254 resultados para synchronization protocols


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ethernet is a key component of the standards used for digital process buses in transmission substations, namely IEC 61850 and IEEE Std 1588-2008 (PTPv2). These standards use multicast Ethernet frames that can be processed by more than one device. This presents some significant engineering challenges when implementing a sampled value process bus due to the large amount of network traffic. A system of network traffic segregation using a combination of Virtual LAN (VLAN) and multicast address filtering using managed Ethernet switches is presented. This includes VLAN prioritisation of traffic classes such as the IEC 61850 protocols GOOSE, MMS and sampled values (SV), and other protocols like PTPv2. Multicast address filtering is used to limit SV/GOOSE traffic to defined subsets of subscribers. A method to map substation plant reference designations to multicast address ranges is proposed that enables engineers to determine the type of traffic and location of the source by inspecting the destination address. This method and the proposed filtering strategy simplifies future changes to the prioritisation of network traffic, and is applicable to both process bus and station bus applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background In an attempt to establish some consensus on the proper use and design of experimental animal models in musculoskeletal research, AOVET (the veterinary specialty group of the AO Foundation) in concert with the AO Research Institute (ARI), and the European Academy for the Study of Scientific and Technological Advance, convened a group of musculoskeletal researchers, veterinarians, legal experts, and ethicists to discuss, in a frank and open forum, the use of animals in musculoskeletal research. Methods The group narrowed the field to fracture research. The consensus opinion resulting from this workshop can be summarized as follows: Results & Conclusion Anaesthesia and pain management protocols for research animals should follow standard protocols applied in clinical work for the species involved. This will improve morbidity and mortality outcomes. A database should be established to facilitate selection of anaesthesia and pain management protocols for specific experimental surgical procedures and adopted as an International Standard (IS) according to animal species selected. A list of 10 golden rules and requirements for conduction of animal experiments in musculoskeletal research was drawn up comprising 1) Intelligent study designs to receive appropriate answers; 2) Minimal complication rates (5 to max. 10%); 3) Defined end-points for both welfare and scientific outputs analogous to quality assessment (QA) audit of protocols in GLP studies; 4) Sufficient details for materials and methods applied; 5) Potentially confounding variables (genetic background, seasonal, hormonal, size, histological, and biomechanical differences); 6) Post-operative management with emphasis on analgesia and follow-up examinations; 7) Study protocols to satisfy criteria established for a "justified animal study"; 8) Surgical expertise to conduct surgery on animals; 9) Pilot studies as a critical part of model validation and powering of the definitive study design; 10) Criteria for funding agencies to include requirements related to animal experiments as part of the overall scientific proposal review protocols. Such agencies are also encouraged to seriously consider and adopt the recommendations described here when awarding funds for specific projects. Specific new requirements and mandates related both to improving the welfare and scientific rigour of animal-based research models are urgently needed as part of international harmonization of standards.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Chlamydia pneumoniae causes a range of respiratory infections including bronchitis, pharyngitis and pneumonia. Infection has also been implicated in exacerbation/initiation of asthma and chronic obstructive pulmonary disease (COPD) and may play a role in atherosclerosis and Alzheimer's disease. We have used a mouse model of Chlamydia respiratory infection to determine the effectiveness of intranasal (IN) and transcutaneous immunization (TCI) to prevent Chlamydia lung infection. Female BALB/c mice were immunized with chlamydial major outer membrane protein (MOMP) mixed with cholera toxin and CpG oligodeoxynucleotide adjuvants by either the IN or TCI routes. Serum and bronchoalveolar lavage (BAL) were collected for antibody analysis. Mononuclear cells from lung-draining lymph nodes were stimulated in vitro with MOMP and cytokine mRNA production determined by real time PCR. Animals were challenged with live Chlamydia and weighed daily following challenge. At day 10 (the peak of infection) animals were sacrificed and the numbers of recoverable Chlamydia in lungs determined by real time PCR. MOMP-specific antibody-secreting cells in lung tissues were also determined at day 10 post-infection. Both IN and TCI protected animals against weight loss compared to non-immunized controls with both immunized groups gaining weight by day 10-post challenge while controls had lost 6% of body weight. Both immunization protocols induced MOMP-specific IgG in serum and BAL while only IN immunization induced MOMP-specific IgA in BAL. Both immunization routes resulted in high numbers of MOMP-specific antibody-secreting cells in lung tissues (IN > TCI). Following in vitro re-stimulation of lung-draining lymph node cells with MOMP; IFNγ mRNA increased 20-fold in cells from IN immunized animals (compared to non-immunized controls) while IFNγ levels increased 6- to 7-fold in TCI animals. Ten days post challenge non-immunized animals had >7000 IFU in their lungs, IN immunized animals <50 IFU and TCI immunized animals <1500 IFU. Thus, both intranasal and transcutaneous immunization protected mice against respiratory challenge with Chlamydia. The best protection was obtained following IN immunization and correlated with IFNγ production by mononuclear cells in lung-draining LN and MOMP-specific IgA in BAL.