developed using this model process. An evidence-based protocol for prehospital management of pain resulting from injuries and burns was reviewed by the Protocol Review Committee (PRC) of the Maryland Institute for Emergency Medical Services Systems (MIEMSS). The PRC recommended revisions to the Maryland protocol that reflected recommendations in the EBG: weight-based dosing and repeat dosing of morphine. A training curriculum was developed and implemented using Maryland's online Learning Management System and successfully accessed by 3,941 paramedics and 15,969 BLS providers. Field providers submitted electronic patient care reports to the MIEMSS statewide prehospital database. Inclusion criteria were injured or burned patients transported by Maryland ambulances to Maryland hospitals whose electronic patient care records included data for level of EMS provider training during a 12-month preimplementation period and a 12-month postimplementation period from September 2010 through March 2012. We compared the percentage of patients receiving pain scale assessments and morphine, as well as the dose of morphine administered and the use of naloxone as a rescue medication for opiate use, before and after the protocol change. No differences were seen in the percentage of patients who had a pain score documented or the percent of patients receiving morphine before and after the protocol change, but there was a significant increase in the total dose and dose in mg/kg administered per patient. During the postintervention phase, patients received an 18% higher total morphine dose and a 14.9% greater mg/kg dose. We demonstrated that the implementation of a revised

  8. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  9. Forensic examination of ink by high-performance thin layer chromatography--the United States Secret Service Digital Ink Library.

    Science.gov (United States)

    Neumann, Cedric; Ramotowski, Robert; Genessay, Thibault

    2011-05-13

    Forensic examinations of ink have been performed since the beginning of the 20th century. Since the 1960s, the International Ink Library, maintained by the United States Secret Service, has supported those analyses. Until 2009, the search and identification of inks were essentially performed manually. This paper describes the results of a project designed to improve ink samples' analytical and search processes. The project focused on the development of improved standardization procedures to ensure the best possible reproducibility between analyses run on different HPTLC plates. The successful implementation of this new calibration method enabled the development of mathematical algorithms and of a software package to complement the existing ink library. Copyright © 2010 Elsevier B.V. All rights reserved.

  10. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  11. IVOA Credential Delegation Protocol Version 1.0

    Science.gov (United States)

    Plante, Raymond; Graham, Matthew; Rixon, Guy; Taffoni, Giuliano; Plante, Raymond; Graham, Matthew

    2010-02-01

    The credential delegation protocol allows a client program to delegate a user's credentials to a service such that that service may make requests of other services in the name of that user. The protocol defines a REST service that works alongside other IVO services to enable such a delegation in a secure manner. In addition to defining the specifics of the service protocol, this document describes how a delegation service is registered in an IVOA registry along with the services it supports. The specification also explains how one can determine from a service registration that it requires the use of a supporting delegation service.

  12. A reference model for space data system interconnection services

    Science.gov (United States)

    Pietras, John; Theis, Gerhard

    1993-01-01

    The widespread adoption of standard packet-based data communication protocols and services for spaceflight missions provides the foundation for other standard space data handling services. These space data handling services can be defined as increasingly sophisticated processing of data or information received from lower-level services, using a layering approach made famous in the International Organization for Standardization (ISO) Open System Interconnection Reference Model (OSI-RM). The Space Data System Interconnection Reference Model (SDSI-RM) incorporates the conventions of the OSIRM to provide a framework within which a complete set of space data handling services can be defined. The use of the SDSI-RM is illustrated through its application to data handling services and protocols that have been defined by, or are under consideration by, the Consultative Committee for Space Data Systems (CCSDS).

  13. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  14. Report on the behalf of the Foreign Affairs Commission on the bill project authorizing the approval of the amendment to the Montreal protocol of 16 September 1987 related to substances which impoverish the ozone layer, and its Annexe: text of the foreign affairs Commission. Nr 415

    International Nuclear Information System (INIS)

    Di Pompeo, Christophe

    2017-01-01

    The objective of the Montreal protocol, adopted in 1987, was to banish the chlorofluorocarbons (CFC) used as refrigerants since the 1930's, as they are responsible for the impoverishment of the ozone layer. While this objective has been met (the ozone layer is progressively restored), substitutes to CFC have been developed; however some of these substitutes, hydro-fluorocarbons, have been proved to be powerful greenhouse gases. The banishment of HFCs has thus been decided, leading to the Kigali amendment to the Montreal protocol. This report explains the CFC and HFC context and issues in details, and presents its examination by the French Commission of Foreign Affairs. The full text of the report is included (in an annex) at the end of the report

  15. Cultural and Contextual Adaptation of an eHealth Intervention for Youth Receiving Services for First-Episode Psychosis: Adaptation Framework and Protocol for Horyzons-Canada Phase 1.

    Science.gov (United States)

    Lal, Shalini; Gleeson, John; Malla, Ashok; Rivard, Lysanne; Joober, Ridha; Chandrasena, Ranjith; Alvarez-Jimenez, Mario

    2018-04-23

    eHealth interventions have the potential to address challenges related to access, service engagement, and continuity of care in the delivery of mental health services. However, the initial development and evaluation of such interventions can require substantive amounts of financial and human resource investments to bring them to scale. Therefore, it may be warranted to pay greater attention to policy, services, and research with respect to eHealth platforms that have the potential to be adapted for use across settings. Yet, limited attention has been placed on the methods and processes for adapting eHealth interventions to improve their applicability across cultural, geographical, and contextual boundaries. In this paper, we describe an adaptation framework and protocol to adapt an eHealth intervention designed to promote recovery and prevent relapses in youth receiving specialized services for first-episode psychosis. The Web-based platform, called Horyzons, was initially developed and tested in Australia and is now being prepared for evaluation in Canada. Service users and service providers from 2 specialized early intervention programs for first-episode psychosis located in different provinces will explore a beta-version of the eHealth intervention through focus group discussions and extended personal explorations to identify the need for, and content of contextual and cultural adaptations. An iterative consultation process will then take place with service providers and users to develop and assess platform adaptations in preparation for a pilot study with a live version of the platform. Data collection was completed in August 2017, and analysis and adaptation are in process. The first results of the study will be submitted for publication in 2018 and will provide preliminary insights into the acceptability of the Web-based platform (eg, perceived use and perceived usefulness) from service provider and service user perspectives. The project will also provide

  16. Fault recovery in the reliable multicast protocol

    Science.gov (United States)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  17. Monitoring habitat restoration projects: U.S. Fish and Wildlife Service Pacific Region Partners for Fish and Wildlife Program and Coastal Program Protocol

    Science.gov (United States)

    Woodward, Andrea; Hollar, Kathy

    2011-01-01

    species. In 2007, the Partners Program and Coastal Program developed a Strategic Plan to guide program operations and more efficiently conserve habitat by focusing partnership building and habitat improvement actions within 35 Partners Program Focus Areas and 9 Coastal Program Focus Areas (U.S. Fish and Wildlife Service, 2010). The Strategic Plan also contains four other goals: broaden and strengthen partnerships; improve information sharing and communications; enhance workforce; and increase accountability to ensure that program resources are used efficiently and effectively. This protocol will help achieve all goals of the Strategic Plan.

  18. Implementation of the ALERT algorithm, a new dispatcher-assisted telephone cardiopulmonary resuscitation protocol, in non-Advanced Medical Priority Dispatch System (AMPDS) Emergency Medical Services centres.

    Science.gov (United States)

    Stipulante, Samuel; Tubes, Rebecca; El Fassi, Mehdi; Donneau, Anne-Francoise; Van Troyen, Barbara; Hartstein, Gary; D'Orio, Vincent; Ghuysen, Alexandre

    2014-02-01

    Early bystander cardiopulmonary resuscitation (CPR) is a key factor in improving survival from out-of-hospital cardiac arrest (OHCA). The ALERT (Algorithme Liégeois d'Encadrement à la Réanimation par Téléphone) algorithm has the potential to help bystanders initiate CPR. This study evaluates the effectiveness of the implementation of this protocol in a non-Advanced Medical Priority Dispatch System area. We designed a before and after study based on a 3-month retrospective assessment of victims of OHCA in 2009, before the implementation of the ALERT protocol in Liege emergency medical communication centre (EMCC), and the prospective evaluation of the same 3 months in 2011, immediately after the implementation. At the moment of the call, dispatchers were able to identify 233 OHCA in the first period and 235 in the second. Victims were predominantly male (59%, both periods), with mean ages of 64.1 and 63.9 years, respectively. In 2009, only 9.9% victims benefited from bystander CPR, this increased to 22.5% in 2011 (p<0.0002). The main reasons for protocol under-utilisation were: assistance not offered by the dispatcher (42.3%), caller physically remote from the victim (20.6%). Median time from call to first compression, defined here as no flow time, was 253s in 2009 and 168s in 2011 (NS). Ten victims were admitted to hospital after ROSC in 2009 and 13 in 2011 (p=0.09). From the beginning and despite its under-utilisation, the ALERT protocol significantly improved the number of patients in whom bystander CPR was attempted. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  19. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  20. Wireless Intelligent Sensors Management Application Protocol-WISMAP

    Directory of Open Access Journals (Sweden)

    Antonio Jesus Yuste-Delgado

    2010-09-01

    Full Text Available Although many recent studies have focused on the development of new applications for wireless sensor networks, less attention has been paid to knowledge-based sensor nodes. The objective of this work is the development in a real network of a new distributed system in which every sensor node can execute a set of applications, such as fuzzy ruled-base systems, measures, and actions. The sensor software is based on a multi-agent structure that is composed of three components: management, application control, and communication agents; a service interface, which provides applications the abstraction of sensor hardware and other components; and an application layer protocol. The results show the effectiveness of the communication protocol and that the proposed system is suitable for a wide range of applications. As real world applications, this work presents an example of a fuzzy rule-based system and a noise pollution monitoring application that obtains a fuzzy noise indicator.

  1. Optimum hospice at home services for end-of-life care: protocol of a mixed-methods study employing realist evaluation.

    Science.gov (United States)

    Butler, Claire; Brigden, Charlotte; Gage, Heather; Williams, Peter; Holdsworth, Laura; Greene, Kay; Wee, Bee; Barclay, Stephen; Wilson, Patricia

    2018-05-16

    Hospice at home (HAH) services aim to enable patients to be cared for and die in their place of choice, if that is at home, and to achieve a 'good death'. There is a considerable range of HAH services operating in England. The published evidence focuses on evaluations of individual services which vary considerably, and there is a lack of consistency in terms of the outcome measures reported. The evidence, therefore, does not provide generalisable information, so the question 'What are the features of hospice at home service models that work, for whom, and under what circumstances?' remains unanswered. The study aims to answer this question. This is a mixed-methods study in three phases informed by realist evaluation methodology. All HAH services in England will be invited to participate in a telephone survey to enable the development of a typology of services. In the second phase, case study sites representing the different service types will collect patient data and recruit carers, service managers and commissioners to gather quantitative and qualitative data about service provision and outcomes. A third phase will synthesise and refine the results through consensus workshops. The first survey phase has university ethics approval and the second phase, Integrated Research Application System (IRAS) and Health Research Authority (HRA) approval (IRAS ID:205986, REC:17/LO/0880); the third phase does not require ethics approval. Dissemination will be facilitated by project coapplicants with established connections to national policy-making forums, in addition to publications, conference presentations and reports targeted to service providers and commissioners. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  2. Study protocol for the Integra Initiative to assess the benefits and costs of integrating sexual and reproductive health and HIV services in Kenya and Swaziland

    Directory of Open Access Journals (Sweden)

    Warren Charlotte E

    2012-11-01

    Full Text Available Abstract Background In sub-Saharan Africa (SSA there are strong arguments for the provision of integrated sexual and reproductive health (SRH and HIV services. Most HIV transmissions are sexually transmitted or associated with pregnancy, childbirth, and breastfeeding. Many of the behaviours that prevent HIV transmission also prevent sexually transmitted infections and unintended pregnancies. There is potential for integration to increase the coverage of HIV services, as individuals who use SRH services can benefit from HIV services and vice-versa, as well as increase cost-savings. However, there is a dearth of empirical evidence on effective models for integrating HIV/SRH services. The need for robust evidence led a consortium of three organizations – International Planned Parenthood Federation, Population Council and the London School of Hygiene & Tropical Medicine – to design/implement the Integra Initiative. Integra seeks to generate rigorous evidence on the feasibility, effectiveness, cost and impact of different models for delivering integrated HIV/SRH services in high and medium HIV prevalence settings in SSA. Methods/design A quasi-experimental study will be conducted in government clinics in Kenya and Swaziland – assigned into intervention/comparison groups. Two models of service delivery are investigated: integrating HIV care/treatment into 1 family planning and 2 postnatal care. A full economic-costing will be used to assess the costs of different components of service provision, and the determinants of variations in unit costs across facilities/service models. Health facility assessments will be conducted at four time-periods to track changes in quality of care and utilization over time. A two-year cohort study of family planning/postnatal clients will assess the effect of integration on individual outcomes, including use of SRH services, HIV status (known/unknown and pregnancy (planned/unintended. Household surveys within some

  3. Timing of access to secondary healthcare services for diabetes management and lower extremity amputation in people with diabetes: a protocol of a case-control study.

    LENUS (Irish Health Repository)

    Buckley, Claire M

    2013-09-03

    Lower extremity amputation (LEA) is a complication of diabetes and a marker of the quality of diabetes care. Clinical and sociodemographic determinants of LEA in people with diabetes are well known. However, the role of service-related factors has been less well explored. Early referral to secondary healthcare is assumed to prevent the occurrence of LEA. The objective of this study is to investigate a possible association between the timing of patient access to secondary healthcare services for diabetes management, as a key marker of service-related factors, and LEA in patients with diabetes.

  4. Applications and Methods Utilizing the Simple Semantic Web Architecture and Protocol (SSWAP) for Bioinformatics Resource Discovery and Disparate Data and Service Integration

    Science.gov (United States)

    Scientific data integration and computational service discovery are challenges for the bioinformatic community. This process is made more difficult by the separate and independent construction of biological databases, which makes the exchange of scientific data between information resources difficu...

  5. Impacts of online and group perinatal education: a mixed methods study protocol for the optimization of perinatal health services.

    Science.gov (United States)

    Roch, Geneviève; Borgès Da Silva, Roxane; de Montigny, Francine; Witteman, Holly O; Pierce, Tamarha; Semenic, Sonia; Poissant, Julie; Parent, André-Anne; White, Deena; Chaillet, Nils; Dubois, Carl-Ardy; Ouimet, Mathieu; Lapointe, Geneviève; Turcotte, Stéphane; Prud'homme, Alexandre; Painchaud Guérard, Geneviève; Gagnon, Marie-Pierre

    2018-05-29

    Prenatal education is a core component of perinatal care and services provided by health institutions. Whereas group prenatal education is the most common educational model, some health institutions have opted to implement online prenatal education to address accessibility issues as well as the evolving needs of future parents. Various studies have shown that prenatal education can be effective in acquisition of knowledge on labour and delivery, reducing psychological distress and maximising father's involvement. However, these results may depend on educational material, organization, format and content. Furthermore, the effectiveness of online prenatal education compared to group prenatal education remains unclear in the literature. This project aims to evaluate the impacts of group prenatal education and online prenatal education on health determinants and users' health status, as well as on networks of perinatal educational services maintained with community-based partners. This multipronged mixed methods study uses a collaborative research approach to integrate and mobilize knowledge throughout the process. It consists of: 1) a prospective cohort study with quantitative data collection and qualitative interviews with future and new parents; and 2) a multiple case study integrating documentary sources and interviews with stakeholders involved in the implementation of perinatal information service networks and collaborations with community partners. Perinatal health indicators and determinants will be compared between prenatal education groups (group prenatal education and online prenatal education) and standard care without these prenatal education services (control group). This study will provide knowledge about the impact of online prenatal education as a new technological service delivery model compared to traditional group prenatal education. Indicators related to the complementarity of these interventions and those available in community settings will

  6. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  7. Use of a standardized protocol to identify factors affecting the efficiency of artificial insemination services for cattle through progesterone measurement in fourteen countries

    International Nuclear Information System (INIS)

    Garcia, M.; Goodger, W.J.; Bennett, T.; Perera, B.M.A.O.

    2001-01-01

    The aim of this co-ordinated research project (CRP) was to quantify the main factors limiting the efficiency of artificial insemination (AI) services in cattle under the prevailing conditions of developing countries, in order to recommend suitable strategies for improving conception rates (CR) and the level of usage of AI by cattle farmers. A standardized approach was used in 14 countries over a five-year period (1995-1999). The countries were: Bangladesh, China, Indonesia, Myanmar, Pakistan, Sri Lanka and Vietnam in Asia; and Argentina, Chile, Costa Rica, Cuba, Peru, Uruguay and Venezuela in Latin America. A minimum of 500 cows undergoing first insemination after calving were expected to be monitored in each country. Data regarding farms, AI technicians, semen used, cow inseminated, characteristics of the heat expression and factors related to the insemination were recorded. Three milk samples (or blood samples for dairy heifers and beef cows) were collected for each service to measure progesterone by radioimmunoassay. These were collected on the day of service (day 0) and on days 10-12 and 22-24 after service. Field and laboratory data were recorded in the computer package AIDA (Artificial Insemination Database Application) which was developed for this CRP. The study established the current status of AI services at selected locations in participating countries and showed important differences between Asian and Latin American farming systems. The mean (±s.d.) of the interval from calving to first service for 7992 observations was 120.0 ± 82.1 days (median 95 days) with large differences between countries (P<0.05). The overall CR to first service was 40.9% (n=8196), the most efficient AI services being the ones in Vietnam (62.1%), Chile (61.9%) and Myanmar (58.9%). The interval between the first and second service was 44.6 ± 44.4 days (n=1959). Progesterone data in combination with clinical findings showed that 17.3% of the services were performed in non

  8. Decision-making experiences of family members of older adults with moderate dementia towards community and residential care home services: a grounded theory study protocol.

    Science.gov (United States)

    Le Low, Lisa Pau; Lam, Lai Wah; Fan, Kim Pong

    2017-06-05

    Caring and supporting older people with dementia have become a major public health priority. Recent reports have also revealed a diminishing number of family carers to provide dementia care in the future. Carers who are engaged in the caring role are known to bear significant psychological, practical and economic challenges as the disease advances over time. Seemingly, evidence indicates that the burden of care can be relieved by formal services. This study aims to explore decision-making experiences of family members of older adults with moderate dementia towards the use of community support (CS) and residential care home (RCH) services. A large multi-site constructivist grounded theory in a range of non-government organizations and a private aged home will frame this Hong Kong study. Purposive sampling will begin the recruitment of family members, followed by theoretical sampling. It is estimated that more than 100 family members using CS and RCH services will participate in an interview. The process of successive constant comparative analysis will be undertaken. The final product, a theory, will generate an integrated and comprehensive conceptual understanding which will explain the processes associated with decision-making of family members for dementia sufferers. Deeper understanding of issues including, but not exclusive to, service needs, expectations and hopes among family carers for improving service support to serve dementia sufferers in CS and RCH services will also be revealed. Importantly, this study seeks to illustrate the practical and strategic aspects of the theory and how it may be useful to transfer its applicability to various service settings to better support those who deliver formal and informal care to the dementia population.

  9. 嵌入服务通告与发现的ZRP协议%Embedded Service Advertisement and Discovery in ZRP Protocol

    Institute of Scientific and Technical Information of China (English)

    李志远

    2008-01-01

    服务通告和发现在MANET(Mobile Ad hoc Networks)网络中,是一个十分重要的组成部分.现有的服务通告和发现协议不是为MANET网络设计的.文章提出了一个适合MANET、基于ZRP(Zone Routing Protocol)的服务通告及发现协议.服务的通告与发现存在于ZRP路由控制分组中,避免了周期性的通告给MANET网络带来的负载,节约了有限的带宽和设备的能耗.

  10. A cross-layer communication framework for wireless networked control systems

    NARCIS (Netherlands)

    Israr, N.; Scanlon, W.G.; Irwin, G.W.

    2009-01-01

    This paper presents a robust, dynamic cross-layer wireless communication architecture for wireless networked control systems. Each layer in the proposed protocol architecture contributes to the overall goal of reliable, energy efficient communication. The protocol stack also features a

  11. Preventative tele-health supported services for early stage chronic obstructive pulmonary disease: a protocol for a pragmatic randomized controlled trial pilot

    Directory of Open Access Journals (Sweden)

    Mountain Gail A

    2011-01-01

    Full Text Available Abstract Background Chronic Obstructive Pulmonary Disease (COPD is a prevalent debilitating long term condition. It is the second most common cause of emergency admission to hospital in the UK and remains one of the most costly conditions to treat through acute care. Tele-health monitoring offers potential to reduce the rates of re-hospitalisation and emergency department visits and improve quality of life for people with COPD. However, the current evidence base to support technology adoption and implementation is limited and the resource implications for implementing tele-health in practice can be very high. This trial will employ tele-health monitoring in a preventative capacity for patients diagnosed with early stage COPD following discharge from hospital to determine whether it reduces their need for additional health service support or hospital admission and improves their quality of life. Methods/Design We describe a pilot study for a two arm, one site randomized controlled trial (RCT to determine the effect of tele-health monitoring on self-management, quality of life and patient satisfaction. Sixty patients who have been discharged from one acute trust with a primary diagnosis of COPD and who have agreed to receive community clinical support following discharge from acute care will be randomly assigned to one of two groups: (a Tele-health supported Community COPD Service; or (b Usual Care. The tele-health supported service involves the patient receiving two home visits with a specialist COPD clinician (nurse or physiotherapist then participating in daily tele-monitoring over an eight week period. Usual care consists of six home visits to the patient by specialist COPD clinicians again over eight successive weeks. Health status and quality of life data for all participants will be measured at baseline, on discharge from the service and at six months post discharge from the service. Discussion The tele-health service under study is a

  12. Integrated collaborative care teams to enhance service delivery to youth with mental health and substance use challenges: protocol for a pragmatic randomised controlled trial.

