150 resultados para cluster-based routing protocol


Relevância:

40.00% 40.00%

Publicador:

Resumo:

Session Initiation Protocol (SIP) is developed to provide advanced voice services over IP networks. SIP unites telephony and data world, permitting telephone calls to be transmitted over Intranets and Internet. Increase in network performance and new mechanisms for guaranteed quality of service encourage this consolidation to provide toll cost savings. Security comes up as one of the most important issues when voice communication and critical voice applications are considered. Not only the security methods provided by traditional telephony systems, but also additional methods are required to overcome security risks introduced by the public IP networks. SIP considers security problems of such a consolidation and provides a security framework. There are several security methods defined within SIP specifications and extensions. But, suggested methods can not solve all the security problems of SIP systems with various system requirements. In this thesis, a Kerberos based solution is proposed for SIP security problems, including SIP authentication and privacy. The proposed solution tries to establish flexible and scalable SIP system that will provide desired level of security for voice communications and critical telephony applications.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Introduction Falls are the most frequent adverse event reported in hospitals. Approximately 30% of in-hospital falls lead to an injury and up to 2% result in a fracture. A large randomised trial found that a trained health professional providing individualised falls prevention education to older inpatients reduced falls in a cognitively intact subgroup. This study aims to investigate whether this efficacious intervention can reduce falls and be clinically useful and cost-effective when delivered in the real-life clinical environment. Methods A stepped-wedge cluster randomised trial will be used across eight subacute units (clusters) which will be randomised to one of four dates to start the intervention. Usual care on these units includes patient's screening, assessment and implementation of individualised falls prevention strategies, ongoing staff training and environmental strategies. Patients with better levels of cognition (Mini-Mental State Examination >23/30) will receive the individualised education from a trained health professional in addition to usual care while patient's feedback received during education sessions will be provided to unit staff. Unit staff will receive training to assist in intervention delivery and to enhance uptake of strategies by patients. Falls data will be collected by two methods: case note audit by research assistants and the hospital falls reporting system. Cluster-level data including patient's admissions, length of stay and diagnosis will be collected from hospital systems. Data will be analysed allowing for correlation of outcomes (clustering) within units. An economic analysis will be undertaken which includes an incremental cost-effectiveness analysis. Ethics and dissemination The study was approved by The University of Notre Dame Australia Human Research Ethics Committee and local hospital ethics committees. Results The results will be disseminated through local site networks, and future funding and delivery of falls prevention programmes within WA Health will be informed. Results will also be disseminated through peer-reviewed publications and medical conferences.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Background The effects of exposure to ultraviolet radiation are a significant concern in Australia which has one of the highest incidences of skin cancer in the world. Despite most skin cancers being preventable by encouraging consistent adoption of sun-protective behaviours, incidence rates are not decreasing. There is a dearth of research examining the factors involved in engaging in sun-protective behaviours. Further, online multi-behavioural theory-based interventions have yet to be explored fully as a medium for improving sun-protective behaviour in adults. This paper presents the study protocol of a randomised controlled trial of an online intervention based on the Theory of Planned Behaviour (TPB) that aims to improve sun safety among Australian adults. Methods/Design Approximately 420 adults aged 18 and over and predominantly from Queensland, Australia, will be recruited and randomised to the intervention (n = 200), information only (n = 200) or the control group (n = 20). The intervention focuses on encouraging supportive attitudes and beliefs toward sun-protective behaviour, fostering perceptions of normative support for sun protection, and increasing perceptions of control/self-efficacy over sun protection. The intervention will be delivered online over a single session. Data will be collected immediately prior to the intervention (Time 1), immediately following the intervention (Time 1b), and one week (Time 2) and one month (Time 3) post-intervention. Primary outcomes are intentions to sun protect and sun-protective behaviour. Secondary outcomes are the participants’ attitudes toward sun protection, perceptions of normative support for sun protection (i.e. subjective norms, group norms, personal norms and image norms) and perceptions of control/self-efficacy toward sun protection. Discussion The study will contribute to an understanding of the effectiveness of a TPB-based online intervention to improve Australian adults’ sun-protective behaviour. Trials registry Australian and New Zealand Trials Registry number ACTRN12613000470796

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Review question/objective The objective of this review is to identify the effectiveness of surveillance systems and community-based interventions in identifying and responding to emerging and re-emerging zoonotic infections in Southeast Asia (SE Asia). More specifically the research questions are: 1. What is the effectiveness of community-based surveillance interventions designed to identify emerging zoonotic infectious diseases? 2. What is the effectiveness of non-pharmaceutical community-based interventions designed to prevent transmission of emerging zoonotic infectious diseases? 3. How do factors related to the emergence and management of emerging zoonotic infectious diseases impact the effectiveness of interventions designed to identify and respond to them?