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A Networked Control System (NCS) is a feedback-driven control system wherein the control loops are closed through a real-time network. Control and feedback signals in an NCS are exchanged among the system’s components in the form of information packets via the network. Nowadays, wireless technologies such as IEEE802.11 are being introduced to modern NCSs as they offer better scalability, larger bandwidth and lower costs. However, this type of network is not designed for NCSs because it introduces a large amount of dropped data, and unpredictable and long transmission latencies due to the characteristics of wireless channels, which are not acceptable for real-time control systems. Real-time control is a class of time-critical application which requires lossless data transmission, small and deterministic delays and jitter. For a real-time control system, network-introduced problems may degrade the system’s performance significantly or even cause system instability. It is therefore important to develop solutions to satisfy real-time requirements in terms of delays, jitter and data losses, and guarantee high levels of performance for time-critical communications in Wireless Networked Control Systems (WNCSs). To improve or even guarantee real-time performance in wireless control systems, this thesis presents several network layout strategies and a new transport layer protocol. Firstly, real-time performances in regard to data transmission delays and reliability of IEEE 802.11b-based UDP/IP NCSs are evaluated through simulations. After analysis of the simulation results, some network layout strategies are presented to achieve relatively small and deterministic network-introduced latencies and reduce data loss rates. These are effective in providing better network performance without performance degradation of other services. After the investigation into the layout strategies, the thesis presents a new transport protocol which is more effcient than UDP and TCP for guaranteeing reliable and time-critical communications in WNCSs. From the networking perspective, introducing appropriate communication schemes, modifying existing network protocols and devising new protocols, have been the most effective and popular ways to improve or even guarantee real-time performance to a certain extent. Most previously proposed schemes and protocols were designed for real-time multimedia communication and they are not suitable for real-time control systems. Therefore, devising a new network protocol that is able to satisfy real-time requirements in WNCSs is the main objective of this research project. The Conditional Retransmission Enabled Transport Protocol (CRETP) is a new network protocol presented in this thesis. Retransmitting unacknowledged data packets is effective in compensating for data losses. However, every data packet in realtime control systems has a deadline and data is assumed invalid or even harmful when its deadline expires. CRETP performs data retransmission only in the case that data is still valid, which guarantees data timeliness and saves memory and network resources. A trade-off between delivery reliability, transmission latency and network resources can be achieved by the conditional retransmission mechanism. Evaluation of protocol performance was conducted through extensive simulations. Comparative studies between CRETP, UDP and TCP were also performed. These results showed that CRETP significantly: 1). improved reliability of communication, 2). guaranteed validity of received data, 3). reduced transmission latency to an acceptable value, and 4). made delays relatively deterministic and predictable. Furthermore, CRETP achieved the best overall performance in comparative studies which makes it the most suitable transport protocol among the three for real-time communications in a WNCS.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research investigates the symbiotic relationship between composition and improvisation and the notion of improvisation itself. With a specific interest in developing, extending and experimenting with the relationship of improvisation within predetermined structures, the creative work component of this research involved composing six new works with varying approaches for The Andrea Keller Quartet and guest improvisers, for performance on a National Australian tour. This is documented in the CD recording Galumphing Round the Nation - Collaborations Tour 2009. The exegesis component is intended to run alongside the creative work and discusses the central issues surrounding improvisation in an ensemble context and the subject of composing for improvisers. Specifically, it questions the notion that when music emphasises a higher ratio of spontaneous to pre-determined elements, and is exposed to the many variables of a performance context, particularly through its incorporation of visitant improvisers, the resultant music should potentially be measurably altered with each performance. This practice-led research demonstrates the effect of concepts such as individuality, variability within context, and the interactive