    Science.gov (United States)

    Henderson, Joanna L; Cheung, Amy; Cleverley, Kristin; Chaim, Gloria; Moretti, Myla E; de Oliveira, Claire; Hawke, Lisa D; Willan, Andrew R; O'Brien, David; Heffernan, Olivia; Herzog, Tyson; Courey, Lynn; McDonald, Heather; Grant, Enid; Szatmari, Peter

    2017-02-06

    Among youth, the prevalence of mental health and addiction (MHA) disorders is roughly 20%, yet youth are challenged to access evidence-based services in a timely fashion. To address MHA system gaps, this study tests the benefits of an Integrated Collaborative Care Team (ICCT) model for youth with MHA challenges. A rapid, stepped-care approach geared to need in a youth-friendly environment is expected to result in better youth MHA outcomes. Moreover, the ICCT approach is expected to decrease service wait-times, be more youth-friendly and family-friendly, and be more cost-effective, providing substantial public health benefits. In partnership with four community agencies, four adolescent psychiatry hospital departments, youth and family members with lived experience of MHA service use, and other stakeholders, we have developed an innovative model of collaborative, community-based service provision involving rapid access to needs-based MHA services. A total of 500 youth presenting for hospital-based, outpatient psychiatric service will be randomised to ICCT services or hospital-based treatment as usual, following a pragmatic randomised controlled trial design. The primary outcome variable will be the youth's functioning, assessed at intake, 6 months and 12 months. Secondary outcomes will include clinical change, youth/family satisfaction and perception of care, empowerment, engagement and the incremental cost-effectiveness ratio (ICER). Intent-to-treat analyses will be used on repeated-measures data, along with cost-effectiveness and cost-utility analyses, to determine intervention effectiveness. Research Ethics Board approval has been received from the Centre for Addiction and Mental Health, as well as institutional ethical approval from participating community sites. This study will be conducted according to Good Clinical Practice guidelines. Participants will provide informed consent prior to study participation and data confidentiality will be ensured. A data

  13. Task-shifting Using a Pain Management Protocol in an Emergency Care Service: Nurses' Perception through the Eye of the Rogers's Diffusion of Innovation Theory.

    Science.gov (United States)

    Hadorn, Fabienne; Comte, Pascal; Foucault, Eliane; Morin, Diane; Hugli, Olivier

    2016-02-01

    It has been shown that over 70% of patients waiting in emergency departments (EDs) do not receive analgesics, despite the fact that more than 78% complain of pain. A clinical innovation in the form of a pain management protocol that includes task-shifting has been implemented in the ED of a university hospital in Switzerland in order to improve pain-related outcomes in patients. This innovation involves a change in clinical practice for physicians and nurses. The aim of this study is to explore nurses' perceptions on how well this innovation is adopted. This descriptive correlational study took place in the ED of a Swiss university hospital; the hospital provides healthcare for the city, the canton, and adjoining cantons. A convenience sample of 37 ED nurses participated. They were asked to complete a questionnaire comprising 56 statements based on Rogers's "Diffusion of Innovation" theory. Nurses' opinions (on a 1-10 Likert scale) indicate that the new protocol benefits the ED (mean [M] = 7.4, standard deviation [SD] = 1.21), is compatible with nursing roles (M = 8.0, SD = 1.9), is not too complicated to apply (M = 2.7, SD = 1.7), provides observable positive effects in patients (M = 7.0, SD = 1.28), and is relatively easy to introduce into daily practice (M = 6.5, SD = 1.0). Further studies are now needed to examine patients' experiences of this innovation. Copyright © 2016 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  14. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  15. Modelling multimedia teleservices with OSI upper layers framework: Short paper

    Science.gov (United States)

    Widya, I.; Vanrijssen, E.; Michiels, E.

    The paper presents the use of the concepts and modelling principles of the Open Systems Interconnection (OSI) upper layers structure in the modelling of multimedia teleservices. It puts emphasis on the revised Application Layer Structure (OSI/ALS). OSI/ALS is an object based reference model which intends to coordinate the development of application oriented services and protocols in a consistent and modular way. It enables the rapid deployment and integrated use of these services. The paper emphasizes further on the nesting structure defined in OSI/ALS which allows the design of scalable and user tailorable/controllable teleservices. OSI/ALS consistent teleservices are moreover implementable on communication platforms of different capabilities. An analysis of distributed multimedia architectures which can be found in the literature, confirms the ability of the OSI/ALS framework to model the interworking functionalities of teleservices.

  16. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  17. A new primary dental care service compared with standard care for child and family to reduce the re-occurrence of childhood dental caries (Dental RECUR): study protocol for a randomised controlled trial.

    Science.gov (United States)

    Pine, Cynthia; Adair, Pauline; Burnside, Girvan; Robinson, Louise; Edwards, Rhiannon Tudor; Albadri, Sondos; Curnow, Morag; Ghahreman, Marjan; Henderson, Mary; Malies, Clare; Wong, Ferranti; Muirhead, Vanessa; Weston-Price, Sally; Whitehead, Hilary

    2015-11-04

    In England and Scotland, dental extraction is the single highest cause of planned admission to the hospital for children under 11 years. Traditional dental services have had limited success in reducing this disease burden. Interventions based on motivational interviewing have been shown to impact positively dental health behaviours and could facilitate the prevention of re-occurrence of dental caries in this high-risk population. The objective of the study is to evaluate whether a new, dental nurse-led service, delivered using a brief negotiated interview based on motivational interviewing, is a more cost-effective service than treatment as usual, in reducing the re-occurrence of dental decay in young children with previous dental extractions. This 2-year, two-arm, multicentre, randomised controlled trial will include 224 child participants, initially aged 5 to 7 years, who are scheduled to have one or more primary teeth extracted for dental caries under general anaesthesia (GA), relative analgesia (RA: inhalation sedation) or local anaesthesia (LA). The trial will be conducted in University Dental Hospitals, Secondary Care Centres or other providers of dental extraction services across the United Kingdom. The intervention will include a brief negotiated interview (based on the principles of motivational interviewing) delivered between enrollment and 6 weeks post-extraction, followed by directed prevention in primary dental care. Participants will be followed up for 2 years. The main outcome measure will be the dental caries experienced by 2 years post-enrollment at the level of dentine involvement on any tooth in either dentition, which had been caries-free at the baseline assessment. The participants are a hard-to-reach group in which secondary prevention is a challenge. Lack of engagement with dental care makes the children and their families scheduled for extraction particularly difficult to recruit to an RCT. Variations in service delivery between sites have

  18. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  19. Effects of Just-in-Time Online Training on Knowledge and Application of the Sheltered Instruction Observation Protocol (SIOP®) Model among In-Service Teachers

    Science.gov (United States)

    Bose, Devshikha

    2012-01-01

    The purpose of this study was to determine whether there was a difference in knowledge and application of the SIOP ® Model among in-service teachers who participated in an online professional development course on the SIOP® Model. Although these teachers all participated in the same course, information on the number of English Language Learners…

  20. The provision and impact of online patient access to their electronic health records (EHR) and transactional services on the quality and safety of health care: systematic review protocol.

    Science.gov (United States)

    Mold, Freda; Ellis, Beverley; de Lusignan, Simon; Sheikh, Aziz; Wyatt, Jeremy C; Cavill, Mary; Michalakidis, Georgios; Barker, Fiona; Majeed, Azeem; Quinn, Tom; Koczan, Phil; Avanitis, Theo; Gronlund, Toto Anne; Franco, Christina; McCarthy, Mary; Renton, Zoë; Chauhan, Umesh; Blakey, Hannah; Kataria, Neha; Jones, Simon; Rafi, Imran

    2012-01-01

    Innovators have piloted improvements in communication, changed patterns of practice and patient empowerment from online access to electronic health records (EHR). International studies of online services, such as prescription ordering, online appointment booking and secure communications with primary care, show good uptake of email consultations, accessing test results and booking appointments; when technologies and business process are in place. Online access and transactional services are due to be rolled out across England by 2015; this review seeks to explore the impact of online access to health records and other online services on the quality and safety of primary health care. To assess the factors that may affect the provision of online patient access to their EHR and transactional services, and the impact of such access on the quality and safety of health care. Two reviewers independently searched 11 international databases during the period 1999-2012. A range of papers including descriptive studies using qualitative or quantitative methods, hypothesis-testing studies and systematic reviews were included. A detailed eligibility criterion will be used to shape study inclusion. A team of experts will review these papers for eligibility, extract data using a customised extraction form and use the Grading of Recommendations Assessment, Development and Evaluation (GRADE) instrument to determine the quality of the evidence and the strengths of any recommendation. Data will then be descriptively summarised and thematically synthesised. Where feasible, we will perform a quantitative meta-analysis. Prospero (International Prospective Register of Systematic Reviews) registration number: crd42012003091.

  1. Software Modules for the Proximity-1 Space Link Interleaved Time Synchronization (PITS) Protocol

    Science.gov (United States)

    Woo, Simon S.; Veregge, John R.; Gao, Jay L.; Clare, Loren P.; Mills, David

    2012-01-01

    The Proximity-1 Space Link Interleaved Time Synchronization (PITS) protocol provides time distribution and synchronization services for space systems. A software prototype implementation of the PITS algorithm has been developed that also provides the test harness to evaluate the key functionalities of PITS with simulated data source and sink. PITS integrates time synchronization functionality into the link layer of the CCSDS Proximity-1 Space Link Protocol. The software prototype implements the network packet format, data structures, and transmit- and receive-timestamp function for a time server and a client. The software also simulates the transmit and receive-time stamp exchanges via UDP (User Datagram Protocol) socket between a time server and a time client, and produces relative time offsets and delay estimates.

  2. Multistrategy childcare-based intervention to improve compliance with nutrition guidelines versus usual care in long day care services: a study protocol for a randomised controlled trial

    Science.gov (United States)

    Seward, Kirsty; Finch, Meghan; Wiggers, John; Wyse, Rebecca; Jones, Jannah; Gillham, Karen; Yoong, Sze Lin

    2016-01-01

    Introduction Interventions to improve child diet are recommended as dietary patterns developed in childhood track into adulthood and influence the risk of chronic disease. For child health, childcare services are required to provide foods to children consistent with nutrition guidelines. Research suggests that foods and beverages provided by services to children are often inconsistent with nutrition guidelines. The primary aim of this study is to assess, relative to a usual care control group, the effectiveness of a multistrategy childcare-based intervention in improving compliance with nutrition guidelines in long day care services. Methods and analysis The study will employ a parallel group randomised controlled trial design. A sample of 58 long day care services that provide all meals (typically includes 1 main and 2 mid-meals) to children while they are in care, in the Hunter New England region of New South Wales, Australia, will be randomly allocated to a 6-month intervention to support implementation of nutrition guidelines or a usual care control group in a 1:1 ratio. The intervention was designed to overcome barriers to the implementation of nutrition guidelines assessed using the theoretical domains framework. Intervention strategies will include the provision of staff training and resources, audit and feedback, ongoing support and securing executive support. The primary outcome of the trial will be the change in the proportion of long day care services that have a 2-week menu compliant with childcare nutrition guidelines, measured by comprehensive menu assessments. As a secondary outcome, child dietary intake while in care will also be assessed. To assess the effectiveness of the intervention, the measures will be undertaken at baseline and ∼6 months postbaseline. Ethics and dissemination The study was approved by the Hunter New England Human Research Ethics Committee. Study findings will be disseminated widely through peer-reviewed publications. PMID

  3. MOS-Based Multiuser Multiapplication Cross-Layer Optimization for Mobile Multimedia Communication

    Directory of Open Access Journals (Sweden)

    Shoaib Khan

    2007-01-01

    Full Text Available We propose a cross-layer optimization strategy that jointly optimizes the application layer, the data-link layer, and the physical layer of a wireless protocol stack using an application-oriented objective function. The cross-layer optimization framework provides efficient allocation of wireless network resources across multiple types of applications run by different users to maximize network resource usage and user perceived quality of service. We define a novel optimization scheme based on the mean opinion score (MOS as the unifying metric over different application classes. Our experiments, applied to scenarios where users simultaneously run three types of applications, namely voice communication, streaming video and file download, confirm that MOS-based optimization leads to significant improvement in terms of user perceived quality when compared to conventional throughput-based optimization.

  4. Triple Play Service and IPTV Services Offered within it

    Directory of Open Access Journals (Sweden)

    Dagmar Pajdusakova

    2008-01-01

    Full Text Available This paper deals with Triple Play multimedia service and figures its architecture. Triple Play offers voice, video and data services together in one customer connection. There is offered IPTV (Internet Protocol Television service within this service, where we can include also Video on Demand service and other different additional services. In the paper is described classification of Video on Demand services.

  5. Development, effectiveness and cost-effectiveness of a new out-patient Breathlessness Support Service: study protocol of a phase III fast-track randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Bausewein Claudia

    2012-09-01

    Full Text Available Abstract Background Breathlessness is a common and distressing symptom affecting many patients with advanced disease both from malignant and non-malignant origin. A combination of pharmacological and non-pharmacological measures is necessary to treat this symptom successfully. Breathlessness services in various compositions aim to provide comprehensive care for patients and their carers by a multiprofessional team but their effectiveness and cost-effectiveness have not yet been proven. The Breathlessness Support Service (BSS is a newly created multiprofessional and interdisciplinary outpatient service at a large university hospital in South East London. The aim of this study is to develop and evaluate the effectiveness and cost effectiveness of this multidisciplinary out–patient BSS for the palliation of breathlessness, in advanced malignant and non-malignant disease. Methods The BSS was modelled based on the results of qualitative and quantitative studies, and systematic literature reviews. A randomised controlled fast track trial (RCT comprising two groups: 1 intervention (immediate access to BSS in addition to standard care; 2 control group (standard best practice and access to BSS after a waiting time of six weeks. Patients are included if suffering from breathlessness on exertion or at rest due to advanced disease such as cancer, chronic obstructive pulmonary disease (COPD, chronic heart failure (CHF, interstitial lung disease (ILD or motor neurone disease (MND that is refractory to maximal optimised medical management. Both quantitative and qualitative outcomes are assessed in face to-face interviews at baseline, after 6 and 12 weeks. The primary outcome is patients' improvement of mastery of breathlessness after six weeks assessed on the Chronic Respiratory Disease Questionnaire (CRQ. Secondary outcomes for patients include breathlessness severity, symptom burden, palliative care needs, service use, and respiratory measures (spirometry

  6. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  7. Can the Medical-nursing Combined Care Promote the Accessibility of Health Services for the Elderly in Nursing Home? A Study Protocol of Analysis of the Effectiveness Regarding Health Service Utilization, Health Status and Satisfaction with Care.

    Science.gov (United States)

    Bao, J; Wang, X-J; Yang, Y; Dong, R-Q; Mao, Z-F

    2015-12-01

    Currently, segmentation of healthcare and daily care for the elderly living in nursing homes usually results in the elderly not getting medical treatment timely and effectively. The medical-nursing combined care, which has been put into practice in several areas in China, is developed to enhance the accessibility of healthcare for the elderly. The aim of the study is to explore the effectiveness of the new care service, based on Andersen model, regarding health service utilization, health status and service satisfaction. The effectiveness of medical-nursing combined care will be measured in a cross-sectional study in nine nursing homes in Jianghan District, Wuhan, China, with 1067 old residents expected to participate. The questionnaire containing items of demographics, health service use, service satisfaction and instrument of SF-36 V2 is developed based on the conceptual framework of Andersen behaviour model of health service utilization. Descriptive analysis, variance analysis, multiple factors analysis, and correlation analysis will be performed to compare the sociological characteristics, health service use, health status and service satisfaction of the elderly living in different modes of nursing homes, to explore the influence factors of care effectiveness, as well as to study the relationship between health behaviour and health outcomes. The study design of analysing the effects of medical-nursing combined care and performing the horizontal comparison among the nursing homes under the framework of Andersen model is blazing new trails. Recruitment and design of questionnaire are important issues. Successful data collection and quality control are also necessary. Taking these into account, this study is estimated to provide evidence for the effectiveness of medical-nursing combined care service in China.

  8. Experiences of the home-dwelling elderly in the use of telecare in home care services: a qualitative systematic review protocol.

    Science.gov (United States)

    Karlsen, Cecilie; Ludvigsen, Mette S; Moe, Carl E; Haraldstad, Kristin; Thygesen, Elin

    2017-05-01

    The objective of this systematic review is to identify and synthesize the best evidence on the home-dwelling elderly's experiences with the use of telecare in home care services. Furthermore, the study will identify experiences with telecare devices and examine what beliefs the home-dwelling elderly hold regarding the impact of telecare on the ability to age in place.Review question 1: How do the home-dwelling elderly experience the use of telecare in the context of home care services?Review question 2: How do the home-dwelling elderly experience telecare devices?Review question 3: What beliefs do the home-dwelling elderly hold regarding the impact of telecare on the ability to age in place?

  9. The provision and impact of online patient access to their electronic health records (EHR and transactional services on the quality and safety of health care: systematic review protocol

    Directory of Open Access Journals (Sweden)

    Freda Mold

    2013-09-01

    Full Text Available Background Innovators have piloted improvements in communication, changed patterns of practice and patient empowerment from online access to electronic health records (EHR. International studies of online services, such as prescription ordering, online appointment booking and secure communications with primary care, show good uptake of email consultations, accessing test results and booking appointments; when technologies and business process are in place. Online access and transactional services are due to be rolled out across England by 2015; this review seeks to explore the impact of online access to health records and other online services on the quality and safety of primary health care.Objective To assess the factors that may affect the provision of online patient access to their EHR and transactional services, and the impact of such access on the quality and safety of health care.Method Two reviewers independently searched 11 international databases during the period 1999–2012. A range of papers including descriptive studies using qualitative or quantitative methods, hypothesis-testing studies and systematic reviews were included. A detailed eligibility criterion will be used to shape study inclusion .A team of experts will review these papers for eligibility, extract data using a customised extraction form and use the Grading of Recommendations Assessment, Development and Evaluation (GRADE instrument to determine the quality of the evidence and the strengths of any recommendation. Data will then be descriptively summarised and thematically synthesised. Where feasible, we will perform a quantitative meta-analysis.Prospero (International Prospective Register of Systematic Reviews registration number: crd42012003091.

  10. Dialectical behaviour therapy for treating adults and adolescents with emotional and behavioural dysregulation: study protocol of a coordinated implementation in a publicly funded health service.

    LENUS (Irish Health Repository)

    Flynn, Daniel

    2018-02-26

    In the Republic of Ireland, borderline personality disorder (BPD) is a feature of approximately 11-20% of clinical presentations to outpatient clinics within mental health services. These estimates are similar to other countries including the UK and USA. Dialectical behaviour therapy (DBT) is an intervention with a growing body of evidence that demonstrates its efficacy in treating individuals diagnosed with BPD. While a number of randomised controlled trials (RCTs) have demonstrated the efficacy of DBT, there is limited research which evaluates the effectiveness of this model when applied to real world settings. Funding was secured to co-ordinate DBT training in public community-based mental health services across Ireland. As no other study has evaluated a co-ordinated national implementation of DBT, the current study proposes to investigate the effectiveness of DBT in both adult and child\\/adolescent community mental health services across Ireland, evaluate the coordinated implementation of DBT at a national level, and complete a comprehensive economic evaluation comparing DBT versus treatment-as-usual.

  11. Early prediction of typical outcome and mild developmental delay for prioritisation of service delivery for very preterm and very low birthweight infants: a study protocol

    Science.gov (United States)

    Caesar, Rebecca; Boyd, Roslyn N; Colditz, Paul; Cioni, Giovani; Ware, Robert S; Salthouse, Kaye; Doherty, Julie; Jackson, Maxine; Matthews, Leanne; Hurley, Tom; Morosini, Anthony; Thomas, Clare; Camadoo, Laxmi; Baer, Erica

    2016-01-01

    Introduction Over 80% of very preterm (development (TD) or mild developmental delay (MDD) in multiple domains. As differentiation between TD and MDD can be difficult, infants with MDD often miss opportunities for intervention. For many clinicians, the ongoing challenge is early detection of MDD without over servicing the population. This study aims to: (1) identify early clinical biomarkers for use in this population to predict and differentiate between TD and MDD at 24 months corrected age. (2) Determine the extent to which family and caregiver factors will contribute to neurodevelopmental and behavioural outcomes. Methods and analysis Participants will be a prospective cohort of 90 infants (Toddler Development—Third Edition (Bayley III). Longitudinal trajectories of early assessment findings will be examined to determine any predictive relationship with motor and cognitive outcomes at 24 months c.a. Published data of a cohort of Australian children assessed with the Bayley III at 24 months c.a will provide a reference group of term-born controls. Ethics Ethical approval has been obtained from the Queensland Children's Health Services Human Research Ethics Committee (HREC/13/QRCH/66), the University of Queensland (2013001019) and the Sunshine Coast Hospital and Health Service, SC-Research Governance (SSA/13/QNB/66). Publication of all study outcomes will be in peer-reviewed journals. Trial registration number ACTRN12614000480684; Pre-results. PMID:27377633

  12. Cognitive remediation therapy (CRT) in a specialist inpatient eating disorder service for children and adolescents: CAN-CRT study protocol for a pilot randomised controlled trial.

    Science.gov (United States)

    Giombini, Lucia; Nesbitt, Sophie; Cox, Hannah; Foxall, Anna; Sharia, Teo; Easter, Abigail; Tchanturia, Kate

    2018-03-26

    Research on treatments for young people (YP) with anorexia nervosa (AN) is scarce. Evidence supports the use of cognitive remediation therapy (CRT) to improve central coherence and set-shifting, inefficiencies that can negatively impact on prognosis. The study aims to evaluate the feasibility of individual CRT in an inpatient setting for YP aged 10-18 years with AN and to qualitatively examine YP's and their parents experiences. In a single-centre, pilot, randomised controlled trial, 80 patients aged 10-18 years with AN will be randomly allocated to the immediate or delayed CRT group, in addition to standard treatment. A repeated measures design will be conducted across 3 time points. The data will provide evidence regarding the feasibility of individual CRT in YP with AN, informing directions of further development of CRT. The study is in preparation for a definitive randomised controlled trial. The aim of this manuscript is to describe the study protocol. Copyright © 2018 John Wiley & Sons, Ltd and Eating Disorders Association.

  13. [Monitoring of a protocol for the adequacy of the pharmaceutical form of the oral medication to the degree of dysphagia in patients hospitalized in an internal medicine service].