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Background: Exercise and adequate self-management capacity may be important strategies in the management of venous leg ulcers. However, it remains unclear if exercise improves the healing rates of venous leg ulcers and if a self-management exercise program based on self-efficacy theory is well adhered to. Method/Design: This is a randomised controlled in adults with venous leg ulcers to determine the effectiveness of a self-efficacy based exercise intervention. Participants with venous leg ulcers are recruited from 3 clinical sites in Australia. After collection of baseline data, participants are randomised to either an intervention group or control group. The control group receive usual care, as recommended by evidence based guidelines. The intervention group receive an individualised program of calf muscle exercises and walking. The twelve week exercise program integrates multiple elements, including up to six telephone delivered behavioural coaching and goal setting sessions, supported by written materials, a pedometer and two follow-up booster calls if required. Participants are encouraged to seek social support among their friends, self-monitor their weekly steps and lower limb exercises. The control group are supported by a generic information sheet that the intervention group also receive encouraging lower limb exercises, a pedometer for self-management and phone calls at the same time points as the intervention group. The primary outcome is the healing rates of venous leg ulcers which are assessed at fortnightly clinic appointments. Secondary outcomes, assessed at baseline and 12 weeks: functional ability (range of ankle motion and Tinetti gait and balance score), quality of life and self-management scores. Discussion: This study seeks to address a significant gap in current wound management practice by providing evidence for the effectiveness of a home-based exercise program for adults with venous leg ulcers. Theory-driven, evidence-based strategies that can improve an individual’s exercise self-efficacy and self-management capacity could have a significant impact in improving the management of people with venous leg ulcers. Information gained from this study will provide much needed information on management of this chronic disease to promote health and independence in this population. Trial registration: Australian New Zealand Clinical Trials Registry ACTRN12612000475842 Trial status: Current follow up

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Background: The prevalence of type 2 diabetes is rising with the majority of patients practicing inadequate disease self-management. Depression, anxiety, and diabetes-specific distress present motivational challenges to adequate self-care. Health systems globally struggle to deliver routine services that are accessible to the entire population, in particular in rural areas. Web-based diabetes self-management interventions can provide frequent, accessible support regardless of time and location Objective: This paper describes the protocol of an Australian national randomized controlled trial (RCT) of the OnTrack Diabetes program, an automated, interactive, self-guided Web program aimed to improve glycemic control, diabetes self-care, and dysphoria symptoms in type 2 diabetes patients. Methods: A small pilot trial is conducted that primarily tests program functionality, efficacy, and user acceptability and satisfaction. This is followed by the main RCT, which compares 3 treatments: (1) delayed program access: usual diabetes care for 3 months postbaseline followed by access to the full OnTrack Diabetes program; (2) immediate program: full access to the self-guided program from baseline onward; and (3) immediate program plus therapist support via Functional Imagery Training (FIT). Measures are administered at baseline and at 3, 6, and 12 months postbaseline. Primary outcomes are diabetes self-care behaviors (physical activity participation, diet, medication adherence, and blood glucose monitoring), glycated hemoglobin A1c (HbA1c) level, and diabetes-specific distress. Secondary outcomes are depression, anxiety, self-efficacy and adherence, and quality of life. Exposure data in terms of program uptake, use, time on each page, and program completion, as well as implementation feasibility will be conducted. Results: This trial is currently underway with funding support from the Wesley Research Institute in Brisbane, Australia. Conclusions: This is the first known trial of an automated, self-guided, Web-based support program that uses a holistic approach in targeting both type 2 diabetes self-management and dysphoria. Findings will inform the feasibility of implementing such a program on an ongoing basis, including in rural and regional locations.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Review question/objective The objective of this review is to find, critically appraise and synthesize the available quantitative evidence on the effectiveness of interventions that promote successful teaching of the evidence-based practice process in undergraduate health students, in preparation for them to become professional evidence-based practitioners. More specifically, the question that this review seeks to answer is: What is the effectiveness of teaching strategies for evidence-based practice for undergraduate health students? Inclusion criteria Types of participants This review will consider studies that include undergraduate health students from any undergraduate health discipline, including but not limited to medicine, nursing and allied health. Post graduate and post-registration students will not be included. Types of interventions This review will consider studies that evaluate strategies or interventions aimed at teaching any or all of the five steps of evidence-based practice, namely asking a structured clinical question; collecting the best evidence available; critically appraising the evidence to ensure validity, relevance and applicability; applying or integrating the results into clinical practice, and evaluating outcomes. The strategy may take place solely within a tertiary education environment or may be combined with a clinical setting. Types of outcomes This review will consider studies that include the following outcome measures: evidence-based practice behavior, knowledge, skills, attitudes, self-efficacy (or self-confidence), beliefs, values, intention to use evidence-based practice (future use) and confidence levels. Tools used to measure these outcomes will be assessed for reported validity, reliability and generalizability. Outcomes will be measured during the student’s education period up to graduation. If studies are conducted across different year levels this will be taken into account during analysis and reported accordingly.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Background Sleep disorders are very common in the community and are estimated to affect up to 45% of the world’s population. Pharmacists are in a position to give advice and provide appropriate services to individuals who are unable to easily access medical care. The purpose of this study is to develop an intervention to improve the management of sleep disorders in the community. The aims are: (1) to evaluate the effectiveness of a community pharmacy-based intervention in managing sleep disorders; (2) to evaluate the role of actigraph as an objective measure in monitoring certain sleep disorders, and; (3) to evaluate the extended role of community pharmacists in managing sleep disorders. This intervention is developed to monitor individuals undergoing treatment and overcome the difficulties in validating self-reported feedback. Method/design This is a community-based intervention, prospective, controlled trial, with one intervention group and one control group, comparing individuals receiving a structured intervention with those receiving usual care for sleep-related disorders at community pharmacies. Discussion This study will demonstrate the utilisation and efficacy of community pharmacy-based intervention to manage sleep disorders in the community, and will assess the possibility of implementing this intervention into the community pharmacy workflow.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Peer-based interventions have the potential to enhance quality of life and functioning; however their role specifically within the older population has not been fully investigated. The objective of this review therefore is to locate, appraise and synthesise evidence on the effectiveness of peer-based interventions on changes in health behaviors, specifically for the older population. The specific question to be answered is: “what is the effectiveness of peer-based interventions on health promoting behaviors in older adults, when compared to non peer-based interventions?”