qualities of contemporary jazz ensemble music. Through the analysis and comparison of the treatment of the six pieces over thirteen performances with varying personnel, this exegesis proposes that, despite the expected potential for spontaneity in contemporary jazz music, the presence of established patterns, the desire for familiarity and the intuitive tendency towards accepted protocols ensure that the music which emerges is not as mutable as initially anticipated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work details the results of a face authentication test (FAT2004) (http://www.ee.surrey.ac.uk/banca/icpr2004) held in conjunction with the 17th International Conference on Pattern Recognition. The contest was held on the publicly available BANCA database (http://www.ee.surrey.ac.uk/banca) according to a defined protocol (E. Bailly-Bailliere et al., June 2003). The competition also had a sequestered part in which institutions had to submit their algorithms for independent testing. 13 different verification algorithms from 10 institutions submitted results. Also, a standard set of face recognition software packages from the Internet (http://www.cs.colostate.edu/evalfacerec) were used to provide a baseline performance measure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Parkinson's disease (PD) patients may be at higher risk of malnutrition because of the symptoms associated with the disease and the side effects of the medication used to manage it. A decline in nutritional status is associated with many adverse outcomes related to health and quality of life. It is not clear, however, to what extent this population is currently affected by malnutrition. The objective of this review was to systematically assess the methodology and outcomes of studies reporting the prevalence of malnutrition in PD patients. Studies that attempted to classify participants with PD into nutritional risk and/or malnutrition categories using body mass index, weight change, anthropometric measures, and nutritional screening and assessment scores were included. The prevalence of malnutrition ranged from 0% to 24% in PD patients, while 3–60% of PD patients were reported to be at risk of malnutrition. There was a large degree of variation among studies in the methods chosen, the definition of malnutrition using those methods, and the detail in which the methodological protocols were reported. The true extent of malnutrition in the PD population has yet to be accurately quantified. It is important, however, to screen for malnutrition at the time of PD diagnosis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the advent of live cell imaging microscopy, new types of mathematical analyses and measurements are possible. Many of the real-time movies of cellular processes are visually very compelling, but elementary analysis of changes over time of quantities such as surface area and volume often show that there is more to the data than meets the eye. This unit outlines a geometric modeling methodology and applies it to tubulation of vesicles during endocytosis. Using these principles, it has been possible to build better qualitative and quantitative understandings of the systems observed, as well as to make predictions about quantities such as ligand or solute concentration, vesicle pH, and membrane trafficked. The purpose is to outline a methodology for analyzing real-time movies that has led to a greater appreciation of the changes that are occurring during the time frame of the real-time video microscopy and how additional quantitative measurements allow for further hypotheses to be generated and tested.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction: Almost 90% of Australian mothers are exclusively breastfeeding when they discharge from maternity hospitals but by six months of age breastfeeding infants have reduced to 32% nationally and 19% in Queensland, far below the national target of 80%. Many factors influence the choice to breastfeed, including health care provision, therefore the knowledge and attitudes of paediatric nurses have the potential to affect breastfeeding duration. Aims: To assess current breastfeeding knowledge and attitudes of paediatric nurses in metropolitan and regional Queensland settings. Method: The study used a cross-sectional survey design. The tool was developed from several documented health professional questionnaires about breastfeeding, with permission from authors. Survey items relating breastfeeding physiology, factors relating to breastfeeding success, and local, national and international policies were also included. Ethics approval was granted from the appropriate Ethics Committees to conduct the survey through tertiary metropolitan and regional hospital settings. Results: A total of 241 surveys were returned, achieving a response rate of 53%. Nurses acknowledged breastmilk as the best source of nutrition for infants (99%, n=238) and that mothers should be encouraged to breastfeed (92%, n=221). However, many respondents considered infant formula a nutritional equivalent (44%, n=105) and (47%, n=113) were unaware that supplemental formulas interfered with successful breastfeeding. Most nurses recognised that stress (e.g. infant hospitalisation) impacts on the success of breastfeeding (90%, n=216). Knowledge of breastfeeding anatomy and physiology was poor and a substantial number of nurses did not identify correct attachment in response to two diagrammatic representations (76%, n=183 and 45%, n=109). Survey results demonstrated deficiencies in knowledge that would impact on support provided to breastfeeding mothers. Knowledge deficits were also identified relating to local, national and international policies and protocols concerning breastfeeding and breastmilk substitutes. Conclusion: Breastfeeding knowledge and attitudes were exceptional in areas related to general breastfeeding knowledge. However, in areas directly related to nursing practice, considerable deficits in paediatric nurses' knowledge and attitudes were identified. Lack of appropriate skills, knowledge and varying attitudes amongst paediatric nurses has the potential to negatively impact on the education, advice and support provided to breastfeeding mothers and their families whilst their infant is in hospital. These study findings will guide future research and strategies to improve knowledge and policy statements to assist paediatric nurses in fulfilling their role.