    Science.gov (United States)

    García Aparicio, J; Herrero Herrero, J I; Moreno Gómez, A Ma; Martínez Sotelo, J; González del Valle, E; Fernández de la Fuente, Ma A

    2011-01-01

    The oral route is the most convenient way of administering medication, although it may not be safe. Dysphagia is one of the factors rendering difficult a proper feeding and administration of medication. to improve the administration of oral medication in patients with dysphagia by changing the pharmaceutical formulation of the principles prescribed to tolerable textures. Pilot project for the application of a dysphagia protocol that included the patients admitted to the Internal Medicine Unit at Los Montalvos Center for 4 months. After detecting the suspicion of dysphagia, a dysphagia-viscosity test was applied to know the tolerated textures. Then, the pharmaceutical formulations were adapted and the manipulation instructions for the drugs were indicated for their proper administration. 23 out of 627 admitted patients were included, with a mean age of 85 years (σ±7.4). The pathologies implicated in dysphagia were: dementia (65.2%); cerebrovascular disease (30.4%), and Parkinson's disease (4.4%). The best texture for drug intake was a "pudding" in 48.0%. 43 active ingredients were reviewed and 134 interventions were performed: in 41% of the cases, swallowing was made easier by mixing the drug with the food and in 59% water and a thickener were used. 94% of the recommendations were considered to be appropriate. the adaptation of the pharmaceutical formulations to the degree of dysphagia impacts on the improvement of healthcare quality by implementing safety in drug prescription and administration processes.

  14. CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, M. G.; Kabir, M. Hasnat; Rahim, M. Sajjadur; Ullah, Sk. Enayet

    2012-01-01

    A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. We introduce cluster head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to collect information from target field. On rotation basis, a head-set member receives data from the neighbor nodes and transmits the aggregated results to the distance base station. This protocol ...

  15. A falls prevention programme to improve quality of life, physical function and falls efficacy in older people receiving home help services: study protocol for a randomised controlled trial.

    Science.gov (United States)

    Bjerk, Maria; Brovold, Therese; Skelton, Dawn A; Bergland, Astrid

    2017-08-14

    Falls and fall-related injuries in older adults are associated with great burdens, both for the individuals, the health care system and the society. Previous research has shown evidence for the efficiency of exercise as falls prevention. An understudied group are older adults receiving home help services, and the effect of a falls prevention programme on health-related quality of life is unclear. The primary aim of this randomised controlled trial is to examine the effect of a falls prevention programme on quality of life, physical function and falls efficacy in older adults receiving home help services. A secondary aim is to explore the mediating factors between falls prevention and health-related quality of life. The study is a single-blinded randomised controlled trial. Participants are older adults, aged 67 or older, receiving home help services, who are able to walk with or without walking aids, who have experienced at least one fall during the last 12 months and who have a Mini Mental State Examination of 23 or above. The intervention group receives a programme, based on the Otago Exercise Programme, lasting 12 weeks including home visits and motivational telephone calls. The control group receives usual care. The primary outcome is health-related quality of life (SF-36). Secondary outcomes are leg strength, balance, walking speed, walking habits, activities of daily living, nutritional status and falls efficacy. All measurements are performed at baseline, following intervention at 3 months and at 6 months' follow-up. Sample size, based on the primary outcome, is set to 150 participants randomised into the two arms, including an estimated 15-20% drop out. Participants are recruited from six municipalities in Norway. This trial will generate new knowledge on the effects of an exercise falls prevention programme among older fallers receiving home help services. This knowledge will be useful for clinicians, for health managers in the primary health care service

  16. Protocol and Topology Issues for Wide-Area Satellite Interconnection of Terrestrial Optical LANs

    Science.gov (United States)

    Parraga, N.

    2002-01-01

    system for multimedia services. EuroSkyWay uses a GEO satellite with onboard switching. It has its own proprietary protocol stack for data link control (DLC), logical link control (LLC) and layer 3 functions such as resource management, call admission control and authentication. Special attention is paid to the IP interworking with Layer 3 function since IP does not support connection set-up and session protocols, thus proper interworking functions with IP signaling protocols for resource reservation routing such as RSVP, BGP, and ICMP need to be developed. Whereas the EuroSkyWay system is an representative for a meshed topology, DVB-RCS systems have usually star configuration with a central hub station. Different data streams are distinguished by program identifiers (PIDs). Recent proposals aim at the evolution of DVB-RCS towards a fully meshed structure. The paper will also discuss the protocol architecture for interconnect SONET LANs over these systems. Finally, a performance comparison of the different solutions will be given in terms of cell overhead rate and signalling effort for selected scenarios.

  17. Can Internet-Based Sexual Health Services Increase Diagnoses of Sexually Transmitted Infections (STI)? Protocol for a Randomized Evaluation of an Internet-Based STI Testing and Results Service.

    Science.gov (United States)

    Wilson, Emma; Free, Caroline; Morris, Tim P; Kenward, Michael G; Syred, Jonathan; Baraitser, Paula

    2016-01-15

    Ensuring rapid access to high quality sexual health services is a key public health objective, both in the United Kingdom and internationally. Internet-based testing services for sexually transmitted infections (STIs) are considered to be a promising way to achieve this goal. This study will evaluate a nascent online STI testing and results service in South East London, delivered alongside standard face-to-face STI testing services. The aim of this study is to establish whether an online testing and results services can (1) increase diagnoses of STIs and (2) increase uptake of STI testing, when delivered alongside standard face-to-face STI testing services. This is a single-blind randomized controlled trial. We will recruit 3000 participants who meet the following eligibility criteria: 16-30 years of age, resident in the London boroughs of Lambeth and Southwark, having at least one sexual partner in the last 12 months, having access to the Internet and willing to take an STI test. People unable to provide informed consent and unable to read and understand English (the websites will be in English) will be excluded. Baseline data will be collected at enrolment. This includes participant contact details, demographic data (date of birth, gender, ethnicity, and sexual orientation), and sexual health behaviors (last STI test, service used at last STI test and number of sexual partners in the last 12 months). Once enrolled, participants will be randomly allocated either (1) to an online STI testing and results service (Sexual Health 24) offering postal self-administered STI kits for chlamydia, gonorrhoea, syphilis, and HIV; results via text message (short message service, SMS), except positive results for HIV, which will be delivered by phone; and direct referrals to local clinics for treatment or (2) to a conventional sexual health information website with signposting to local clinic-based sexual health services. Participants will be free to use any other interventions

  18. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  19. Effect of Mobile-health on maternal health care service utilization in Eastern Ethiopia: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Gelano, Tilayie Feto; Assefa, Nega; Bacha, Yadeta Dessie; Mahamed, Afendi Abdi; Roba, Kedir Teji; Hambisa, Mitiku Teshome

    2018-02-12

    Globally, the rapid development of mobile technology has created new ways of addressing public health challenges and shifted the paradigm of health care access and delivery. The primary aim of this study is to examine the effectiveness of Mobile-health on maternal health care service utilization in Eastern Ethiopia. Through, a cluster-randomized controlled trial, 640 participants will be selected based on their districts and respective health centers as the unit of randomization. All pregnant mothers who fulfill the inclusion criteria will be allocated to a mobile-phone-based intervention and existing standard of care or control with a 1:1 allocation ratio. The intervention consists of a series of 24 voice messages which will be sent every 2 weeks from the date of enrollment until the close-out time. The control group will receive existing standard of care without voice messages. Data related to outcome variables will be assessed at three phases of the data collection periods. The primary outcome measures will be the proportion of antenatal care visits and institutional delivery, whereas the secondary outcome measures will consist of the proportion of postnatal care visits and pregnancy outcomes. Risk ratios will be used to a measure the effect of intervention on the outcomes which will be estimated with 95% confidence interval and all the analyses will be done with consideration of clustering effect. This study should generate evidence on the effectiveness of mobile-phone-based voice messages for the early initiation of maternal health care service use and its uptake. It has been carefully designed with the assumption of obtaining higher levels of maternal health care service use among the treatment group as compared to the control. Pan African Clinical Trial Registry, www.panctr.org , ID: PACTR201704002216259 . Registered on 28 April 2017.

  20. Developing human rights based indicators to support country monitoring of rehabilitation services and programmes for people with disabilities: a study protocol.

    Science.gov (United States)

    Skempes, Dimitrios; Bickenbach, Jerome

    2015-09-24

    Rehabilitation care is fundamental to health and human dignity and a human right enshrined in the United Nations Convention on the Rights of Persons with Disabilities. The provision of rehabilitation is important for reducing the need for formal support and enabling persons with disabilities to lead an independent life. Increasingly scholars and advocacy groups voice concerns over the significant barriers facing people with disabilities in accessing appropriate and quality rehabilitation. A growing body of research highlights a "respond-need" gap in the provision of rehabilitation and assistive technologies and underscore the lack of indicators for assessing performance of rehabilitation systems and monitoring States compliance with human rights standards in rehabilitation service planning and programming. While research on human rights and health monitoring has increased exponentially over the last decade far too little attention has been paid to rehabilitation services. The proposed research aims to reduce this knowledge gap by developing a human rights based monitoring framework with indicators to support human rights accountability and performance assessment in rehabilitation. Concept mapping, a stakeholder-driven approach will be used as the core method to identify rights based indicators and develop the rehabilitation services monitoring framework. Concept mapping requires participants from various stakeholders groups to generate a list of the potential indicators through on line brainstorming, sort the indicators for conceptual similarity into clusters and rate them against predefined criteria. Multidimensional scaling and hierarchical cluster data analysis will be performed to develop the monitoring framework while bridging analysis will provide useful insights about patterns of agreement or disagreement among participants views on indicators. This study has the potential to influence future practices on data collection and measurement of compliance with

  1. Identifying Opportunities for Exploiting Cross-Layer Interactions in Adaptive Wireless Systems

    Directory of Open Access Journals (Sweden)

    Troy Weingart

    2007-01-01

    Full Text Available The flexibility of cognitive and software-defined radio heralds an opportunity for researchers to reexamine how network protocol layers operate with respect to providing quality of service aware transmission among wireless nodes. This opportunity is enhanced by the continued development of spectrally responsive devices—ones that can detect and respond to changes in the radio frequency environment. Present wireless network protocols define reliability and other performance-related tasks narrowly within layers. For example, the frame size employed on 802.11 can substantially influence the throughput, delay, and jitter experienced by an application, but there is no simple way to adapt this parameter. Furthermore, while the data link layer of 802.11 provides error detection capabilities across a link, it does not specify additional features, such as forward error correction schemes, nor does it provide a means for throttling retransmissions at the transport layer (currently, the data link and transport layer can function counterproductively with respect to reliability. This paper presents an analysis of the interaction of physical, data link, and network layer parameters with respect to throughput, bit error rate, delay, and jitter. The goal of this analysis is to identify opportunities where system designers might exploit cross-layer interactions to improve the performance of Voice over IP (VoIP, instant messaging (IM, and file transfer applications.

  2. ECHO Services: Foundational Middleware for a Science Cyberinfrastructure

    Science.gov (United States)

    Burnett, Michael

    2005-01-01

    This viewgraph presentation describes ECHO, an interoperability middleware solution. It uses open, XML-based APIs, and supports net-centric architectures and solutions. ECHO has a set of interoperable registries for both data (metadata) and services, and provides user accounts and a common infrastructure for the registries. It is built upon a layered architecture with extensible infrastructure for supporting community unique protocols. It has been operational since November, 2002 and it available as open source.

  3. A study protocol for tracking quality of life among U.S. service members wounded in Iraq and Afghanistan: the Wounded Warrior Recovery Project.

    Science.gov (United States)

    Woodruff, Susan I; Galarneau, Michael R; Luu, Bethi N; Sack, Daniel; Han, Peggy

    2014-03-01

    There is a need for more work to understand the quality of life (QOL) outcomes of survivors of Operations Enduring Freedom and Iraqi Freedom combat injury to improve care and treatment, and prevent poor physical, psychological, and social outcomes. We describe the study design and methods of the Wounded Warrior Recovery Project, a study supported by the Department of Defense that will track close to 10,000 military personnel wounded in Operations Enduring Freedom and Iraqi Freedom. The overall objective of the 6-year longitudinal study is to track changes in QOL and describe variations in those changes as they relate to sociodemographic factors, injury characteristics, service-related factors, clinical/diagnostic measures including traumatic brain injury and posttraumatic stress disorder, and medical procedures and services. The Wounded Warrior Recovery Project study will be among the first longitudinal population-based investigations of QOL outcomes after combat injury and will provide a basis upon which large-scale epidemiological studies can be conducted. Reprint & Copyright © 2014 Association of Military Surgeons of the U.S.

  4. Evaluation of an integrated treatment for active duty service members with comorbid posttraumatic stress disorder and major depressive disorder: Study protocol for a randomized controlled trial.

    Science.gov (United States)

    Walter, Kristen H; Glassman, Lisa H; Michael Hunt, W; Otis, Nicholas P; Thomsen, Cynthia J

    2018-01-01

    Posttraumatic stress disorder (PTSD) commonly co-occurs with major depressive disorder (MDD) in both civilian and military/veteran populations. Existing, evidence-based PTSD treatments, such as cognitive processing therapy (CPT), often reduce symptoms of both PTSD and depression; however, findings related to the influence of comorbid MDD on PTSD treatment outcomes are mixed, and few studies use samples of individuals with both conditions. Behavioral activation (BA), an approach that relies on behavioral principles, is an effective treatment for depression. We have integrated BA into CPT (BA+CPT), a more cognitive approach, to address depressive symptoms among active duty service members with both PTSD and comorbid MDD. We describe an ongoing randomized controlled trial investigating the efficacy of our innovative, integrated BA+CPT intervention, compared with standard CPT, for active duty service members with PTSD and comorbid MDD. We detail the development of this integrated treatment, as well as the design and implementation of the randomized controlled trial, to evaluate its effect on symptoms. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. Impact of improved recording of work-relatedness in primary care visits at occupational health services on sickness absences: study protocol for a randomised controlled trial.

    Science.gov (United States)

    Atkins, Salla; Ojajärvi, Ulla; Talola, Nina; Viljamaa, Mervi; Nevalainen, Jaakko; Uitti, Jukka

    2017-07-26

    Employment protects and fosters health. Occupational health services, particularly in Finland, have a central role in protecting employee health and preventing work ability problems. However, primary care within occupational health services is currently underused in informing preventive activities. This study was designed to assess whether the recording of work ability problems and improvement of follow-up of work-related primary care visits can reduce sickness absences and work disability pensions after 1 year. A pragmatic trial will be conducted using patient electronic registers and registers of the central pensions agency in Finland. Twenty-two occupational health centres will be randomised to intervention and control groups. Intervention units will receive training to improve recording of work ability illnesses in the primary care setting and improved follow-up procedures. The intervention impact will be assessed through examining rates of sickness absence across intervention and control clinics as well as before and after the intervention. The trial will develop knowledge of the intervention potential of primary care for preventing work disability pensions and sickness absence. The use of routine patient registers and pensions registers to assess the outcomes of a randomised controlled trial will bring forward trial methodology, particularly when using register-based data. If successful, the intervention will improve the quality of occupational health care primary care and contribute to reducing work disability. ISRCTN Registry reference number ISRCTN45728263 . Registered on 18 April 2016.

  6. The CCSDS Next Generation Space Data Link Protocol (NGSLP)

    Science.gov (United States)

    Kazz, Greg J.; Greenberg, Edward

    2014-01-01

    next leap in performance for space link communications. Field Programmable Gate Arrays (FPGAs) provide the capability to incorporate high performance forward error correcting codes implemented within software transponders providing improved performance in data transfer, ranging, link security, and time correlation. Given these synergistic technological breakthroughs, the time has come to take advantage of them in applying them to both on going (e.g., command, telemetry) and emerging (e.g., space link security, optical communication) space link applications. However one of the constraining factors within the Data Link Layer in realizing these performance gains is the lack of a generic transfer frame format and common supporting services amongst the existing CCSDS link layer protocols. Currently each of the four CCSDS link layer protocols (TM, TC, AOS, and Proximity-1) have unique formats and services which prohibits their reuse across the totality of all space link applications of CCSDS member space agencies. For example, Mars missions. These missions implement their proximity data link layer using the Proximity-1 frame format and the services it supports but is still required to support the direct from Earth (TC) protocols and the Direct To Earth (AOS/TM) protocols. The prime purpose of this paper, is to describe a new general purpose CCSDS Data Link layer protocol, the NGSLP that will provide the required services along with a common transfer frame format for all the CCSDS space links (ground to/from space and space to space links) targeted for emerging missions after a CCSDS agency-wide coordinated date. This paper will also describe related options that can be included for the Coding and Synchronization sub-layer of the Data Link layer to extend the capacities of the link and additionally provide an independence of the transfer frame sub-layer from the coding sublayer. This feature will provide missions the option of running either the currently performed

  7. Reducing stigma among healthcare providers to improve mental health services (RESHAPE): protocol for a pilot cluster randomized controlled trial of a stigma reduction intervention for training primary healthcare workers in Nepal.

    Science.gov (United States)

    Kohrt, Brandon A; Jordans, Mark J D; Turner, Elizabeth L; Sikkema, Kathleen J; Luitel, Nagendra P; Rai, Sauharda; Singla, Daisy R; Lamichhane, Jagannath; Lund, Crick; Patel, Vikram

    2018-01-01

    Non-specialist healthcare providers, including primary and community healthcare workers, in low- and middle-income countries can effectively treat mental illness. However, scaling-up mental health services within existing health systems has been limited by barriers such as stigma against people with mental illness. Therefore, interventions are needed to address attitudes and behaviors among non-specialists. Aimed at addressing this gap, RE ducing S tigma among H ealthc A re P roviders to Improv E mental health services (RESHAPE) is an intervention in which social contact with mental health service users is added to training for non-specialist healthcare workers integrating mental health services into primary healthcare. This protocol describes a mixed methods pilot and feasibility study in primary care centers in Chitwan, Nepal. The qualitative component will include key informant interviews and focus group discussions. The quantitative component consists of a pilot cluster randomized controlled trial (c-RCT), which will establish parameters for a future effectiveness study of RESHAPE compared to training as usual (TAU). Primary healthcare facilities (the cluster unit, k  = 34) will be randomized to TAU or RESHAPE. The direct beneficiaries of the intervention are the primary healthcare workers in the facilities ( n  = 150); indirect beneficiaries are their patients ( n  = 100). The TAU condition is existing mental health training and supervision for primary healthcare workers delivered through the Programme for Improving Mental healthcarE (PRIME) implementing the mental health Gap Action Programme (mhGAP). The primary objective is to evaluate acceptability and feasibility through qualitative interviews with primary healthcare workers, trainers, and mental health service users. The secondary objective is to collect quantitative information on health worker outcomes including mental health stigma (Social Distance Scale), clinical knowledge (mh

  8. Protocol for the economic evaluation of a complex intervention to improve the mental health of maltreated infants and children in foster care in the UK (The BeST? services trial).

    Science.gov (United States)

    Deidda, Manuela; Boyd, Kathleen Anne; Minnis, Helen; Donaldson, Julia; Brown, Kevin; Boyer, Nicole R S; McIntosh, Emma

    2018-03-14

    Children who have experienced abuse and neglect are at increased risk of mental and physical health problems throughout life. This places an enormous burden on individuals, families and society in terms of health services, education, social care and judiciary sectors. Evidence suggests that early intervention can mitigate the negative consequences of child maltreatment, exerting long-term positive effects on the health of maltreated children entering foster care. However, evidence on cost-effectiveness of such complex interventions is limited. This protocol describes the first economic evaluation of its kind in the UK. An economic evaluation alongside the Best Services Trial (BeST?) has been prospectively designed to identify, measure and value key resource and outcome impacts arising from the New Orleans intervention model (NIM) (an infant mental health service) compared with case management (CM) (enhanced social work services as usual). A within-trial economic evaluation and long-term model from a National Health Service/Personal Social Service and a broader societal perspective will be undertaken alongside the National Institute for Health Research (NIHR)-Public Health Research Unit (PHRU)-funded randomised multicentre BeST?. BeST? aims to evaluate NIM compared with CM for maltreated children entering foster care in a UK context. Collection of Paediatric Quality of Life Inventory (PedsQL) and the recent mapping of PedsQL to EuroQol-5-Dimensions (EQ-5D) will facilitate the estimation of quality-adjusted life years specific to the infant population for a cost-utility analysis. Other effectiveness outcomes will be incorporated into a cost-effectiveness analysis (CEA) and cost-consequences analysis (CCA). A long-term economic model and multiple economic evaluation frameworks will provide decision-makers with a comprehensive, multiperspective guide regarding cost-effectiveness of NIM. The long-term population health economic model will be developed to synthesise

  9. Health and economic effects from linking bedside and outpatient tobacco cessation services for hospitalized smokers in two large hospitals: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Fellows Jeffrey L

    2012-08-01

    Full Text Available Abstract Background Extended smoking cessation follow-up after hospital discharge significantly increases abstinence. Hospital smoke-free policies create a period of ‘forced abstinence’ for smokers, thus providing an opportunity to integrate tobacco dependence treatment, and to support post-discharge maintenance of hospital-acquired abstinence. This study is funded by the National Heart, Lung, and Blood Institute (1U01HL1053231. Methods/Design The Inpatient Technology-Supported Assisted Referral study is a multi-center, randomized clinical effectiveness trial being conducted at Kaiser Permanente Northwest (KPNW and at Oregon Health & Science University (OHSU hospitals in Portland, Oregon. The study assesses the effectiveness and cost-effectiveness of linking a practical inpatient assisted referral to outpatient cessation services plus interactive voice recognition (AR + IVR follow-up calls, compared to usual care inpatient counseling (UC. In November 2011, we began recruiting 900 hospital patients age ≥18 years who smoked ≥1 cigarettes in the past 30 days, willing to remain abstinent postdischarge, have a working phone, live within 50 miles of the hospital, speak English, and have no health-related barriers to participation. Each site will randomize 450 patients to AR + IVR or UC using a 2:1 assignment strategy. Participants in the AR + IVR arm will receive a brief inpatient cessation consult plus a referral to available outpatient cessation programs and medications, and four IVR follow-up calls over seven weeks postdischarge. Participants do not have to accept the referral. At KPNW, UC participants will receive brief inpatient counseling and encouragement to self-enroll in available outpatient services. The primary outcome is self-reported thirty-day smoking abstinence at six months postrandomization for AR + IVR participants compared to usual care. Additional outcomes include self-reported and biochemically confirmed

  10. Study protocol for a longitudinal study evaluating the impact of rape on women's health and their use of health services in South Africa.