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Introduction: Apathy, agitated behaviours, loneliness and depression are common consequences of dementia. This trial aims to evaluate the effect of a robotic animal on behavioural and psychological symptoms of dementia in people with dementia living in long-term aged care. Methods and analysis: A cluster-randomised controlled trial with three treatment groups: PARO (robotic animal), Plush-Toy (non-robotic PARO) or Usual Care (Control). The nursing home sites are Australian Government approved and accredited facilities of 60 or more beds. The sites are located in South-East Queensland, Australia. A sample of 380 adults with a diagnosis of dementia, aged 60 years or older living in one of the participating facilities will be recruited. The intervention consists of three individual 15 min non-facilitated sessions with PARO or Plush- Toy per week, for a period of 10 weeks. The primary outcomes of interest are improvement in agitation, mood states and engagement. Secondary outcomes include sleep duration, step count, change in psychotropic medication use, change in treatment costs, and staff and family perceptions of PARO or Plush-Toy. Video data will be analysed using Noldus XT Pocket Observer; descriptive statistics will be used for participants’ demographics and outcome measures; cluster and individual level analyses to test all hypotheses and Generalised Linear Models for cluster level and Generalised Estimation Equations and/or Multi-level Modeling for individual level data. Ethics and dissemination: The study participants or their proxy will provide written informed consent. The Griffith University Human Research Ethics Committee has approved the study (NRS/03/14/HREC). The results of the study will provide evidence of the efficacy of a robotic animal as a psychosocial treatment for the behavioural and psychological symptoms of dementia. Findings will be presented at local and international conference meetings and published in peer-reviewed journals.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient than the recent protocol of Abdalla and Pointcheval (FC 2005), proven in the random oracle model. We also observe some limitations in the model due to Abdalla, Fouque and Pointcheval (PKC 2005) for proving security of such protocols.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We present the first detailed application of Meadows’s cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two denial of service attacks against the protocol that are possible when an attacker is willing to reveal the source IP address. The first attack was identified through direct application of a cost-based modelling framework, while the second was only identified after considering coordinated attackers. Finally, we demonstrate how the inclusion of client puzzles in the protocol can improve denial of service resistance against both identified attacks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.