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Real-time networked control systems (NCSs) over data networks are being increasingly implemented on a massive scale in industrial applications. Along with this trend, wireless network technologies have been promoted for modern wireless NCSs (WNCSs). However, popular wireless network standards such as IEEE 802.11/15/16 are not designed for real-time communications. Key issues in real-time applications include limited transmission reliability and poor transmission delay performance. Considering the unique features of real-time control systems, this paper develops a conditional retransmission enabled transport protocol (CRETP) to improve the delay performance of the transmission control protocol (TCP) and also the reliability performance of the user datagram protocol (UDP) and its variants. Key features of the CRETP include a connectionless mechanism with acknowledgement (ACK), conditional retransmission and detection of ineffective data packets on the receiver side.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objectives. To profile Australian nurse practitioners and their practice in 2009 and compare results with a similar 2007 census. Methods. Self-administered questionnaire. Results. Atotal of 293 nurse practitioners responded (response rate 76.3%). The majority were female (n = 229, 81.2%); mean age was 47.3 years (s.d. = 8.1). As in 2007, emergency nurse practitioners represented the largest clinical specialty (n = 63, 30.3%). A majority practiced in a metropolitan area (n = 133, 64.3%); a decrease from 2007. Consistent with 2007, only 71.5% (n = 208) were employed as a nurse practitioner and 22.8% (n = 46) were awaiting approval for some or all of their clinical protocols. Demographic data, allocations of tasks, and patterns of practice remained consistent with 2007 results. ‘No Medicare provider number’ (n = 182, 91.0%), ‘no authority to prescribe using the Pharmaceutical Benefits Scheme’ (n = 182, 89.6%) and ‘lack of organisational support’ (n = 105, 52.2%) were reported as ‘limiting’ or ‘extremely limiting’ to practice. Conclusions. Our results demonstrate less than satisfactory uptake of the nurse practitioner role despite authorisation. Barriers constraining nurse practitioner practice reduced but remained unacceptably high. Adequate professional and political support is necessary to ensure the efficacy and sustainability of this clinical role.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Intuitive interaction is based on past experience and is fast and often non conscious. We have conducted ten studies into this issue over the past ten years, involving more than 400 participants. Data collection methods have included questionnaires, interviews, observations, concurrent and retrospective protocols, and cognitive measures. Coding schemes have been developed to suit each study and involve robust, literature based heuristics. Some other researchers have investigated this issue and their methods are also examined. The paper traces the development of the methods and compares the various approaches used over the years.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: To critically appraise the Biodex System 4 isokinetic dynamometer for strength assessment of children. Methods: Appraisal was based on experiences from two independent laboratories involving testing of 213 children. Issues were recorded and the manufacturer was consulted regarding appropriate solutions. Results: The dynamometer had insufficient height adjustment for alignment of the knee for some children, requiring the construction of padding to better fit the child within the dynamometer. Potential for entrapment of the non-testing leg was evident in the passive and eccentric modes and a leg bracket restraint was constructed. Automated gravity correction did not operate when protocols were linked or data was exported to an external device. Conclusions: Limitations were noted, some of which were applicable to knee strength testing in general and others which were specific to use with children. However, most of these obstacles could be overcome, making the Biodex System 4 suitable for assessment of knee strength in children.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most one-round key exchange protocols provide only weak forward secrecy at best. Furthermore, one-round protocols with strong forward secrecy often break badly when faced with an adversary who can obtain ephemeral keys. We provide a characterisation of how strong forward secrecy can be achieved in one-round key exchange. Moreover, we show that protocols exist which provide strong forward secrecy and remain secure with weak forward secrecy even when the adversary is allowed to obtain ephemeral keys. We provide a compiler to achieve this for any existing secure protocol with weak forward secrecy.