    Science.gov (United States)

    Abrahams, Naeemah; Seedat, Soraya; Lombard, Carl; Kengne, Andre P; Myers, Bronwyn; Sewnath, Alesha; Mhlongo, Shibe; Ramjee, Gita; Peer, Nasheeta; Garcia-Moreno, Claudia; Jewkes, Rachel

    2017-09-29

    South Africa is a country known for its high levels of HIV infection and sexual violence. Although the interface between gender-based violence, HIV and mental health has been described, there are substantial gaps in knowledge of the medium-term and long-term health impact. The 2010 Global Burden of Disease study excluded many health outcomes associated with rape and other forms of gender-based violence because systematic reviews revealed huge gaps in data and poor evidence of health effects. This study aims to describe the incidence and attributable burden of physical and mental health problems (including HIV acquisition) in adult women over a 2-year postrape period, through comparison with a cohort of women who have not been raped. The study will substantially advance our understanding of the impact of rape and will generate robust data to assist in the development of postrape health services and the delivery of evidence-based care. This longitudinal study seeks to recruit 1008 rape-exposed and 1008 rape non-exposed women. Women were recruited from health services, and assessments were carried out at baseline, 3, 6, 9, 12, 18 and 24 months. Outcome measures include exposure to risk factors; mental health status; cardio-metabolic risks; and biomarkers for HIV, sexually transmitted infections, pregnancy and stress. The primary analysis will be to compare HIV incidence in the two groups using log-rank tests. Appropriate models to predict health outcomes over time will also be applied. The South African Medical Research Council's Ethics Committee approved the study. As rape is a key element of the study, the safety and protection of participants guides the research process. We will adopt a research uptake strategy to ensure dissemination to policy makers, service providers and advocacy groups. Peer-reviewed journal articles will be published. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No

  11. Health and economic effects from linking bedside and outpatient tobacco cessation services for hospitalized smokers in two large hospitals: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Fellows, Jeffrey L; Mularski, Richard; Waiwaiole, Lisa; Funkhouser, Kim; Mitchell, Julie; Arnold, Kathleen; Luke, Sabrina

    2012-08-01

    Extended smoking cessation follow-up after hospital discharge significantly increases abstinence. Hospital smoke-free policies create a period of 'forced abstinence' for smokers, thus providing an opportunity to integrate tobacco dependence treatment, and to support post-discharge maintenance of hospital-acquired abstinence. This study is funded by the National Heart, Lung, and Blood Institute (1U01HL1053231). The Inpatient Technology-Supported Assisted Referral study is a multi-center, randomized clinical effectiveness trial being conducted at Kaiser Permanente Northwest (KPNW) and at Oregon Health & Science University (OHSU) hospitals in Portland, Oregon. The study assesses the effectiveness and cost-effectiveness of linking a practical inpatient assisted referral to outpatient cessation services plus interactive voice recognition (AR + IVR) follow-up calls, compared to usual care inpatient counseling (UC). In November 2011, we began recruiting 900 hospital patients age ≥18 years who smoked ≥1 cigarettes in the past 30 days, willing to remain abstinent postdischarge, have a working phone, live within 50 miles of the hospital, speak English, and have no health-related barriers to participation. Each site will randomize 450 patients to AR + IVR or UC using a 2:1 assignment strategy. Participants in the AR + IVR arm will receive a brief inpatient cessation consult plus a referral to available outpatient cessation programs and medications, and four IVR follow-up calls over seven weeks postdischarge. Participants do not have to accept the referral. At KPNW, UC participants will receive brief inpatient counseling and encouragement to self-enroll in available outpatient services. The primary outcome is self-reported thirty-day smoking abstinence at six months postrandomization for AR + IVR participants compared to usual care. Additional outcomes include self-reported and biochemically confirmed seven-day abstinence at six months, self-reported seven

  12. Comparing four service delivery models for adolescent girls and young women through the 'Girl Power' study: protocol for a multisite quasi-experimental cohort study.

    Science.gov (United States)

    Rosenberg, Nora E; Pettifor, Audrey E; Myers, Laura; Phanga, Twambilile; Marcus, Rebecca; Bhushan, Nivedita Latha; Madlingozi, Nomtha; Vansia, Dhrutika; Masters, Avril; Maseko, Bertha; Mtwisha, Lulu; Kachigamba, Annie; Tang, Jennifer; Hosseinipour, Mina C; Bekker, Linda-Gail

    2017-12-14

    In sub-Saharan Africa, adolescent girls and young women (AGYW) face a range of sexual and reproductive health (SRH) challenges. Clinical, behavioural and structural interventions have each reduced these risks and improved health outcomes. However, combinations of these interventions have not been compared with each other or with no intervention at all. The 'Girl Power' study is designed to systematically make these comparisons. Four comparable health facilities in Malawi and South Africa (n=8) were selected and assigned to one of the following models of care: (1) Standard of care : AGYW can receive family planning, HIV testing and counselling (HTC), and sexually transmitted infection (STI) syndromic management in three separate locations with three separate queues with the general population. No youth-friendly spaces, clinical modifications or trainings are offered, (2) Youth-Friendly Health Services (YFHS) : AGYW are meant to receive integrated family planning, HTC and STI services in dedicated youth spaces with youth-friendly modifications and providers trained in YFHS, (3) YFHS+behavioural intervention (BI) : In addition to YFHS, AGYW can attend 12 monthly theory-driven, facilitator-led, interactive sessions on health, finance and relationships, (4) YFHS+BI+conditional cash transfer (CCT) : in addition to YFHS and BI, AGYW receive up to 12 CCTs conditional on monthly BI session attendance.At each clinic, 250 AGYW 15-24 years old (n=2000 total) will be consented, enrolled and followed for 1 year. Each participant will complete a behavioural survey at enrolment, 6 months and 12 months . All clinical, behavioural and CCT services will be captured. Outcomes of interest include uptake of each package element and reduction in HIV risk behaviours. A qualitative substudy will be conducted. This study has received ethical approval from the University of North Carolina Institutional Review Board, the University of Cape Town Human Research Ethics Committee and Malawi

  13. Protocoles d'accès multiple orientés qualité de service en constellation de satellite à orbite basse

    OpenAIRE

    Ibrahim , Abbas

    2002-01-01

    Pendant les dernières années, le réseau cellulaire est devenu accessible presque partout. Pour compléter ce réseau cellulaire terrestre, plusieurs systèmes basés sur des satellites à basse orbite (LEO Low Earth Orbit) et moyenne orbite (MEO Medium Earth Orbit) ont été développés pour offrir une couverture globale. Les services multimédias sont largement demandés sur une échelle globale.Notre but est de développer une couche d'accès MAC au canal satellitaire tout en respectant les contraintes ...

  14. Developing an Australian-first recovery model for parents in Victorian mental health and family services: a study protocol for a randomised controlled trial.

    Science.gov (United States)

    Maybery, Darryl; Goodyear, Melinda; Reupert, Andrea; Sheen, Jade; Cann, Warren; Dalziel, Kim; Tchernagovski, Phillip; O'Hanlon, Brendan; von Doussa, Henry

    2017-05-26

    A considerable number of people with a mental illness are parents caring for dependent children. For those with a mental illness, parenting can provide a sense of competence, belonging, identity and hope and hence is well aligned to the concept of personal recovery. However, little research has focused on the recovery journey of those who are parents and have a mental illness. This randomised controlled trial aims to (i) evaluate the effectiveness of an intervention model of recovery for parents (Let's Talk about Children) in three different mental health service sectors and (ii) examine the economic value of a larger roll out (longer term) of the parent recovery model. A two arm parallel randomised controlled trial will be used with participants, who are being treated for their mental illness in adult mental health, non-government community mental health or family welfare services. The study will involve 192 parents, who are considered by their treating practitioner to be sufficiently well to provide informed consent and participate in an intervention (Let's Talk about Children) or control group (treatment as usual). Participant randomisation will occur at the level of the treating practitioner and will be based on whether the randomised practitioner is trained in the intervention. Outcomes are compared at pre, post intervention and six-month follow-up. Recovery, parenting and family functioning, and quality of life questionnaires will be used to measure parent wellbeing and the economic benefits of the intervention. This is the first randomised controlled trial to investigate the efficacy of a parenting intervention on recovery outcomes and the first to provide an economic evaluation of an intervention for parents with a mental illness. An implementation model is required to embed the intervention in different sectors. The trial was retrospectively registered: ACTRN12616000460404 on the 8/4/2016.

  15. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  16. Emulation of Industrial Control Field Device Protocols

    Science.gov (United States)

    2013-03-01

    today. The protocol operates at the application layer of the open systems interconnection ( OSI ) model, meaning it operates independently of the...the OSI model. Their job is to receive serial data from an MTU in the Modbus RTU or ASCII protocol, encapsulate and transmit the data to another modem...facing connection and out-of-band logging capabilities over the other LAN -facing connection. Despite the fact that the hardware configuration of the

  17. A Pattern Language for Designing Application-Level Communication Protocols and the Improvement of Computer Science Education through Cloud Computing

    OpenAIRE

    Lascano, Jorge Edison

    2017-01-01

    Networking protocols have been developed throughout time following layered architectures such as the Open Systems Interconnection model and the Internet model. These protocols are grouped in the Internet protocol suite. Most developers do not deal with low-level protocols, instead they design application-level protocols on top of the low-level protocol. Although each application-level protocol is different, there is commonality among them and developers can apply lessons learned from one prot...

  18. Impact of consumer copayments for subsidised medicines on health services use and outcomes: a protocol using linked administrative data from Western Australia.

    Science.gov (United States)

    Seaman, Karla L; Sanfilippo, Frank M; Roughead, Elizabeth E; Bulsara, Max K; Kemp-Casey, Anna; Bulsara, Caroline; Watts, Gerald F; Preen, David

    2017-06-21

    Across the world, health systems are adopting approaches to manage rising healthcare costs. One common strategy is a medication copayments scheme where consumers make a contribution (copayment) towards the cost of their dispensed medicines, with remaining costs subsidised by the health insurance service, which in Australia is the Federal Government.In Australia, copayments have tended to increase in proportion to inflation, but in January 2005, the copayment increased substantially more than inflation. Results from aggregated dispensing data showed that this increase led to a significant decrease in the use of several medicines. The aim of this study is to determine the demographic and clinical characteristics of individuals ceasing or reducing statin medication use following the January 2005 Pharmaceutical Benefit Scheme (PBS) copayment increase and the effects on their health outcomes. This whole-of-population study comprises a series of retrospective, observational investigations using linked administrative health data on a cohort of West Australians (WA) who had at least one statin dispensed between 1 May 2002 and 30 June 2010. Individual-level data on the use of pharmaceuticals, general practitioner (GP) visits, hospitalisations and death are used.This study will identify patients who were stable users of statin medication in 2004 with follow-up commencing from 2005 onwards. Subgroups determined by change in adherence levels of statin medication from 2004 to 2005 will be classified as continuation, reduction or cessation of statin therapy and explored for differences in health outcomes and health service utilisation after the 2005 copayment change. Ethics approvals have been obtained from the Western Australian Department of Health (#2007/33), University of Western Australia (RA/4/1/1775) and University of Notre Dame (0 14 167F). Outputs from the findings will be published in peer reviewed journals designed for a policy audience and presented at state

  19. TOOL: The Open Opinion Layer

    OpenAIRE

    Masum, Hassan

    2002-01-01

    Shared opinions drive society: what we read, how we vote, and where we shop are all heavily influenced by the choices of others. However, the cost in time and money to systematically share opinions remains high, while the actual performance history of opinion generators is often not tracked. This article explores the development of a distributed open opinion layer, which is given the generic name of TOOL. Similar to the evolution of network protocols as an underlying layer for many comput...

  20. Testing the effectiveness of a motivational interviewing-based brief intervention for substance use as an adjunct to usual care in community-based AIDS service organizations: study protocol for a multisite randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Bryan R. Garner

    2017-11-01

    Full Text Available Abstract Background In 2010, the first comprehensive National HIV/AIDS Strategy for the United States was released and included three goals: (1 reducing the number of people who become infected with HIV, (2 increasing access to care and improving health outcomes for people living with HIV, and (3 reducing HIV-related health disparities and health inequities. In 2013, as part of its effort to help address the National HIV/AIDS Strategy, the National Institute on Drug Abuse (NIDA funded a type 2 effectiveness-implementation hybrid trial titled the Substance Abuse Treatment to HIV Care (SAT2HIV Project. Aim 1 of the SAT2HIV Project tests the effectiveness of a motivational interviewing-based brief intervention (MIBI for substance use as an adjunct to usual care within AIDS Service Organizations (ASOs as part of its MIBI Experiment. Aim 2 of the SAT2HIV Project tests the effectiveness of implementation and sustainment facilitation (ISF as an adjunct to the Addiction Technology Transfer Center (ATTC model for training staff in motivational interviewing as part of its ISF Experiment. The current paper describes the study protocol for the ISF Experiment. Methods As part of a multisite randomized controlled trial, individuals with comorbid HIV/AIDS and problematic substance use are randomized to receive either the ASOs’ usual care (control condition or usual care plus a MIBI for substance use (experimental condition delivered by trained ASO case-management staff. Primary outcome measures are reductions in days of primary substance use, number of substance-related problems, times engaging in risky behaviors, days of non-adherence to HIV medications, and increases in substance use treatment. As part of this paper, we describe the trial protocol in accordance with the Standard Protocol Items: Recommendations for Interventional Trials guidelines. Discussion If successfully able to implement MIBI as an effective adjunct to usual care, the current trial may

  1. A health-promoting community dental service in Melbourne, Victoria, Australia: protocol for the North Richmond model of oral health care.

    Science.gov (United States)

    Hall, Martin; Christian, Bradley

    2017-10-01

    Despite the best efforts and commitment of oral health programs, there is no evidence that the current surgical output-based model of oral health care is delivering better oral health outcomes to the community. In fact, Australian evidence indicates the oral health of the community could be getting worse. It is now well-understood that this traditional surgical model of oral health care will never successfully manage the disease itself. It is proposed that a health-promoting, minimally invasive oral disease management model of care may lead to a sustainable benefit to the oral health status of the individual and community groups. The aim of this paper is to describe such a model of oral health care (MoC) currently being implemented by the North Richmond Community Health Oral Health (NRCH-OH) program in Melbourne, Victoria, Australia; this model may serve as a template for other services to re-orient their healthcare delivery towards health promotion and prevention. The paper describes the guiding principles and theories for the model and also its operational components, which are: pre-engagement while on the waitlist; client engagement at the reception area; the assessment phase; oral health education (high-risk clients only); disease management; and reviews and recall.

  2. Service discovery using Bloom filters

    NARCIS (Netherlands)

    Goering, P.T.H.; Heijenk, Geert; Lelieveldt, B.P.F.; Haverkort, Boudewijn R.H.M.; de Laat, C.T.A.M.; Heijnsdijk, J.W.J.

    A protocol to perform service discovery in adhoc networks is introduced in this paper. Attenuated Bloom filters are used to distribute services to nodes in the neighborhood and thus enable local service discovery. The protocol has been implemented in a discrete event simulator to investigate the

  3. Evidence of accessibility and utility of point-of-care diagnostics as an integral part of prevention of mother-to-child transmission services: systematic scoping review protocol.

    Science.gov (United States)

    Katoba, Juliet; Hangulu, Lydia; Mashamba-Thompson, Tivani Phosa

    2017-11-04

    Point-of-care (POC) testing has been shown to help improve healthcare access in resource-limited settings. However, there is paucity of evidence on accessibility of POC testing for prevention of mother-to-child transmission (PMTCT) in resource-limited settings. We propose to conduct a systematic scoping review to map the evidence on POC testing services for PMTCT. A scoping review framework, proposed by Arksey and O'Malley, will guide the study. A comprehensive literature search will be performed in the following electronic databases: PubMed, Science Direct, Cochrane Central, Google Scholar and databases within EBSCOhost (Medline and CINAHL). The primary research articles published in peer-reviewed journals and grey articles addressing our question will be included. One reviewer will conduct title screening and the results will be exported to endnote library. Two independent reviewers will perform abstract, then full article screening in parallel. The same process shall be employed to extract data from eligible studies. Data analysis will involve a narrative summary of included studies and thematic content analysis aided by NVIVO software V.11. The mixed methods assessment tool will be used to assess the quality of studies that will be included. Ethical approval is not applicable to this study. The study findings will be disseminated through publication in a peer-reviewed journal and presentations at conferences related to syphilis, HIV, PMTCT, bacterial infections and POC diagnostics. CRD42017056267. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  4. UK-based, multisite, prospective cohort study of small bowel obstruction in acute surgical services: National Audit of Small Bowel Obstruction (NASBO) protocol.

    Science.gov (United States)

    Lee, Matthew J; Sayers, Adele E; Drake, Thomas M; Hollyman, Marianne; Bradburn, Mike; Hind, Daniel; Wilson, Timothy R; Fearnhead, Nicola S

    2017-10-05

    Small bowel obstruction (SBO) is a common indication for emergency laparotomy in the UK, which is associated with a 90-day mortality rate of 13%. There are currently no UK clinical guidelines for the management of this condition. The aim of this multicentre prospective cohort study is to describe the burden, variation in management and associated outcomes of SBO in the UK adult population. UK hospitals providing emergency general surgery are eligible to participate. This study has three components: (1) a clinical preference questionnaire to be completed by consultants providing emergency general surgical care to assesses preferences in diagnostics and therapeutic approaches, including laparoscopy and nutritional interventions; (2) site resource profile questionnaire to indicate ease of access to diagnostic services, operating theatres, nutritional support teams and postoperative support including intensive care; (3) prospective cohort study of all cases of SBO admitted during an 8-week period at participating trusts. Data on diagnostics, operative and nutritional interventions, and in-hospital mortality and morbidity will be captured, followed by data validation. This will be conducted as a national audit of practice in conjunction with trainee research collaboratives, with support from patient representatives, surgeons, anaesthetists, gastroenterologists and a clinical trials unit. Site-specific reports will be provided to each participant site as well as an overall report to be disseminated through specialist societies. Results will be published in a formal project report endorsed by stakeholders, and in peer-reviewed scientific reports. Key findings will be debated at a focused national meeting with a view to quality improvement initiatives. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  5. TULIP: A Link-Level Protocol for Improving TCP over Wireless Links

    National Research Council Canada - National Science Library

    Parsa, Christina; Garcia-Luna-Aceves, J. J

    1999-01-01

    We present the transport unaware link improvement protocol (TULIP), which dramatically improves the performance of TCP over lossy wireless links, without competing with or modifying the transport- or network-layer protocols...

  6. Specialist palliative care services for adults with advanced, incurable illness in hospital, hospice, or community settings--protocol for a systematic review.

    Science.gov (United States)

    Gaertner, Jan; Siemens, Waldemar; Antes, Gerd; Meerpohl, Joerg J; Xander, Carola; Schwarzer, Guido; Stock, Stephanie; Becker, Gerhild

    2015-09-25

    Specialist palliative care (SPC) interventions aim to relieve and prevent suffering in the physical, psychological, social, and spiritual domain. Therefore, SPC is carried out by a multi-professional team with different occupations (e.g., physician, nurse, psychologist, and social worker). Remaining skepticism concerning the need for SPC may be based on the scarcity of high-quality evaluations about the external evidence for SPC. Therefore, we will conduct a systematic review according to Cochrane standards to examine the effects of SPC for adults with advanced illness. The comprehensive systematic literature search will include randomized controlled trials (RCTs) and cluster RCTs. We will search the databases MEDLINE, EMBASE, Cochrane Central Register of Controlled Trials (CENTRAL), and PsycINFO. Patients must be adults suffering from life-limiting diseases. Proxy and caregiver outcomes will not be assessed in order to ensure a clear and well-defined research question for this review. Interventions may be in an in- or outpatient setting, e.g., consulting service, palliative care ward, and palliative outpatient clinic. In line with the multi-dimensional scope of palliative care, the primary outcome is quality of life (QoL). Key secondary outcomes are patients' symptom burden, place of death and survival, and health economic aspects. Subgroup analysis will assess results according to cancer type, age, early vs not early SPC, site of care, and setting. Analysis will be performed with the current RevMan software. We will use the Cochrane Collaboration risk of bias assessment tool. The quality of evidence will be judged according to the Grading of Recommendations Assessment, Development, and Evaluation (GRADE) approach. The available evidence will be summarized and discussed to provide a basis for decision-making among health care professionals and policy makers. For SPC, we believe that multi-professional care is of utmost importance. Therefore, single

  7. Optimising technology to measure functional vision, mobility and service outcomes for people with low vision or blindness: protocol for a prospective cohort study in Australia and Malaysia

    Science.gov (United States)

    Deverell, Lil; Meyer, Denny; Lau, Bee Theng; Al Mahmud, Abdullah; Sukunesan, Suku; Bhowmik, Jahar; Chai, Almon; McCarthy, Chris; Zheng, Pan; Pipingas, Andrew; Islam, Fakir M Amirul

    2017-01-01

    Introduction Orientation and mobility (O&M) specialists assess the functional vision and O&M skills of people with mobility problems, usually relating to low vision or blindness. There are numerous O&M assessment checklists but no measures that reduce qualitative assessment data to a single comparable score suitable for assessing any O&M client, of any age or ability, in any location. Functional measures are needed internationally to align O&M assessment practices, guide referrals, profile O&M clients, plan appropriate services and evaluate outcomes from O&M programmes (eg, long cane training), assistive technology (eg, hazard sensors) and medical interventions (eg, retinal implants). This study aims to validate two new measures of functional performance vision-related outcomes in orientation and mobility (VROOM) and orientation and mobility outcomes (OMO) in the context of ordinary O&M assessments in Australia, with cultural comparisons in Malaysia, also developing phone apps and online training to streamline professional assessment practices. Methods and analysis This multiphase observational study will employ embedded mixed methods with a qualitative/quantitative priority: corating functional vision and O&M during social inquiry. Australian O&M agencies (n=15) provide the sampling frame. O&M specialists will use quota sampling to generate cross-sectional assessment data (n=400) before investigating selected cohorts in outcome studies. Cultural relevance of the VROOM and OMO tools will be investigated in Malaysia, where the tools will inform the design of assistive devices and evaluate prototypes. Exploratory and confirmatory factor analysis, Rasch modelling, cluster analysis and analysis of variance will be undertaken along with descriptive analysis of measurement data. Qualitative findings will be used to interpret VROOM and OMO scores, filter statistically significant results, warrant their generalisability and identify additional relevant constructs that

  8. A behavioural change package to prevent hand dermatitis in nurses working in the national health service (the SCIN trial): study protocol for a cluster randomised controlled trial.

    Science.gov (United States)

    Madan, Ira; Parsons, Vaughan; Cookson, Barry; English, John; Lavender, Tina; McCrone, Paul; Murphy, Caroline; Ntani, Georgia; Rushton, Lesley; Smedley, Julia; Williams, Hywel; Wright, Alison; Coggon, David

    2016-03-17

    Hand dermatitis can be a serious health problem in healthcare workers. While a range of skin care strategies and policy directives have been developed in recent years to minimise the risk, their effectiveness and cost-effectiveness remain unclear. Evidence now suggests that psychological theory can facilitate behaviour change with respect to improved hand care practices. Therefore, we will test the hypothesis that a behavioural change intervention to improve hand care, based on the Theory of Planned Behaviour and implementation intentions, coupled with provision of hand moisturisers, can produce a clinically useful reduction in the occurrence of hand dermatitis, when compared to standard care, among nurses working in the UK National Health Service (NHS) who are particularly at risk. Secondary aims will be to assess impacts on participants' beliefs and behaviour regarding hand care. In addition, we will assess the cost-effectiveness of the intervention in comparison with normal care. We will conduct a cluster randomised controlled trial at 35 NHS hospital trusts/health boards/universities, focussing on student nurses with a previous history of atopic disease or hand eczema and on nurses in intensive care units. Nurses at 'intervention-light' sites will be managed according to what would currently be regarded as best practice, with provision of an advice leaflet about optimal hand care to prevent hand dermatitis and encouragement to contact their occupational health (OH) department early if hand dermatitis occurs. Nurses at 'intervention-plus' sites will additionally receive a behavioural change programme (BCP) with on-going active reinforcement of its messages, and enhanced provision of moisturising cream. The impact of the interventions will be compared using information collected by questionnaires and through standardised photographs of the hands and wrists, collected at baseline and after 12 months follow-up. In addition, we will assemble relevant economic data

  9. Optimising technology to measure functional vision, mobility and service outcomes for people with low vision or blindness: protocol for a prospective cohort study in Australia and Malaysia.

    Science.gov (United States)

    Deverell, Lil; Meyer, Denny; Lau, Bee Theng; Al Mahmud, Abdullah; Sukunesan, Suku; Bhowmik, Jahar; Chai, Almon; McCarthy, Chris; Zheng, Pan; Pipingas, Andrew; Islam, Fakir M Amirul

    2017-12-21

    Orientation and mobility (O&M) specialists assess the functional vision and O&M skills of people with mobility problems, usually relating to low vision or blindness. There are numerous O&M assessment checklists but no measures that reduce qualitative assessment data to a single comparable score suitable for assessing any O&M client, of any age or ability, in any location. Functional measures are needed internationally to align O&M assessment practices, guide referrals, profile O&M clients, plan appropriate services and evaluate outcomes from O&M programmes (eg, long cane training), assistive technology (eg, hazard sensors) and medical interventions (eg, retinal implants). This study aims to validate two new measures of functional performance vision-related outcomes in orientation and mobility (VROOM) and orientation and mobility outcomes (OMO) in the context of ordinary O&M assessments in Australia, with cultural comparisons in Malaysia, also developing phone apps and online training to streamline professional assessment practices. This multiphase observational study will employ embedded mixed methods with a qualitative/quantitative priority: corating functional vision and O&M during social inquiry. Australian O&M agencies (n=15) provide the sampling frame. O&M specialists will use quota sampling to generate cross-sectional assessment data (n=400) before investigating selected cohorts in outcome studies. Cultural relevance of the VROOM and OMO tools will be investigated in Malaysia, where the tools will inform the design of assistive devices and evaluate prototypes. Exploratory and confirmatory factor analysis, Rasch modelling, cluster analysis and analysis of variance will be undertaken along with descriptive analysis of measurement data. Qualitative findings will be used to interpret VROOM and OMO scores, filter statistically significant results, warrant their generalisability and identify additional relevant constructs that could also be measured. Ethical

  10. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  11. Development of bull trout sampling protocols

    Science.gov (United States)

    R. F. Thurow; J. T. Peterson; J. W. Guzevich

    2001-01-01

    This report describes results of research conducted in Washington in 2000 through Interagency Agreement #134100H002 between the U.S. Fish and Wildlife Service (USFWS) and the U.S. Forest Service Rocky Mountain Research Station (RMRS). The purpose of this agreement is to develop a bull trout (Salvelinus confluentus) sampling protocol by integrating...

  12. A Three-Tier Diagnostic Test to Assess Pre-Service Teachers' Misconceptions about Global Warming, Greenhouse Effect, Ozone Layer Depletion, and Acid Rain

    Science.gov (United States)

    Arslan, Harika Ozge; Cigdemoglu, Ceyhan; Moseley, Christine

    2012-01-01

    This study describes the development and validation of a three-tier multiple-choice diagnostic test, the atmosphere-related environmental problems diagnostic test (AREPDiT), to reveal common misconceptions of global warming (GW), greenhouse effect (GE), ozone layer depletion (OLD), and acid rain (AR). The development of a two-tier diagnostic test…

  13. Interplanetary Overlay Network Bundle Protocol Implementation

    Science.gov (United States)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  14. Protecting the ozone layer.

    Science.gov (United States)

    Munasinghe, M; King, K

    1992-06-01

    Stratospheric ozone layer depletion has been recognized as a problem by the Vienna Convention for the Protection of the Ozone Layer and the 1987 Montreal Protocol (MP). The ozone layer shields the earth from harmful ultraviolet radiation (UV-B), which is more pronounced at the poles and around the equator. Industrialized countries have contributed significantly to the problem by releasing chlorofluorocarbons (CFCs) and halons into the atmosphere. The effect of these chemicals, which were known for their inertness, nonflammability, and nontoxicity, was discovered in 1874. Action to deal with the effects of CFCs and halons was initiated in 1985 in a 49-nation UN meeting. 21 nations signed a protocol limiting ozone depleting substances (ODS): CFCs and halons. Schedules were set based on each country's use in 1986; the target phaseout was set for the year 2000. The MP restricts trade in ODSs and weights the impact of substances to reflect the extent of damage; i.e., halons are 10 times more damaging than CFCs. ODS requirements for developing countries were eased to accommodate scarce resources and the small fraction of ODS emissions. An Interim Multilateral Fund under the Montreal Protocol (IMFMP) was established to provide loans to finance the costs to developing countries in meeting global environmental requirements. The IMFMP is administered by the World Bank, the UN Environmental Program, and the UN Development Program. Financing is available to eligible countries who use .3 kg of ODS/person/year. Rapid phaseout in developed countries has occurred due to strong support from industry and a lower than expected cost. Although there are clear advantages to rapid phaseout, there were no incentives included in the MP for rapid phaseout. Some of the difficulties occur because the schedules set minimum targets at the lowest possible cost. Also, costs cannot be minimized by a country-specific and ODS-specific process. The ways to improve implementation in scheduling and

  15. A Comparison Between the OSI Reference Model and the B-ISDN Protocol Reference Model

    DEFF Research Database (Denmark)

    Staalhagen, Lars

    1996-01-01

    This article aims at comparing the Open Systems Interconnection (OSI) Reference Model (RM) and the broadband integrated services digital network (B-ISDN) Protocol Reference Model (PRM). According to the International Telecommunications Union - Telecommunications Sector (ITU-T), the exact...... relationship between the lower layers of the OSI RM and the B-ISDN PRM is for further study. It is therefore the intention of this article to present some views on these relationships which hopefully could facilitate an interconnection between B-ISDN and data networks conforming to the OSI standards....

  16. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  17. 911 Call Center (PSAP) Service Areas, Master coverage of "atom" features used as a source to generate several derivative layers for the Sheriff RMS and E-911 map rolls. Cover is painstakingly maintained interactively by GIS staff. All atom boundaries are snapped to the road centerline cover, Published in 2008, 1:1200 (1in=100ft) scale, Sedgwick County Government.

    Data.gov (United States)

    NSGIC Local Govt | GIS Inventory — 911 Call Center (PSAP) Service Areas dataset current as of 2008. Master coverage of "atom" features used as a source to generate several derivative layers for the...

  18. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  19. Distributed Cross-layer Monitoring in Wireless Mesh Networks

    OpenAIRE

    Panmin, Ye; Yong,

    2009-01-01

    Wireless mesh networks has rapid development over the last few years. However, due to properties such as distributed infrastructure and interference, which strongly affect the performance of wireless mesh networks, developing technology has to face the challenge of architecture and protocol design issues. Traditional layered protocols do not function efficiently in multi-hop wireless environments. To get deeper understanding on interaction of the layered protocols and optimize the performance...

  20. Protocol for a cohort study of adolescent mental health service users with a nested cluster randomised controlled trial to assess the clinical and cost-effectiveness of managed transition in improving transitions from child to adult mental health services (the MILESTONE study)

    DEFF Research Database (Denmark)

    Singh, Swaran P.; Tuomainen, Helena; Girolamo, Giovanni De

    2017-01-01

    of 840 participants randomised in a 1:2 intervention to control are required, providing 89% power to detect a difference in HoNOSCA score of 0.30 SD. The addition of 210 recruits for the cohort study ensures sufficient power for studying predictors, resulting in 1050 participants and an approximate 1...... Healthcare) study evaluates the longitudinal course and outcomes of adolescents approaching the transition boundary (TB) of their CAMHS and determines the effectiveness of the model of managed transition in improving outcomes, compared with usual care. Methods and analysis This is a cohort study......:3 randomisation. Ethics and dissemination The study protocol was approved by the UK National Research Ethics Service (15/WM/0052) and equivalent ethics boards in participating countries. Results will be reported at conferences, in peer-reviewed publications and to all relevant stakeholder groups. Trial...

  1. Real-time communication protocols: an overview

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Jansen, P.G.

    2003-01-01

    This paper describes several existing data link layer protocols that provide real-time capabilities on wired networks, focusing on token-ring and Carrier Sense Multiple Access based networks. Existing modifications to provide better real-time capabilities and performance are also described. Finally

  2. National Flood Hazard Layer (NFHL)

    Data.gov (United States)

    Federal Emergency Management Agency, Department of Homeland Security — The National Flood Hazard Layer (NFHL) is a compilation of GIS data that comprises a nationwide digital Flood Insurance Rate Map. The GIS data and services are...

  3. A software defined RTU multi-protocol automatic adaptation data transmission method

    Science.gov (United States)

    Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng

    2018-02-01

    Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.

  4. Cross Layer QoS Provisioning in Home Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Brewka, Lukasz Jerzy; Ruepp, Sarah Renée

    2011-01-01

    This paper introduces an innovative QoS provisioning scheme in home networks, by utilizing Optical Wireless (OW) MAC specification proposed by Home Gigabit Access Project (OMEGA) project. The specification is characterized by its resource reservation protocol and the use of Time Division Multiple...... Access (TDMA). By adopting OW MAC to the widely supported Universal Plug and Play – Quality of Service (UPnP-QoS) Architecture in the simulated home domain, algorithms for cross layer mapping QoS requirements are proposed. Compared to utilizing WLAN MAC, our scheme is able to provide guaranteed Qo......S levels to streams with different priorities, especially to delay-sensitive services. Efficiencies of the algorithms and network performance are validated by analyzing the results collected from OPNET simulation models....

  5. Cross-layer design in optical networks

    CERN Document Server

    Brandt-Pearce, Maïté; Demeester, Piet; Saradhi, Chava

    2013-01-01

    Optical networks have become an integral part of the communications infrastructure needed to support society’s demand for high-speed connectivity.  Cross-Layer Design in Optical Networks addresses topics in optical network design and analysis with a focus on physical-layer impairment awareness and network layer service requirements, essential for the implementation and management of robust scalable networks.  The cross-layer treatment includes bottom-up impacts of the physical and lambda layers, such as dispersion, noise, nonlinearity, crosstalk, dense wavelength packing, and wavelength line rates, as well as top-down approaches to handle physical-layer impairments and service requirements.

  6. Modular VO oriented Java EE service deployer

    Science.gov (United States)

    Molinaro, Marco; Cepparo, Francesco; De Marco, Marco; Knapic, Cristina; Apollo, Pietro; Smareglia, Riccardo

    2014-07-01

    The International Virtual Observatory Alliance (IVOA) has produced many standards and recommendations whose aim is to generate an architecture that starts from astrophysical resources, in a general sense, and ends up in deployed consumable services (that are themselves astrophysical resources). Focusing on the Data Access Layer (DAL) system architecture, that these standards define, in the last years a web based application has been developed and maintained at INAF-OATs IA2 (Italian National institute for Astrophysics - Astronomical Observatory of Trieste, Italian center of Astronomical Archives) to try to deploy and manage multiple VO (Virtual Observatory) services in a uniform way: VO-Dance. However a set of criticalities have arisen since when the VO-Dance idea has been produced, plus some major changes underwent and are undergoing at the IVOA DAL layer (and related standards): this urged IA2 to identify a new solution for its own service layer. Keeping on the basic ideas from VO-Dance (simple service configuration, service instantiation at call time and modularity) while switching to different software technologies (e.g. dismissing Java Reflection in favour of Enterprise Java Bean, EJB, based solution), the new solution has been sketched out and tested for feasibility. Here we present the results originating from this test study. The main constraints for this new project come from various fields. A better homogenized solution rising from IVOA DAL standards: for example the new DALI (Data Access Layer Interface) specification that acts as a common interface system for previous and oncoming access protocols. The need for a modular system where each component is based upon a single VO specification allowing services to rely on common capabilities instead of homogenizing them inside service components directly. The search for a scalable system that takes advantage from distributed systems. The constraints find answer in the adopted solutions hereafter sketched. The

  7. FTR: Performance-Aware and Energy-Efficient Communication Protocol for Integrating Sensor Networks into the Internet

    Directory of Open Access Journals (Sweden)

    Sinung Suakanto

    2014-11-01

    Full Text Available Integrating sensor networks into the Internet brings many advantages. For example, users can monitor or control the state of the sensors remotely without visiting the field. Some researchers have proposed methods using a REST-based web service or HTTP to establish communication between sensors and server via the Internet. Unfortunately, as we know, HTTP is a best-effort service. In some cases this means that if the number of sensors increases the end-to-end Quality of Service will decrease. The end-to-end network delay increases, as well as the failure rate of data sending caused by HTTP timeouts. In this paper, we propose Finite Time Response (FTR HTTP as a communication protocol suitable for integrating sensor networks into the Internet. We have defined a cross-layer approach that coordinates between the application layer and the physical layer to control not only performance but also energy efficiency. The HTTP request-response delay measured at the application layer is used as the decision factor at the physical layer to control the active and sleep periods. We also propose a forced-sleep period as a control mechanism to guarantee average performance for all nodes. The experimental results have shown that FTR has the ability to maintain better performance, indicated by a lower average response time and a lower average timeout experience. Optimization is still needed to gain better performance and better energy efficiency while also considering the average value of the update time.

  8. Improving health outcomes for young people with long term conditions: The role of digital communication in current and future patient-clinician communication for NHS providers of specialist clinical services for young people - LYNC study protocol.

    Science.gov (United States)

    Griffiths, Frances E; Atherton, Helen; Barker, Jack R; Cave, Jonathan Ak; Dennick, Kathryn; Dowdall, Peter; Fraser, Joe; Huxley, Caroline; Kim, Sung-Wook; Madan, Jason J; Matharu, Harjit; Musumadi, Luhanga; Palmer, Tom M; Paul, Moli; Sankaranarayanan, Sailesh; Slowther, Anne-Marie; Sujan, Mark A; Sutcliffe, Paul A; Sturt, Jackie

    2015-01-01

    Young people living with long term conditions are vulnerable to health service disengagement. This endangers their long term health. Studies report requests for digital forms of communication - email, text, social media - with their health care team. Digital clinical communication is troublesome for the UK NHS. In this article we aim to present the research protocol for evaluating the impacts and outcomes of digital clinical communications for young people living with long term conditions and provide critical analysis of their use, monitoring and evaluation by NHS providers (LYNC study: Long term conditions, Young people, Networked Communications). The research involves: (a) patient and public involvement activities with 16-24 year olds with and without long term health conditions; (b) six literature reviews; (c) case studies - the main empirical part of the study - and (d) synthesis and a consensus meeting. Case studies use a mixed methods design. Interviews and non-participant observation of practitioners and patients communicating in up to 20 specialist clinical settings will be combined with data, aggregated at the case level (non-identifiable patient data) on a range of clinical outcomes meaningful within the case and across cases. We will describe the use of digital clinical communication from the perspective of patients, clinical staff, support staff and managers, interviewing up to 15 young people and 15 staff per case study. Outcome data includes emergency admissions, A&E attendance and DNA (did not attend) rates. Case studies will be analysed to understand impacts of digital clinical communication on patient health outcomes, health care costs and consumption, ethics and patient safety.

  9. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  10. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  11. Optimization of mobile IPv6-based handovers to support VoIP services in wireless heterogeneous networks

    DEFF Research Database (Denmark)

    Fathi, Hanane; Chakraborty, Shyam; Prasad, Ramjee

    2007-01-01

    The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers. The durat......The support of the voice over Internet Protocol (VoIP) services in next-generation wireless systems requires the coupling of mobility with quality of service. The mobile node can experience disruptions or even intermittent disconnections of an ongoing real-time session due to handovers...... at layer 3. Using analytical models, the authors evaluate MIPv4, MIPv6, fast MIPv6 (FMIPv6), and hierarchical MIPv6 (HMIPv6) and compare their performances in terms of handover delay for VoIP services. To optimize the handover delay, the authors propose to use the adaptive retransmission timer described...

  12. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  13. A Novel UDT-Based Transfer Speed-Up Protocol for Fog Computing

    Directory of Open Access Journals (Sweden)

    Zhijie Han

    2018-01-01

    Full Text Available Fog computing is a distributed computing model as the middle layer between the cloud data center and the IoT device/sensor. It provides computing, network, and storage devices so that cloud based services can be closer to IOT devices and sensors. Cloud computing requires a lot of bandwidth, and the bandwidth of the wireless network is limited. In contrast, the amount of bandwidth required for “fog computing” is much less. In this paper, we improved a new protocol Peer Assistant UDT-Based Data Transfer Protocol (PaUDT, applied to Iot-Cloud computing. Furthermore, we compared the efficiency of the congestion control algorithm of UDT with the Adobe’s Secure Real-Time Media Flow Protocol (RTMFP, based on UDP completely at the transport layer. At last, we built an evaluation model of UDT in RTT and bit error ratio which describes the performance. The theoretical analysis and experiment result have shown that UDT has good performance in IoT-Cloud computing.

  14. Turf Conversion Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  15. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  16. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  17. MITRE sensor layer prototype

    Science.gov (United States)

    Duff, Francis; McGarry, Donald; Zasada, David; Foote, Scott

    2009-05-01

    The MITRE Sensor Layer Prototype is an initial design effort to enable every sensor to help create new capabilities through collaborative data sharing. By making both upstream (raw) and downstream (processed) sensor data visible, users can access the specific level, type, and quantities of data needed to create new data products that were never anticipated by the original designers of the individual sensors. The major characteristic that sets sensor data services apart from typical enterprise services is the volume (on the order of multiple terabytes) of raw data that can be generated by most sensors. Traditional tightly coupled processing approaches extract pre-determined information from the incoming raw sensor data, format it, and send it to predetermined users. The community is rapidly reaching the conclusion that tightly coupled sensor processing loses too much potentially critical information.1 Hence upstream (raw and partially processed) data must be extracted, rapidly archived, and advertised to the enterprise for unanticipated uses. The authors believe layered sensing net-centric integration can be achieved through a standardize-encapsulate-syndicateaggregate- manipulate-process paradigm. The Sensor Layer Prototype's technical approach focuses on implementing this proof of concept framework to make sensor data visible, accessible and useful to the enterprise. To achieve this, a "raw" data tap between physical transducers associated with sensor arrays and the embedded sensor signal processing hardware and software has been exploited. Second, we encapsulate and expose both raw and partially processed data to the enterprise within the context of a service-oriented architecture. Third, we advertise the presence of multiple types, and multiple layers of data through geographic-enabled Really Simple Syndication (GeoRSS) services. These GeoRSS feeds are aggregated, manipulated, and filtered by a feed aggregator. After filtering these feeds to bring just the type

  18. Design and FPGA implementation for MAC layer of Ethernet PON

    Science.gov (United States)

    Zhu, Zengxi; Lin, Rujian; Chen, Jian; Ye, Jiajun; Chen, Xinqiao

    2004-04-01

    Ethernet passive optical network (EPON), which represents the convergence of low-cost, high-bandwidth and supporting multiple services, appears to be one of the best candidates for the next-generation access network. The work of standardizing EPON as a solution for access network is still underway in the IEEE802.3ah Ethernet in the first mile (EFM) task force. The final release is expected in 2004. Up to now, there has been no standard application specific integrated circuit (ASIC) chip available which fulfills the functions of media access control (MAC) layer of EPON. The MAC layer in EPON system has many functions, such as point-to-point emulation (P2PE), Ethernet MAC functionality, multi-point control protocol (MPCP), network operation, administration and maintenance (OAM) and link security. To implement those functions mentioned above, an embedded real-time operating system (RTOS) and a flexible programmable logic device (PLD) with an embedded processor are used. The software and hardware functions in MAC layer are realized through programming embedded microprocessor and field programmable gate array(FPGA). Finally, some experimental results are given in this paper. The method stated here can provide a valuable reference for developing EPON MAC layer ASIC.

  19. Layers And Processes In The Model Of Technological Postal System

    Directory of Open Access Journals (Sweden)

    Madleňáková Lucia

    2015-12-01

    Full Text Available The paper include important aspects of layer model of postal technological system such as makes the possibility to define rules for regulating, technical and technological requirements and interfaces to communicate with other postal systems. The current postal reform is mainly attributable to release of network access and ensuring full interoperability between technological systems. Not only to ensure the development and protection of competition but also in respect to the conservation of requirements to provide the universal service, which is the performance of public interest. There is a space here to examine the postal system, not only from a procedural point of view, but to be viewed as an open communication system. It is possible to find there the commonalities with other communication sector branches and to handle the technological postal system in more layers; similarly as the electronic communication systems are handled. Model of layer postal system, based not only on the processes but on layers functionality, will enable to identify communication protocols and interfaces determining interoperability. It also opens the question of appropriate regulation model.

  20. Implementation of the Enhanced Moderated Online Social Therapy (MOST+) Model Within a National Youth E-Mental Health Service (eheadspace): Protocol for a Single Group Pilot Study for Help-Seeking Young People.

    Science.gov (United States)

    Rice, Simon; Gleeson, John; Leicester, Steven; Bendall, Sarah; D'Alfonso, Simon; Gilbertson, Tamsyn; Killackey, Eoin; Parker, Alexandra; Lederman, Reeva; Wadley, Greg; Santesteban-Echarri, Olga; Pryor, Ingrid; Mawren, Daveena; Ratheesh, Aswin; Alvarez-Jimenez, Mario

    2018-02-22

    using MOST+. Recruitment for the study commenced in October 2017. We expect to have initial results in March 2018, with more detailed qualitative and quantitative analyses to follow. This is the first Australia-wide research trial to pilot an online social media platform merging real-time clinical support, expert and peer moderation, interactive online therapy, and peer-to-peer social networking. The importance of the project stems from the need to develop innovative new models for the efficient delivery of responsive evidence-based online support to help-seeking young people. If successful, this research stands to complement and enhance e-mental health services in Australia. ©Simon Rice, John Gleeson, Steven Leicester, Sarah Bendall, Simon D'Alfonso, Tamsyn Gilbertson, Eoin Killackey, Alexandra Parker, Reeva Lederman, Greg Wadley, Olga Santesteban-Echarri, Ingrid Pryor, Daveena Mawren, Aswin Ratheesh, Mario Alvarez-Jimenez. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 22.02.2018.

  1. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  2. Radio protocols for LTE and LTE-advanced

    CERN Document Server

    Yi, SeungJune; Lee, YoungDae; Park, SungJun; Jung, SungHoon

    2012-01-01

    Provides a unique focus on radio protocols for LTE and LTE-Advanced (LTE-A) Giving readers a valuable understanding of LTE radio protocols, this book covers LTE (Long-Term Evolution) Layer 2/3 radio protocols as well as new features including LTE-Advanced. It is divided into two sections to differentiate between the two technologies' characteristics. The authors systematically explain the design principles and functions of LTE radio protocols during the development of mobile handsets. The book also provides essential knowledge on the interaction between mobile networks a

  3. Telemetry Standards, IRIG Standard 106-17, Chapter 22, Network Based Protocol Suite

    Science.gov (United States)

    2017-07-01

    requirements. 22.2 Network Access Layer 22.2.1 Physical Layer Connectors and cable media should meet the electrical or optical properties required by the...Telemetry Standards, IRIG Standard 106-17 Chapter 22, July 2017 i CHAPTER 22 Network -Based Protocol Suite Acronyms...iii Chapter 22. Network -Based Protocol Suite

  4. Optimization and Verification of the TR-MAC Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    Morshed, S.; Heijenk, Geert

    2015-01-01

    Energy-efficiency is an important requirement in the design of communication protocols for wireless sensor networks (WSN). TR-MAC is an energy-efficient medium access control (MAC) layer protocol for low power WSN that exploits transmitted-reference (TR) modulation in the physical layer. The

  5. Quality-of-service sensitivity to bio-inspired/evolutionary computational methods for intrusion detection in wireless ad hoc multimedia sensor networks

    Science.gov (United States)

    Hortos, William S.

    2012-06-01

    In the author's previous work, a cross-layer protocol approach to wireless sensor network (WSN) intrusion detection an identification is created with multiple bio-inspired/evolutionary computational methods applied to the functions of the protocol layers, a single method to each layer, to improve the intrusion-detection performance of the protocol over that of one method applied to only a single layer's functions. The WSN cross-layer protocol design embeds GAs, anti-phase synchronization, ACO, and a trust model based on quantized data reputation at the physical, MAC, network, and application layer, respectively. The construct neglects to assess the net effect of the combined bioinspired methods on the quality-of-service (QoS) performance for "normal" data streams, that is, streams without intrusions. Analytic expressions of throughput, delay, and jitter, coupled with simulation results for WSNs free of intrusion attacks, are the basis for sensitivity analyses of QoS metrics for normal traffic to the bio-inspired methods.

  6. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  7. Bandwidth Estimation in Wireless Lans for Multimedia Streaming Services

    Directory of Open Access Journals (Sweden)

    Heung Ki Lee

    2007-01-01

    Full Text Available The popularity of multimedia streaming services via wireless networks presents major challenges in the management of network bandwidth. One challenge is to quickly and precisely estimate the available bandwidth for the decision of streaming rates of layered and scalable multimedia services. Previous studies based on wired networks are too burdensome to be applied to multimedia applications in wireless networks. In this paper, a new method, IdleGap, is suggested to estimate the available bandwidth of a wireless LAN based on the information from a low layer in the protocol stack. We use a network simulation tool, NS-2, to evaluate our new method with various ranges of cross-traffic and observation times. Our simulation results show that IdleGap accurately estimates the available bandwidth for all ranges of cross-traffic (100 Kbps ∼ 1 Mbps with a very short observation time of 10 seconds.

  8. Layered materials

    Science.gov (United States)

    Johnson, David; Clarke, Simon; Wiley, John; Koumoto, Kunihito

    2014-06-01

    Layered compounds, materials with a large anisotropy to their bonding, electrical and/or magnetic properties, have been important in the development of solid state chemistry, physics and engineering applications. Layered materials were the initial test bed where chemists developed intercalation chemistry that evolved into the field of topochemical reactions where researchers are able to perform sequential steps to arrive at kinetically stable products that cannot be directly prepared by other approaches. Physicists have used layered compounds to discover and understand novel phenomena made more apparent through reduced dimensionality. The discovery of charge and spin density waves and more recently the remarkable discovery in condensed matter physics of the two-dimensional topological insulating state were discovered in two-dimensional materials. The understanding developed in two-dimensional materials enabled subsequent extension of these and other phenomena into three-dimensional materials. Layered compounds have also been used in many technologies as engineers and scientists used their unique properties to solve challenging technical problems (low temperature ion conduction for batteries, easy shear planes for lubrication in vacuum, edge decorated catalyst sites for catalytic removal of sulfur from oil, etc). The articles that are published in this issue provide an excellent overview of the spectrum of activities that are being pursued, as well as an introduction to some of the most established achievements in the field. Clusters of papers discussing thermoelectric properties, electronic structure and transport properties, growth of single two-dimensional layers, intercalation and more extensive topochemical reactions and the interleaving of two structures to form new materials highlight the breadth of current research in this area. These papers will hopefully serve as a useful guideline for the interested reader to different important aspects in this field and

  9. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  10. Dynamic-Threshold-Limited Timed-Token (DTLTT) Protocol | Kalu ...

    African Journals Online (AJOL)

    An improved version of the Static-Threshold-Limited On-Demand Guaranteed Service Timed-Token (STOGSTT) Media Access Control (MAC) protocol for channel capacity allocation to the asynchronous trac in Multiservice Local Area Network (MLANs) was developed and analyzed. TLODGSTT protocol uses static value of ...

  11. Password Authenticated Key Exchange and Protected Password Change Protocols

    Directory of Open Access Journals (Sweden)

    Ting-Yi Chang

    2017-07-01

    Full Text Available In this paper, we propose new password authenticated key exchange (PAKE and protected password change (PPC protocols without any symmetric or public-key cryptosystems. The security of the proposed protocols is based on the computational Diffie-Hellman assumption in the random oracle model. The proposed scheme can resist both forgery server and denial of service attacks.

  12. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  13. A novel virtual hub approach for multisource downstream service integration

    Science.gov (United States)

    Previtali, Mattia; Cuca, Branka; Barazzetti, Luigi

    2016-08-01

    A large development of downstream services is expected to be stimulated starting from earth observations (EO) datasets acquired by Copernicus satellites. An important challenge connected with the availability of downstream services is the possibility for their integration in order to create innovative applications with added values for users of different categories level. At the moment, the world of geo-information (GI) is extremely heterogeneous in terms of standards and formats used, thus preventing a facilitated access and integration of downstream services. Indeed, different users and data providers have also different requirements in terms of communication protocols and technology advancement. In recent years, many important programs and initiatives have tried to address this issue even on trans-regional and international level (e.g. INSPIRE Directive, GEOSS, Eye on Earth and SEIS). However, a lack of interoperability between systems and services still exists. In order to facilitate the interaction between different downstream services, a new architectural approach (developed within the European project ENERGIC OD) is proposed in this paper. The brokering-oriented architecture introduces a new mediation layer (the Virtual Hub) which works as an intermediary to bridge the gaps linked to interoperability issues. This intermediation layer de-couples the server and the client allowing a facilitated access to multiple downstream services and also Open Data provided by national and local SDIs. In particular, in this paper an application is presented integrating four services on the topic of agriculture: (i) the service given by Space4Agri (providing services based on MODIS and Landsat data); (ii) Gicarus Lab (providing sample services based on Landsat datasets) and (iii) FRESHMON (providing sample services for water quality) and services from a several regional SDIs.

  14. Evaluation of filters in RSPCS (Reactor Service Pool Cooling System) and HWL (Hot Water Layer) in OPAL research reactor at ANSTO (Australian Nuclear Science and Technology Organization) using Gamma Spectrometry System and Liquid Scintillation Counter

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jim In; Foy, Robin; Jung, Seong Moon; Park, Hyeon Suk; Ye, Sung Joon [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    Australian Nuclear Science and Technology Organization(ANSTO) has a research reactor, OPAL (Open Pool Australian Lightwater reactor) which is a state-of-art 20 MW reactor for various purposes. In OPAL reactor, there are many kinds of radionuclides produced from various reactions in pool water and those should be identified and quantified for the safe use of OPAL. To do that, it is essential to check the efficiency of filters which are able to remove the radioactive substance from the reactor pool water. There are two main water circuits in OPAL which are RSPCS (Reactor Service Pool Cooling System) and HWL (Hot Water Layer) water circuits. The reactor service pool is connected to the reactor pool via a transfer canal and provides a working area and storage space for the spent and other materials. Also, HWL is the upper part of the reactor pool water and it minimize radiation dose rates at the pool surface. We collected water samples from these circuits and measured the radioactivity by using Gamma Spectrometry System (GSS) and Liquid Scintillation Counter (LSC) to evaluate the filters. We could evaluate the efficiency of filters in RSPCS and HWL in OPAL research reactor. Through the measurements of radioactivity using GSS and LSC, we could conclude that there is likely to be no alpha emitter in water samples, and for beta and gamma activity, there are very big differences between inlet and outlet results, so every filter is working efficiently to remove the radioactive substance.

  15. CCSDS Advanced Orbiting Systems Virtual Channel Access Service for QoS MACHETE Model

    Science.gov (United States)

    Jennings, Esther H.; Segui, John S.

    2011-01-01

    To support various communications requirements imposed by different missions, interplanetary communication protocols need to be designed, validated, and evaluated carefully. Multimission Advanced Communications Hybrid Environment for Test and Evaluation (MACHETE), described in "Simulator of Space Communication Networks" (NPO-41373), NASA Tech Briefs, Vol. 29, No. 8 (August 2005), p. 44, combines various tools for simulation and performance analysis of space networks. The MACHETE environment supports orbital analysis, link budget analysis, communications network simulations, and hardware-in-the-loop testing. By building abstract behavioral models of network protocols, one can validate performance after identifying the appropriate metrics of interest. The innovators have extended the MACHETE model library to include a generic link-layer Virtual Channel (VC) model supporting quality-of-service (QoS) controls based on IP streams. The main purpose of this generic Virtual Channel model addition was to interface fine-grain flow-based QoS (quality of service) between the network and MAC layers of the QualNet simulator, a commercial component of MACHETE. This software model adds the capability of mapping IP streams, based on header fields, to virtual channel numbers, allowing extended QoS handling at link layer. This feature further refines the QoS v existing at the network layer. QoS at the network layer (e.g. diffserv) supports few QoS classes, so data from one class will be aggregated together; differentiating between flows internal to a class/priority is not supported. By adding QoS classification capability between network and MAC layers through VC, one maps multiple VCs onto the same physical link. Users then specify different VC weights, and different queuing and scheduling policies at the link layer. This VC model supports system performance analysis of various virtual channel link-layer QoS queuing schemes independent of the network-layer QoS systems.

  16. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  17. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  18. Operating System Services for Networked Clusters

    National Research Council Canada - National Science Library

    Bershad, Brian

    2003-01-01

    ...: communication, security, and services. In the area of communication, we developed a new computing infrastructure for partitioning protocols between the primary processor and an embedded co processor...

  19. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  20. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  1. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  2. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  3. Protocols for second-generation business satellites systems

    Science.gov (United States)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  4. Variability in donation after cardiac death protocols: a national survey.

    Science.gov (United States)

    Fugate, Jennifer E; Stadtler, Maria; Rabinstein, Alejandro A; Wijdicks, Eelco F M

    2011-02-27

    As donation after cardiac death practices expand, the number of institutional policies is increasing. We contacted organ procurement organizations throughout the United States and requested protocols in hospitals in their donor service areas. Sixty-four protocols were obtained with representation from 16 different states. The terminology and recommended practices varied substantially. The methods for death determination were not specified in 28 (44%) protocols. Most adhered to a 2- to 5-min observation time between circulatory arrest and organ procurement, but 10 (16%) provided no information. This variability reveals a need to define a uniform standard in donation after cardiac death protocols and death determination practices.

  5. Programming Web Services with SOAP

    CERN Document Server

    Snell, James L; Kulchenko, Pavel

    2002-01-01

    The web services architecture provides a new way to think about and implement application-to-application integration and interoperability that makes the development platform irrelevant. Two applications, regardless of operating system, programming language, or any other technical implementation detail, communicate using XML messages over open Internet protocols such as HTTP or SMTP. The Simple Open Access Protocol (SOAP) is a specification that details how to encode that information and has become the messaging protocol of choice for Web services.Programming Web Services with SOAP is a detail

  6. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  7. Análises de protocolos de braquiterapia, por alta taxa de dose, do controle de qualidade de alguns serviços locais, baseados no TG40, TG56 e ARCAL XXX Analysis of the high dose rate brachytherapy protocols of quality assurance programs of some local services, based on TG40, TG56 and ARCAL XXX.

    Directory of Open Access Journals (Sweden)

    Carmen S. Guzmán Calcina

    2001-08-01

    paper was to determine the types of tests for high dose rate equipment required by official protocols (TG40, TG56 and ARCAL XXX and to compare them with the types of tests utilized by some radiotherapy services. We concluded that: a the protocol TG56 is more extensive and complete than the other official protocols (TG40 and ARCAL XXX; b the protocols used by the services evaluated on this study were based on the protocol TG56, and were concordant with the other official protocols. In these protocols annual tests were frequently replaced by tests performed quarterly or twice a year. This study established the types of test used and their frequency of utilization, and permitted the design of an optimized protocol that may help in the implementation of basic and indispensable tests in order to ensure patient adequate treatment and safety to personnel involved, and consequently improve high dose rate brachytherapy quality assurance.

  8. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  9. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  10. Cluster Based Hierarchical Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, Md. Golam; Kabir, M. Hasnat; Rahim, Muhammad Sajjadur; Ullah, Shaikh Enayet

    2012-01-01

    The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. In this paper, we propose a two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP). We introduce a new concept called head-set, consists of one active cluster head and some other associate cluster heads within a cluster. The head-set members are responsible for control and management of the network. Results show that t...

  11. Concurrent support of higher-layer protocols over WDM

    NARCIS (Netherlands)

    Theelen, B.D.; Voeten, J.P.M.; Putten, van der P.H.A.; Stevens, M.P.J.; Dorren, H.J.S.

    2002-01-01

    To satisfy the severe requirements involved in future communication networks, commercial and research interest in the applicability of wavelength division multiplexing (WDM) is growing. However, since WDM is merely concerned with transmitting bits over optical fibers, full advantage can only be

  12. a transport layer protocol using adaptive loss recovery method for ...

    Indian Academy of Sciences (India)

    Ayhan Kİraz

    Recently, critical projects were developed using wireless sensor network (WSN) such as medical and military ... provide high reliability, low power consumption, low end- to-end ... transmission and lower end-to-end packet latency values.

  13. Cooperating systems: Layered MAS

    Science.gov (United States)

    Rochowiak, Daniel

    1990-01-01

    Distributed intelligent systems can be distinguished by the models that they use. The model developed focuses on layered multiagent system conceived of as a bureaucracy in which a distributed data base serves as a central means of communication. The various generic bureaus of such a system is described and a basic vocabulary for such systems is presented. In presenting the bureaus and vocabularies, special attention is given to the sorts of reasonings that are appropriate. A bureaucratic model has a hierarchy of master system and work group that organizes E agents and B agents. The master system provides the administrative services and support facilities for the work groups.

  14. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  15. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    Science.gov (United States)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  16. Analysis of energy efficient routing protocols for implementation of a ubiquitous health system

    Science.gov (United States)

    Kwon, Jongwon; Park, Yongman; Koo, Sangjun; Ayurzana, Odgeral; Kim, Hiesik

    2007-12-01

    The innovative Ubiquitous-Health was born through convergence of medical service, with development of up to date information technologies and ubiquitous IT. The U-Health can be applied to a variety of special situations for managing functions of each medical center efficiently. This paper focuses on estimation of various routing protocols for implementation of U-health monitoring system. In order to facilitate wireless communication over the network, a routing protocol on the network layer is used to establish precise and efficient route between sensor nodes so that information acquired from sensors may be delivered in a timely manner. A route establishment should be considered to minimize overhead, data loss and power consumption because wireless networks for U-health are organized by a large number of sensor nodes which are small in size and have limited processing power, memory and battery life. In this paper a overview of wireless sensor network technologies commonly known is described as well as evaluation of three multi hop routing protocols which are flooding, gossiping and modified low energy adaptive clustering hierarchy(LEACH) for use with these networks using TOSSIM simulator. As a result of evaluation the integrated wireless sensor board was developed in particular. The board is embedded device based on AVR128 porting TinyOS. Also it employs bio sensor measures blood pressure, pulse frequency and ZigBee module for wireless communication. This paper accelerates the digital convergence age through continual research and development of technologies related the U-Health.

  17. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  18. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  19. Live chat alternative security protocol

    Science.gov (United States)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  20. A Study of Quality of Service Communication for High-Speed Packet-Switching Computer Sub-Networks

    Science.gov (United States)

    Cui, Zhenqian

    1999-01-01

    In this thesis, we analyze various factors that affect quality of service (QoS) communication in high-speed, packet-switching sub-networks. We hypothesize that sub-network-wide bandwidth reservation and guaranteed CPU processing power at endpoint systems for handling data traffic are indispensable to achieving hard end-to-end quality of service. Different bandwidth reservation strategies, traffic characterization schemes, and scheduling algorithms affect the network resources and CPU usage as well as the extent that QoS can be achieved. In order to analyze those factors, we design and implement a communication layer. Our experimental analysis supports our research hypothesis. The Resource ReSerVation Protocol (RSVP) is designed to realize resource reservation. Our analysis of RSVP shows that using RSVP solely is insufficient to provide hard end-to-end quality of service in a high-speed sub-network. Analysis of the IEEE 802.lp protocol also supports the research hypothesis.

  1. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  2. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  3. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  4. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  5. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  6. Methodology for the specification of communication activities within the framework of a multi-layered architecture: Toward the definition of a knowledge base

    Science.gov (United States)

    Amyay, Omar

    A method defined in terms of synthesis and verification steps is presented. The specification of the services and protocols of communication within a multilayered architecture of the Open Systems Interconnection (OSI) type is an essential issue for the design of computer networks. The aim is to obtain an operational specification of the protocol service couple of a given layer. Planning synthesis and verification steps constitute a specification trajectory. The latter is based on the progressive integration of the 'initial data' constraints and verification of the specification originating from each synthesis step, through validity constraints that characterize an admissible solution. Two types of trajectories are proposed according to the style of the initial specification of the service protocol couple: operational type and service supplier viewpoint; knowledge property oriented type and service viewpoint. Synthesis and verification activities were developed and formalized in terms of labeled transition systems, temporal logic and epistemic logic. The originality of the second specification trajectory and the use of the epistemic logic are shown. An 'artificial intelligence' approach enables a conceptual model to be defined for a knowledge base system for implementing the method proposed. It is structured in three levels of representation of the knowledge relating to the domain, the reasoning characterizing synthesis and verification activities and the planning of the steps of a specification trajectory.

  7. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  8. Report, realized on behalf of the foreign Affairs, the Defense and the Armed Forces Commission: - on the law project, carried by the Senate, authorizing the approval of the amendment for the 16 september 1987 Montreal protocol relative to the substances which impoverish the ozone layer, adopted at Montreal the 17 september 1997; - and on the law project, carried by the Senate, authorizing the approval of the amendment for the 16 september 1987 Montreal protocol relative to the substances which impoverish the ozone layer, adopted at Pekin the 3 december 1999

    Energy Technology Data Exchange (ETDEWEB)

    Guillet, J.J.

    2003-07-01

    The document presents the text of the law projects concerning the substances which impoverish the ozone layer. Facts of science,protection systems and the two amendments adopted at Montreal in 1997 and Pekin in 1999 are discussed. For each countries data on the substances impoverish the ozone layer, are also given. (A.L.B.)

  9. Communicating systems with UML 2 modeling and analysis of network protocols

    CERN Document Server

    Barrera, David Garduno

    2013-01-01

    This book gives a practical approach to modeling and analyzing communication protocols using UML 2. Network protocols are always presented with a point of view focusing on partial mechanisms and starting models. This book aims at giving the basis needed for anybody to model and validate their own protocols. It follows a practical approach and gives many examples for the description and analysis of well known basic network mechanisms for protocols.The book firstly shows how to describe and validate the main protocol issues (such as synchronization problems, client-server interactions, layer

  10. The depletion of the stratospheric ozone layer

    International Nuclear Information System (INIS)

    Sabogal Nelson

    2000-01-01

    The protection of the Earth's ozone layer is of the highest importance to mankind. The dangers of its destruction are by now well known. The depletion of that layer has reached record levels. The Antarctic ozone hole covered this year a record area. The ozone layer is predicted to begin recovery in the next one or two decades and should be restored to pre-1980 levels by 2050. This is the achievement of the regime established by the 1985 Vienna Convention for the Protection of the Ozone Layer and the 1987 Montreal Protocol on Substances that Deplete the Ozone Layer. The regime established by these two agreements has been revised, and made more effective in London (1990), Copenhagen (1992), Vienna (1995), and Beijing (1999)

  11. A Review of Communications Protocol for Intelligent Remote Terminal Unit Development

    Directory of Open Access Journals (Sweden)

    Mohd Ruddin Ab. Ghani

    2013-11-01

    Full Text Available This paper reviewed all the possible interfacing communication protocols for remote terminal unit (RTU. Supervisory Control and Data Acquisition (SCADA system is a central station that can communicate with other network using the protocol. Fundamentally, the architectures of all networks are based on the seven layers of open system interconnection (OSI and International Standard Organization (ISO. The objective of designing the protocols is to check the status of all the input and output field devices and send the report according to that status. The corresponding protocol and communication parameters between the connecting devices will be included in designing a complex SCADA system. The available protocols to develop the communication of RTU are Modbus/ASCII, distributed network protocol (DNP3, controller area network (CAN, International Electro-technical Commission (IEC 60870, transmission control protocol/internet protocol (TCP/IP.

  12. Functional principles of registry-based service discovery

    NARCIS (Netherlands)

    Sundramoorthy, V.; Tan, C.; Hartel, P.H.; Hartog, den J.I.; Scholten, J.

    2005-01-01

    As Service Discovery Protocols (SDP) are becoming increasingly important for ubiquitous computing, they must behave according to predefined principles. We present the functional Principles of Service Discovery for robust, registry-based service discovery. A methodology to guarantee adherence to

  13. Ambient Layer-by-Layer ZnO Assembly for Highly Efficient Polymer Bulk Heterojunction Solar Cells

    KAUST Repository

    Eita, Mohamed Samir; El Labban, Abdulrahman; Cruciani, Federico; Usman, Anwar; Beaujuge, Pierre; Mohammed, Omar F.

    2015-01-01

    The use of metal oxide interlayers in polymer solar cells has great potential because metal oxides are abundant, thermally stable, and can be used in fl exible devices. Here, a layer-by-layer (LbL) protocol is reported as a facile, room

  14. Performance Analysis of IEEE 802.11e (EDCF) and IEEE 802.11(DCF) WLAN Incorporating Different Physical Layer Standards

    Science.gov (United States)

    Sharma, V.; Singh, H.; Malhotra, J.

    2012-12-01

    Medium access coordination function basically implements the distributed coordination function (DCF) which provides support to best effort services but limited to QoS services. Subsequently, a new standard, namely enhanced distributed channel access (EDCA) is reported. The IEEE 802.11e (EDCA) defines MAC procedures to support QoS requirements which specifies distributed contention based access scheme to access the shared wireless media. This paper evaluates the performance of EDCA based IEEE 802.11 WLAN for various access categories (ACs) using OPNET™ Modeller 14.5. Further, the computed results are compared with DCF protocols in terms of QoS parameters. Furthermore, the simulative observation is reported at data rate of 54 Mbps using different physical layer protocols such as IEEE 802.11a/b/g to stumble on the best one to be implemented with EDCF to achieve improved QoS.

  15. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  16. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  17. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  18. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  19. UV Impacts Avoided by the Montreal Protocol

    Science.gov (United States)

    Newman, Paul; McKenzie, Richard

    2010-01-01

    Temporal and geographical variabilities in the future "World Expected" UV environment are compared with the "World Avoided", which would have occurred without the Montreal Protocol on protection of the ozone layer and its subsequent amendments and adjustments. Based on calculations of clear-sky UV irradiances, the effects of the Montreal Protocol have been hugely beneficial to avoid the health risks, such as skin cancer, which are associated with high UV, while there is only a small increase in health risks, such as vitamin D deficiency, that are associated with low UV. However, interactions with climate change may lead to changes in cloud and albedo, and possibly behavioural changes which could also be important.

  20. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  1. Boundary-Layer & health

    Science.gov (United States)

    Costigliola, V.

    2010-09-01

    It has long been known that specific atmospheric processes, such as weather and longer-term climatic fluctuations, affect human health. The biometeorological literature refers to this relationship as meteorotropism, defined as a change in an organism that is correlated with a change in atmospheric conditions. Plenty of (patho)physiological functions are affected by those conditions - like the respiratory diseases - and currently it is difficult to put any limits for pathologies developed in reply. Nowadays the importance of atmospheric boundary layer and health is increasingly recognised. A number of epidemiologic studies have reported associations between ambient concentrations of air pollution, specifically particulate pollution, and adverse health effects, even at the relatively low concentrations of pollution found. Since 1995 there have been over twenty-one studies from four continents that have explicitly examined the association between ambient air pollutant mixes and daily mortality. Statistically significant and positive associations have been reported in data from various locations around the world, all with varying air pollutant concentrations, weather conditions, population characteristics and public health policies. Particular role has been given to atmospheric boundary layer processes, the impact of which for specific patient-cohort is, however, not well understood till now. Assessing and monitoring air quality are thus fundamental to improve Europe's welfare. One of current projects run by the "European Medical Association" - PASODOBLE will develop and demonstrate user-driven downstream information services for the regional and local air quality sectors by combining space-based and in-situ data with models in 4 thematic service lines: - Health community support for hospitals, pharmacies, doctors and people at risk - Public information for regions, cities, tourist industry and sporting event organizers - Compliance monitoring support on particulate

  2. Study on Cloud Security Based on Trust Spanning Tree Protocol

    Science.gov (United States)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  3. Specification and Design of a Fault Recovery Model for the Reliable Multicast Protocol

    Science.gov (United States)

    Montgomery, Todd; Callahan, John R.; Whetten, Brian

    1996-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  4. Layering and Ordering in Electrochemical Double Layers

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Yihua [Materials Science Division, Argonne National Laboratory, Argonne, Illinois 60439, United States; Kawaguchi, Tomoya [Materials Science Division, Argonne National Laboratory, Argonne, Illinois 60439, United States; Pierce, Michael S. [Rochester Institute of Technology, School of Physics and Astronomy, Rochester, New York 14623, United States; Komanicky, Vladimir [Faculty of Science, Safarik University, 041 54 Kosice, Slovakia; You, Hoydoo [Materials Science Division, Argonne National Laboratory, Argonne, Illinois 60439, United States

    2018-02-26

    Electrochemical double layers (EDL) form at electrified interfaces. While Gouy-Chapman model describes moderately charged EDL, formation of Stern layers was predicted for highly charged EDL. Our results provide structural evidence for a Stern layer of cations, at potentials close to hydrogen evolution in alkali fluoride and chloride electrolytes. Layering was observed by x-ray crystal truncation rods and atomic-scale recoil responses of Pt(111) surface layers. Ordering in the layer is confirmed by glancing-incidence in-plane diffraction measurements.

  5. On the security of the Mobile IP protocol family

    NARCIS (Netherlands)

    Meyer, Ulrike; Tschofenig, Hannes; Karagiannis, Georgios; Devetsikiotis, M.; Michailidis, G.

    2007-01-01

    The Internet Engineering Task Force (IETF) has worked on network layer mobility for more than 10 years and a number of RFCs are available by now. Although the IETF mobility protocols are not present in the Internet infrastructure as of today, deployment seems to be imminent since a number of

  6. The importance of the Montreal Protocol in protecting climate

    NARCIS (Netherlands)

    Velders, G.J.M.; Andersen, S.O.; Daniel, J.S.; Fahey, D.W.; McFarland, M.

    2007-01-01

    The 1987 Montreal Protocol on Substances that Deplete the Ozone Layer is a landmark agreement that has successfully reduced the global production, consumption, and emissions of ozone-depleting substances (ODSs). ODSs are also greenhouse gases that contribute to the radiative forcing of climate

  7. Performance Analysis of TDMA Protocol in a Femtocell Network

    Directory of Open Access Journals (Sweden)

    Wanod Kumar

    2014-07-01

    Full Text Available In this paper, we evaluate the performance of TDMA (Time Division Multiple Access protocol using queuing theory in a femtocell network. The fair use of wireless channel among the users of network is carried out using TDMA protocol. The arrival of data packets from M communicating nodes becomes multiple Poisson process. The time slots of TDMA protocol represent c servers to communicate data packets coming from communicating nodes to the input of FAP (Femtocell Access Point. The service time of each server (time slot is exponentially distributed. This complete communication scenario using TDMA protocol is modeled using M/M/c queue. The performance of the protocol is evaluated in terms of mean number in system, average system delay and utilization for varying traffic intensity

  8. A cross-sectional survey of the mental health needs of refugees and asylum seekers attending a refugee health clinic: a study protocol for using research to inform local service delivery.

    Science.gov (United States)

    Shawyer, Frances; Enticott, Joanne C; Doherty, Anne R; Block, Andrew A; Cheng, I-Hao; Wahidi, Sayed; Meadows, Graham N

    2014-12-24

    Refugees and asylum seekers have high rates of risk factors for mental disorders. In recent years, Australia has experienced a rapid increase in asylum seeker arrivals, creating new challenges for services in areas with high settlement numbers. This paper describes the design, including analytic framework, of a project set in a refugee health service in the state of Victoria, Australia, as part of their response to meeting the mental health needs of their burgeoning local population of refugees and asylum seekers. In order to assist service planning, the primary aim of this study is to determine: 1) an overall estimate of the prevalence of psychiatric disorders; 2) the specific prevalence of post-traumatic stress disorder 3) the perceived need and unmet need for mental health treatment. The secondary aim of the study is to establish matched risk ratios based on an Australian-born matched comparison group from the 2007 National Survey of Mental Health and Well-Being. A cross-sectional survey is used to estimate the prevalence of psychiatric disorders in refugees and asylum seekers attending a local refugee health service. Measures include the Kessler Psychological Distress Scale-10, the Post-Traumatic Stress Disorder-8, the General-practice User's Perceived-need Inventory together with service utilisation questions from the National Survey of Mental Health and Well-Being. Data collected from refugees and asylum seekers (n = 130) is matched to existing data from Australian-born residents drawn from the 2007 National Survey of Mental Health and Well-Being (n = 520) to produce estimates of the risk ratio. The paper describes a prototype for what is possible within regular services seeking to plan for and deliver high quality mental health care to refugees and asylum seekers. A novel project output will be the development and dissemination of an epidemiological methodology to reliably compare mental health status in a relatively small target sample with a matched

  9. Service-oriented Software Defined Optical Networks for Cloud Computing

    Science.gov (United States)

    Liu, Yuze; Li, Hui; Ji, Yuefeng

    2017-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.g., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). This paper proposes a new service-oriented software defined optical network architecture, including a resource layer, a service abstract layer, a control layer and an application layer. We then dwell on the corresponding service providing method. Different service ID is used to identify the service a device can offer. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit different services based on the service ID in the service-oriented software defined optical network.

  10. A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    A. Suruliandi

    2015-03-01

    Full Text Available Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN. They are On Demand Multicast Routing Protocol (ODMRP, Protocol for Unified Multicasting through Announcement (PUMA, Multicast Adhoc On demand Distance Vector Protocol (MAODV, Overlay Boruvka-based Adhoc Multicast Protocol (OBAMP, Application Layer Multicast Algorithm (ALMA and enhanced version of ALMA (ALMA-H for WSN. Among them, ODMRP, MAODV and PUMA are reactive protocols while OBAMP, ALMA and ALMA-H are proactive protocols. This paper compares the performance of these protocols with common parameters such as Throughput, Reliability, End-to-End delay and Packet Delivery Ratio (PDR with increasing the numbers of nodes and increasing the speed of the nodes. The main objective of this work is to select the efficient multicast routing protocol for WSN among six multicast routing protocol based on relative strength and weakness of each protocol. The summary of above six multicast routing protocols is presented with a table of different performance characteristics. Experimental result shows that ODMRP attains higher throughput, reliability and higher packet delivery ratio than other multicast routing protocol, while incurring far less end-to-end delay.

  11. Anger management for people with mild to moderate learning disabilities: Study protocol for a multi-centre cluster randomized controlled trial of a manualized intervention delivered by day-service staff

    Directory of Open Access Journals (Sweden)

    Nuttall Jacqueline

    2011-02-01

    Full Text Available Abstract Background Cognitive behaviour therapy (CBT is the treatment of choice for common mental health problems, but this approach has only recently been adapted for people with learning disabilities, and there is a limited evidence base for the use of CBT with this client group. Anger treatment is the one area where there exists a reasonable number of small controlled trials. This study will evaluate the effectiveness of a manualized 12-week CBT intervention for anger. The intervention will be delivered by staff working in the day services that the participants attend, following training to act as 'lay therapists' by a Clinical Psychologist, who will also provide supervision. Methods/Design This is a multi-centre cluster randomized controlled trial of a group intervention versus a 'support as usual' waiting-list control group, with randomization at the level of the group. Outcomes will be assessed at the end of the intervention and again 6-months later. After completion of the 6-month follow-up assessments, the intervention will also be delivered to the waiting-list groups. The study will include a range of anger/aggression and mental health measures, some of which will be completed by service users and also by their day service key-workers and by home carers. Qualitative data will be collected to assess the impact of the intervention on participants, lay therapists, and services, and the study will also include a service-utilization cost and consequences analysis. Discussion This will be the first trial to investigate formally how effectively staff working in services providing day activities for people with learning disabilities are able to use a therapy manual to deliver a CBT based anger management intervention, following brief training by a Clinical Psychologist. The demonstration that service staff can successfully deliver anger management to people with learning disabilities, by widening the pool of potential therapists, would have

  12. Operating systems and network protocols for wireless sensor networks.

    Science.gov (United States)

    Dutta, Prabal; Dunkels, Adam

    2012-01-13

    Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. Network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes-including energy, computing, communications and storage-which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.

  13. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  14. 'MATRI-SUMAN' a capacity building and text messaging intervention to enhance maternal and child health service utilization among pregnant women from rural Nepal: study protocol for a cluster randomised controlled trial.

    Science.gov (United States)

    Singh, Jitendra Kumar; Kadel, Rajendra; Acharya, Dilaram; Lombard, Daniel; Khanal, Saval; Singh, Shri Prakash

    2018-06-14

    Capacity development of health volunteers and text messaging to pregnant women through mobile phones have shown improved maternal and child health (MCH) outcomes and is associated with increased utilisation of MCH services. However, such interventions are uncommon in Nepal. We aim to carry out an intervention with the hypothesis that capacity building and text messaging intervention will increase the MCH service utilisation. MATRI-SUMAN is a 12-month cluster randomized controlled trial (RCT). The trial involves pregnant women from 52 clusters of six village development committees (VDCs) covering 66,000 populations of Dhanusha district of Nepal. In the intervention clusters, Female Community Health Volunteers (FCHVs) will receive capacity development skills through reinforcement training, supervision and monitoring skills for the promotion of health seeking behaviour among pregnant women and study participants will receive periodic promotional text messaging service about MCH components through mobile phones. A sample of 354with equal numbers in each study arm is estimated using power calculation formula. The primary outcomes of this study are the rate of utilization of skilled birth attendants and consumption of a specified diversified meal. The secondary outcomes are: four antenatal (ANC) visits, weight gain of women during pregnancy, delivery of a baby at the health facility, postnatal care (PNC) visits, positive changes in child feeding practices among mothers, performance of FCHVs in MCH service utilization. The intervention is designed to enhance the capacity of health volunteers for the promotion of health seeking behaviour among pregnant women and text messaging through a mobile phone to expecting mothers to increase MCH service utilization. The trial if proven effective will have policy implications in poor resource settings. ISRCTN60684155, ( https://doi.org/10.1186/ISRCTN60684155 ). The trial was registered retrospectively.

  15. Impact assessment and cost-effectiveness of m-health application used by community health workers for maternal, newborn and child health care services in rural Uttar Pradesh, India: a study protocol.

    Science.gov (United States)

    Prinja, Shankar; Nimesh, Ruby; Gupta, Aditi; Bahuguna, Pankaj; Thakur, Jarnail Singh; Gupta, Madhu; Singh, Tarundeep

    2016-01-01

    An m-health application has been developed and implemented with community health workers to improve their counseling in a rural area of India. The ultimate aim was to generate demand and improve utilization of key maternal, neonatal, and child health services. The present study aims to assess the impact and cost-effectiveness of this project. A pre-post quasi-experimental design with a control group will be used to undertake difference in differences analysis for assessing the impact of intervention. The Annual Health Survey (2011) will provide pre-intervention data, and a household survey will be carried out to provide post-intervention data.Two community development blocks where the intervention was introduced will be treated as intervention blocks while two controls blocks are selected after matching with intervention blocks on three indicators: average number of antenatal care checkups, percentage of women receiving three or more antenatal checkups, and percentage of institutional deliveries. Two categories of beneficiaries will be interviewed in both areas: women with a child between 29 days and 6 months and women with a child between 12 and 23 months. Propensity score matched samples from intervention and control areas in pre-post periods will be analyzed using the difference in differences method to estimate the impact of intervention in utilization of key services.Bottom-up costing methods will be used to assess the cost of implementing intervention. A decision model will estimate long-term effects of improved health services utilization on mortality, morbidity, and disability. Cost-effectiveness will be assessed in terms of incremental cost per disability-adjusted life year averted and cost per unit increase in composite service coverage in intervention versus control groups. The study will generate significant evidence on impact of the m-health intervention for maternal, neonatal, and child services and on the cost of scaling up m-health technology for

  16. The INCENTIVE protocol: an evaluation of the organisation and delivery of NHS dental healthcare to patients—innovation in the commissioning of primary dental care service delivery and organisation in the UK

    Science.gov (United States)

    Pavitt, Sue H; Baxter, Paul D; Brunton, Paul A; Douglas, Gail; Edlin, Richard; Gibson, Barry J; Godson, Jenny; Hall, Melanie; Porritt, Jenny; Robinson, Peter G; Vinall, Karen; Hulme, Claire

    2014-01-01

    Introduction In England, in 2006, new dental contracts devolved commissioning of dental services locally to Primary Care Trusts to meet the needs of their local population. The new national General Dental Services contracts (nGDS) were based on payment for Units of Dental Activity (UDAs) awarded in three treatment bands based on complexity of care. Recently, contract currency in UK dentistry is evolving from UDAs based on volume and case complexity towards ‘blended contracts’ that include incentives linked with key performance indicators such as quality and improved health outcome. Overall, evidence of the effectiveness of incentive-driven contracting of health providers is still emerging. The INCENTIVE Study aims to evaluate a blended contract model (incentive-driven) compared to traditional nGDS contracts on dental service delivery in practices in West Yorkshire, England. Methods and analysis The INCENTIVE model uses a mixed methods approach to comprehensively evaluate a new incentive-driven model of NHS dental service delivery. The study includes 6 dental surgeries located across three newly commissioned dental practices (blended contract) and three existing traditional practices (nGDS contracts). The newly commissioned practices have been matched to traditional practices by deprivation index, age profile, ethnicity, size of practice and taking on new patients. The study consists of three interlinked work packages: a qualitative study to explore stakeholder perspectives of the new service delivery model; an effectiveness study to assess the INCENTIVE model in reducing the risk of and amount of dental disease and enhance oral health-related quality of life in patients; and an economic study to assess cost-effectiveness of the INCENTIVE model in relation to clinical status and oral health-related quality of life. Ethics and dissemination The study has been approved by NRES Committee London, Bromley. The results of this study will be disseminated at national

  17. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  18. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  19. Frame Transmission Efficiency-Based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks.

    Science.gov (United States)

    He, Huaguang; Li, Taoshen; Feng, Luting; Ye, Jin

    2017-07-15

    Different from the traditional wired network, the fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize the congestion state from the MAC (Media Access Control) layer to adjust the transmission rate is core work for transport protocol design. However, recent works have shown that the existing cross-layer congestion detection solutions are too complex to be deployed or not able to characterize the congestion accurately. We first propose a new congestion metric called frame transmission efficiency (i.e., the ratio of successful transmission delay to the frame service delay), which describes the medium contention in a fast and accurate manner. We further present the design and implementation of RECN (ECN and the ratio of successful transmission delay to the frame service delay in the MAC layer, namely, the frame transmission efficiency), a general supporting scheme that adjusts the transport sending rate through a standard ECN (Explicit Congestion Notification) signaling method. Our method can be deployed on commodity switches with small firmware updates, while making no modification on end hosts. We integrate RECN transparently (i.e., without modification) with TCP on NS2 simulation. The experimental results show that RECN remarkably improves network goodput across multiple concurrent TCP flows.

  20. Study of QoS control and reliable routing method for utility communication network. Application of differentiated service to the network and alternative route establishment by the IP routing protocol; Denryokuyo IP network no QoS seigyo to shinraisei kakuho no hoho. DiffServ ni yoru QoS seigyo no koka to IP ni yoru fuku root ka no kento

    Energy Technology Data Exchange (ETDEWEB)

    Oba, E.

    2000-05-01

    QoS control method which satisfies utilities communication network requirement and alternative route establishment method which is for sustaining communication during a failure are studied. Applicability of DiffServ (Differentiated Service), one of the most promising QoS control method on IP network and studying energetically in IETF WG, is studied and it is found most application used in the utility communication network except for relaying system information could he accommodated to the DiffServ network. An example of the napping of the utility communication applications to the DiffServ PHB (Per Hop Behavior) is shown in this paper. Regarding to the alternative route, usual IP routing protocol cannot establish alternative route which doesn't have common links and nodes in their paths for a destination. IP address duplication with some modification of routing protocol enables such alternative route establishment. MPLS, distance vector algorithm and link state algorithm are evaluated qualitatively, and as a result, we found MPLS is promising way to establish the route. Quantitative evaluation will be future work. (author)

  1. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  2. An Improved 6LoWPAN Hierarchical Routing Protocol

    Directory of Open Access Journals (Sweden)

    Xue Li

    2015-10-01

    Full Text Available IETF 6LoWPAN working group is engaged in the IPv6 protocol stack research work based on IEEE802.15.4 standard. In this working group, the routing protocol is one of the important research contents. In the 6LoWPAN, HiLow is a well-known layered routing protocol. This paper puts forward an improved hierarchical routing protocol GHiLow by improving HiLow parent node selection and path restoration strategy. GHiLow improves the parent node selection by increasing the choice of parameters. Simutaneously, it also improves path recovery by analysing different situations to recovery path. Therefore, GHiLow contributes to the ehancement of network performance and the decrease of network energy consumption.

  3. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  4. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  5. A security architecture for the ALICE grid services

    CERN Document Server

    Schreiner, Steffen; Buchmann, Johannes; Betev, Latchezar; Grigoras, Alina

    2012-01-01

    Globally distributed research cyberinfrastructures, like the ALICE Grid Services, need to provide traceability and accountability of operations and internal interactions. This document presents a new security architecture for the ALICE Grid Services, allowing to establish non-repudiation with respect to creatorship and ownership of Grid files and jobs. It is based on mutually authenticated and encrypted communication using X.509 Public Key Infrastructure and the Transport Layer Security (TLS) protocol. Introducing certified Grid file entries and signed Grid jobs by implementing a model of Mediated Definite Delegation it allows to establish long-term accountability concerning Grid jobs and files. Initial submissions as well as any alteration of Grid jobs are becoming verifiable and can be traced back to the originator. The architecture has been implemented as a prototype along with the development of a new central Grid middleware, called jAliEn.

  6. The intergroup protocols: Scalable group communication for the internet

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Univ. of California, Santa Barbara, CA (United States)

    2000-12-04

    Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

  7. Protocol for a cohort study of adolescent mental health service users with a nested cluster randomised controlled trial to assess the clinical and cost-effectiveness of managed transition in improving transitions from child to adult mental health services (the MILESTONE study)

    NARCIS (Netherlands)

    Singh, S.P. (Swaran P.); Tuomainen, H. (Helena); Girolamo, G.D. (Giovanni De); A. Maras (Athanasios); P. Santosh (Paramala); McNicholas, F. (Fiona); Schulze, U. (Ulrike); Purper-Ouakil, D. (Diane); Tremmery, S. (Sabine); Franić, T. (Tomislav); Madan, J. (Jason); Paul, M. (Moli); F.C. Verhulst (Frank); G.C. Dieleman (Gwen); Warwick, J. (Jane); Wolke, D. (Dieter); Street, C. (Cathy); Daffern, C. (Claire); Tah, P. (Priya); Griffin, J. (James); Canaway, A. (Alastair); Signorini, G. (Giulia); Gerritsen, S. (Suzanne); Adams, L. (Laura); O'Hara, L. (Lesley); Aslan, S. (Sonja); Russet, F. (Frédérick); Davidović, N. (Nikolina); Tuffrey, A. (Amanda); Wilson, A. (Anna); Gatherer, C. (Charlotte); Walker, L. (Leanne)

    2017-01-01

    textabstractIntroduction Disruption of care during transition from child and adolescent mental health services (CAMHS) to adult mental health services may adversely affect the health and well-being of service users. The MILESTONE (Managing the Link and Strengthening Transition from Child to Adult

  8. Protocol design and analysis for cooperative wireless networks

    CERN Document Server

    Song, Wei; Jin, A-Long

    2017-01-01

    This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer. It highlights two main points that are often neglected in other books: energy-efficiency and spatial random distribution of wireless devices. Effective methods in stochastic geometry for the design and analysis of wireless networks are also explored. After providing a comprehensive review of existing studies in the literature, the authors point out the challenges that are worth further investigation. Then, they introduce several novel solutions for cooperative wireless network protocols that reduce energy consumption and address spatial random distribution of wireless nodes. For each solution, the book offers a clear system model and problem formulation, details of the proposed cooperative schemes, comprehensive performance analysis, and extensive numerical and simulation results that validate th...

  9. Complexity aspects of web services composition

    OpenAIRE

    Ennaoui, Karima; Nourine, Lhouari; Toumani, Farouk

    2015-01-01

    The web service composition problem can be stated as follows: given a finite state machine M , representing a service business protocol, and a set of finite state machines R, representing the business protocols of existing services, the question is to check whether there is a simulation relation between M and the shuffle product closure of R. In fact the shuffle product is a subclass of the communication free petri net and basic parallel processes, for which the same problem of simulation is ...

  10. Study protocol: cluster randomised controlled trial to assess the clinical and cost effectiveness of a staff training intervention in inpatient mental health rehabilitation units in increasing service users' engagement in activities.

    Science.gov (United States)

    Killaspy, Helen; Cook, Sarah; Mundy, Tim; Craig, Thomas; Holloway, Frank; Leavey, Gerard; Marston, Louise; McCrone, Paul; Koeser, Leonardo; Arbuthnott, Maurice; Omar, Rumana Z; King, Michael

    2013-08-28

    This study focuses on people with complex and severe mental health problems who require inpatient rehabilitation. The majority have a diagnosis of schizophrenia whose recovery has been delayed due to non-response to first-line treatments, cognitive impairment, negative symptoms and co-existing problems such as substance misuse. These problems contribute to major impairments in social and everyday functioning necessitating lengthy admissions and high support needs on discharge to the community. Engagement in structured activities reduces negative symptoms of psychosis and may lead to improvement in function, but no trials have been conducted to test the efficacy of interventions that aim to achieve this. This study aims to investigate the clinical and cost-effectiveness of a staff training intervention to increase service users' engagement in activities. This is a single-blind, two-arm cluster randomised controlled trial involving 40 inpatient mental health rehabilitation units across England. Units are randomised on an equal basis to receive either standard care or a "hands-on", manualised staff training programme comprising three distinct phases (predisposing, enabling and reinforcing) delivered by a small team of psychiatrists, occupational therapists, service users and activity workers. The primary outcome is service user engagement in activities 12 months after randomisation, assessed using a standardised measure. Secondary outcomes include social functioning and costs and cost-effectiveness of care. The study will provide much needed evidence for a practical staff training intervention that has potential to improve service user functioning, reducing the need for hospital treatment and supporting successful community discharge. The trial is registered with Current Controlled Trials (Ref ISRCTN25898179).

  11. Modular Approach to Therapy for Anxiety, Depression, Trauma, or Conduct Problems in outpatient child and adolescent mental health services in New Zealand: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Lucassen, Mathijs F G; Stasiak, Karolina; Crengle, Sue; Weisz, John R; Frampton, Christopher M A; Bearman, Sarah Kate; Ugueto, Ana M; Herren, Jennifer; Cribb-Su'a, Ainsleigh; Faleafa, Monique; Kingi-'Ulu'ave, Denise; Loy, Jik; Scott, Rebecca M; Hartdegen, Morgyn; Merry, Sally N

    2015-10-12

    Mental health disorders are common and disabling for young people because of the potential to disrupt key developmental tasks. Implementation of evidence-based psychosocial therapies in New Zealand is limited, owing to the inaccessibility, length, and cost of training in these therapies. Furthermore, most therapies address one problem area at a time, although comorbidity and changing clinical needs commonly occur in practice. A more flexible approach is needed. The Modular Approach to Therapy for Children with Anxiety, Depression, Trauma, or Conduct Problems (MATCH-ADTC) is designed to overcome these challenges; it provides a range of treatment modules addressing different problems, within a single training program. A clinical trial of MATCH-ADTC in the USA showed that MATCH-ADTC outperformed usual care and standard evidence-based treatment on several clinical measures. We aim to replicate these findings and evaluate the impact of providing training and supervision in MATCH-ADTC to: (1) improve clinical outcomes for youth attending mental health services; (2) increase the amount of evidence-based therapy content; (3) increase the efficiency of service delivery. This is an assessor-blinded multi-site effectiveness randomized controlled trial. Randomization occurs at two levels: (1) clinicians (≥60) are randomized to intervention or usual care; (2) youth participants (7-14 years old) accepted for treatment in child and adolescent mental health services (with a primary disorder that includes anxiety, depression, trauma-related symptoms, or disruptive behavior) are randomly allocated to receive MATCH-ADTC or usual care. Youth participants are recruited from 'mainstream', Māori-specific, and Pacific-specific child and adolescent mental health services. We originally planned to recruit 400 youth participants, but this has been revised to 200 participants. Centralized computer randomization ensures allocation concealment. The primary outcome measures are: (i) the

  12. Impact assessment and cost-effectiveness of m-health application used by community health workers for maternal, newborn and child health care services in rural Uttar Pradesh, India: a study protocol

    Directory of Open Access Journals (Sweden)

    Shankar Prinja

    2016-05-01

    Full Text Available Background: An m-health application has been developed and implemented with community health workers to improve their counseling in a rural area of India. The ultimate aim was to generate demand and improve utilization of key maternal, neonatal, and child health services. The present study aims to assess the impact and cost-effectiveness of this project. Methods/design: A pre–post quasi-experimental design with a control group will be used to undertake difference in differences analysis for assessing the impact of intervention. The Annual Health Survey (2011 will provide pre-intervention data, and a household survey will be carried out to provide post-intervention data.Two community development blocks where the intervention was introduced will be treated as intervention blocks while two controls blocks are selected after matching with intervention blocks on three indicators: average number of antenatal care checkups, percentage of women receiving three or more antenatal checkups, and percentage of institutional deliveries. Two categories of beneficiaries will be interviewed in both areas: women with a child between 29 days and 6 months and women with a child between 12 and 23 months. Propensity score matched samples from intervention and control areas in pre–post periods will be analyzed using the difference in differences method to estimate the impact of intervention in utilization of key services.Bottom-up costing methods will be used to assess the cost of implementing intervention. A decision model will estimate long-term effects of improved health services utilization on mortality, morbidity, and disability. Cost-effectiveness will be assessed in terms of incremental cost per disability-adjusted life year averted and cost per unit increase in composite service coverage in intervention versus control groups. Conclusions: The study will generate significant evidence on impact of the m-health intervention for maternal, neonatal, and child

  13. The INCENTIVE protocol: an evaluation of the organisation and delivery of NHS dental healthcare to patients-innovation in the commissioning of primary dental care service delivery and organisation in the UK.

    Science.gov (United States)

    Pavitt, Sue H; Baxter, Paul D; Brunton, Paul A; Douglas, Gail; Edlin, Richard; Gibson, Barry J; Godson, Jenny; Hall, Melanie; Porritt, Jenny; Robinson, Peter G; Vinall, Karen; Hulme, Claire

    2014-09-17

    In England, in 2006, new dental contracts devolved commissioning of dental services locally to Primary Care Trusts to meet the needs of their local population. The new national General Dental Services contracts (nGDS) were based on payment for Units of Dental Activity (UDAs) awarded in three treatment bands based on complexity of care. Recently, contract currency in UK dentistry is evolving from UDAs based on volume and case complexity towards 'blended contracts' that include incentives linked with key performance indicators such as quality and improved health outcome. Overall, evidence of the effectiveness of incentive-driven contracting of health providers is still emerging. The INCENTIVE Study aims to evaluate a blended contract model (incentive-driven) compared to traditional nGDS contracts on dental service delivery in practices in West Yorkshire, England. The INCENTIVE model uses a mixed methods approach to comprehensively evaluate a new incentive-driven model of NHS dental service delivery. The study includes 6 dental surgeries located across three newly commissioned dental practices (blended contract) and three existing traditional practices (nGDS contracts). The newly commissioned practices have been matched to traditional practices by deprivation index, age profile, ethnicity, size of practice and taking on new patients. The study consists of three interlinked work packages: a qualitative study to explore stakeholder perspectives of the new service delivery model; an effectiveness study to assess the INCENTIVE model in reducing the risk of and amount of dental disease and enhance oral health-related quality of life in patients; and an economic study to assess cost-effectiveness of the INCENTIVE model in relation to clinical status and oral health-related quality of life. The study has been approved by NRES Committee London, Bromley. The results of this study will be disseminated at national and international conferences and in international journals

  14. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  15. Use of thin layer chromatography for the determination of radiochemical purity of radiopharmaceuticals in nuclear medicine services of Paraiba and Rio Grande do Norte, Brazil; Utilizacao da cromatografia em camada delgada para determinacao da pureza radioquimica de radiofarmacos em servicos de medicina nuclear da Paraiba e Rio Grande do Norte, Brasil

    Energy Technology Data Exchange (ETDEWEB)

    Andrade, W.G.; Santos, P.A.L.; Lima, F.R.A. [Universidade Federal de Pernambuco (UFPE), Recife, PE (Brazil). Programa de Pos-Graduacao em Tecnologia Energetica; Lima, F.F., E-mail: wellington.gandrade@gmail.com [Centro Regional de Ciencias Nucleares do Nordeste (CRCN-NE/CNEN-PE), Recife, PE (Brazil)

    2012-07-01

    The paper chromatography and the thin layer chromatography are separation techniques in which the radioactive components migrate because of their affinity with the eluent (mobile phase) or stationary phase, respectively. In radiopharmaceuticals labeled with {sup 99m}Tc, besides its own radiopharmaceutical, {sup 99m}TcO{sup 4-} free and TcO{sub 2} can be identified and quantified. The evaluation of radiochemical purity of radiopharmaceuticals is essential to produce images free of artifacts as well as avoid unnecessary absorbed dose to the patient. Once they are managed in humans it is important and necessary that they undergo to strict quality control. Because of this, ANVISA in its 'Resolucao da Diretoria Colegiada (RDC) 38 of June 4th, 2008 states the obligation of performing a minimum of tests in nuclear medicine services routine prior to human administration. This work evaluated, by the method of thin layer chromatography (TLC), radiochemical purity, determined the pH of the radiopharmaceutical DEXTRAN- 500, DMSA, DTPA, PHYTATE, MDP, MIBI and Sn-Col used in nuclear medicine services in the states of Paraiba and Rio Grande do Norte - Brazil. The results show that the use of thin layer chromatography (TLC) as a standard method in routine of nuclear medicine services is possible, because it provides important data for the evaluation of radiochemical purity, allowing the exclusion of a radiopharmaceutical poorly marked. (author)

  16. Physical Layer Ethernet Clock Synchronization

    Science.gov (United States)

    2010-11-01

    42 nd Annual Precise Time and Time Interval (PTTI) Meeting 77 PHYSICAL LAYER ETHERNET CLOCK SYNCHRONIZATION Reinhard Exel, Georg...oeaw.ac.at Nikolaus Kerö Oregano Systems, Mohsgasse 1, 1030 Wien, Austria E-mail: nikolaus.keroe@oregano.at Abstract Clock synchronization ...is a service widely used in distributed networks to coordinate data acquisition and actions. As the requirement to achieve tighter synchronization

  17. Cooling Tower (Evaporative Cooling System) Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Boyd, Brian [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, Taylor [Colorado Energy Office, Denver, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with cooling tower efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  18. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  19. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    Science.gov (United States)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  20. Evaluating the effectiveness of a clinical practice change intervention in increasing clinician provision of preventive care in a network of community-based mental health services: a study protocol of a non-randomized, multiple baseline trial.

    Science.gov (United States)

    Bartlem, Kate; Bowman, Jennifer; Freund, Megan; Wye, Paula; McElwaine, Kathleen; Knight, Jenny; McElduff, Patrick; Gillham, Karen; Wiggers, John

    2013-08-06

    People with a mental illness experience substantial disparities in health, including increased rates of morbidity and mortality caused by potentially preventable chronic diseases. One contributing factor to such disparity is a higher prevalence of modifiable health risk behaviors, such as smoking, inadequate fruit and vegetable intake, harmful alcohol consumption, and inadequate physical activity. Evidence supports the effectiveness of preventive care in reducing such risks, and guidelines recommend that preventive care addressing such risks be incorporated into routine clinical care. Although community-based mental health services represent an important potential setting for ensuring that people with a mental illness receive such care, research suggests its delivery is currently sub-optimal. A study will be undertaken to evaluate the effectiveness of a clinical practice change intervention in increasing the routine provision of preventive care by clinicians in community mental health settings. A two-group multiple baseline design will be utilized to assess the effectiveness of a multi-strategic intervention implemented over 12 months in increasing clinician provision of preventive care. The intervention will be implemented sequentially across the two groups of community mental health services to increase provision of client assessment, brief advice, and referral for four health risk behaviors (smoking, inadequate fruit and vegetable consumption, harmful alcohol consumption, and inadequate physical activity). Outcome measures of interest will be collected via repeated cross-sectional computer-assisted telephone interviews undertaken on a weekly basis for 36 months with community mental health clients. This study is the first to assess the effectiveness of a multi-strategic clinical practice change intervention in increasing routine clinician provision of preventive care for chronic disease behavioral risk factors within a network of community mental health services

  1. Impact assessment and cost-effectiveness of m-health application used by community health workers for maternal, newborn and child health care services in rural Uttar Pradesh, India: a study protocol

    OpenAIRE

    Prinja, Shankar; Nimesh, Ruby; Gupta, Aditi; Bahuguna, Pankaj; Thakur, Jarnail Singh; Gupta, Madhu; Singh, Tarundeep

    2016-01-01

    Background: An m-health application has been developed and implemented with community health workers to improve their counseling in a rural area of India. The ultimate aim was to generate demand and improve utilization of key maternal, neonatal, and child health services. The present study aims to assess the impact and cost-effectiveness of this project.Methods/design: A pre–post quasi-experimental design with a control group will be used to undertake difference in differences analysis for as...

  2. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  3. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  4. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  5. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  6. EnviroAtlas - Ecosystem Services Market-Based Programs Web Service, U.S., 2016, Forest Trends' Ecosystem Marketplace

    Data.gov (United States)

    U.S. Environmental Protection Agency — This EnviroAtlas web service contains layers depicting market-based programs and projects addressing ecosystem services protection in the United States. Layers...

  7. Design and Analysis of QoS Routing Framework integrated with OLSR protocol for Multimedia Traffic in Mobile Adhoc Networks

    Directory of Open Access Journals (Sweden)

    S. Soni

    2017-06-01

    Full Text Available MANETs (Mobile Ad-hoc Networks is the self organizing wireless structure of mobile hosts. Wireless media is used for communication in MANETs. Considering the developing requirements for multimedia and real-time traffic applications in real world, QoS (Quality-of-Service support is essential in MANETs. But most of the characteristics of MANETs make QoS support a difficult problem. It is challenging to support QoS routing in MANET due to dynamic behavior and mobility of the hosts. The OLSR (Optimized Link State Routing protocol can be efficiently used in MANETs to provide QoS routing because of its dynamic MPR (Multi Point Relay selection criteria and proactive nature. In this paper, a design of QoS routing framework integrated with OLSR protocol is proposed and also analyzed using network simulator. Proposed QoS framework combines a bandwidth estimation algorithm with explicit resource reservation, QoS routing and connection admission control (CAC. OLSR protocol is extended for QoS framework to solve performance issues related to node mobility using cross layer approach. Results after simulation conclude about efficiency of the proposed QoS routing framework.

  8. Emulation Platform for Cyber Analysis of Wireless Communication Network Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Van Leeuwen, Brian P. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Eldridge, John M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over wireless networks must also evolve with the advances in technologies enabling more capable wireless networks. However, means for analysis of the effectiveness of security approaches and implementations used on wireless networks are lacking. More specifically a capability to analyze the lower-layer protocols (i.e., Link and Physical layers) is a major challenge. An analysis approach that incorporates protocol implementations without the need for RF emissions is necessary. In this research paper several emulation tools and custom extensions that enable an analysis platform to perform cyber security analysis of lower layer wireless networks is presented. A use case of a published exploit in the 802.11 (i.e., WiFi) protocol family is provided to demonstrate the effectiveness of the described emulation platform.

  9. Systems Integration Using Web Services, REST and SOAP: A Practical Report

    Directory of Open Access Journals (Sweden)

    GARCIA, C. M.

    2017-06-01

    Full Text Available In companies environments, it is normal to exist several systems to ease daily activities. In academic environments, it also happens. However, academic environments may be even more heterogeneous as there are many specialized activities, such as: restaurant, library, academic processes, administrative processes and computer network services, such as email and network authentication. To maintain the data consistency throughout the systems, all the systems must be integrated. This integration was carried out in the Federal University of Lavras by using Simples Object Access Protocol (SOAP as communication protocol. The development of a new system (mobile application, it was noticed that SOAP is very CPU-intensive and slow, as mobile devices have constraints such as internet and processing. Thus, a REST-JSON layer to integrate mobile application and the integration architecture was developed, benefiting from all the resources the integration architecture had. By using this new layer, the offer of functions from the integration architecture was also expanded to REST, attending to other applications without having to make big changes in the code. It was measured that the REST-JSON layer consumes around 73% less data than SOAP. The REST-JSON layer was released, attending to about 5600 installations of the application that requests the integration around 54000 times a day.

  10. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  11. AMCO Scribe Sampling Data Map Service, Oakland CA, 2017, US EPA Region 9

    Data.gov (United States)

    U.S. Environmental Protection Agency — This map service contains a single layer: Groundwater Samples. The layer draws at all scales. Full FGDC metadata for the layer may be found by clicking the layer...

  12. AMCO Off-Site Air Monitoring Map Service, Oakland CA, 2017, US EPA Region 9

    Data.gov (United States)

    U.S. Environmental Protection Agency — This map service contains a single layer: Off-Site Air Monitors. The layer draws at all scales. Full FGDC metadata for the layer may be found by clicking the layer...

  13. A high performance totally ordered multicast protocol

    Science.gov (United States)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  14. A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.

    Science.gov (United States)

    Effatparvar, Mehdi; Dehghan, Mehdi; Rahmani, Amir Masoud

    2016-09-01

    Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree

  15. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  16. The micro-step motor controller protocol and driver

    International Nuclear Information System (INIS)

    Hong, Kwang Pyo; Lee, Chang Hee; Moon, Myung Kook; Choi, Bung Hun; Choi, Young Hyun; Cheon, Jong Gu

    2004-11-01

    We developed the communication protocol which is a main kernel of motor control firmware program that is used at HANARO neutron spectrometer now. This protocol driver divide into as a 4 group(Serial protocol, DLL, Active-X, Labview driver), so end-user can control the motor control as easily by PC RS232/422 port and have a merits as follows: Support a Low Level/High level driver, Support a Network Connectivity function by using High level Driver, One Server can services many client request. By using this protocol, The End-user can be easily makes a application motor control program and developed another application system program by using several kinds of programming tools under Widows and Linux based operation systems

  17. Multichannel MAC Layer In Mobile Ad—Hoc Network

    Science.gov (United States)

    Logesh, K.; Rao, Samba Siva

    2010-11-01

    This paper we presented the design objectives and technical challenges in Multichannel MAC protocols in Mobile Ad-hoc Network. In IEEE 802.11 a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. Even though complex environments in ad hoc networks require a combined control of physical (PHY) and medium access control (MAC) layers resources in order to optimize performance. And also we discuss the characteristics of cross-layer frame and give a multichannel MAC approach.

  18. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  19. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  20. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi