201 resultados para harmonised protocol

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents the design and evaluation of a token-based protocol supporting independent updates of replicated objects. The paper makes three major contributions. Firstly, a token is used to simplify the control of update propagation and ordering. Secondly a partial commit state is introduced to support independent updates and to enhance the efficiency of transaction processing. Thirdly, a data partition methodology based on priorities is adopted to reduce update conflicts. We evaluate our protocol in comparison of two existing replication-control protocols in terms of transaction processing efficiency.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anycast and multicast are two important Internet services. Combining the two protocols can provide new and practical services. In this paper we propose a new Internet service, Minicast: in the scenario of n replicated or similar servers, deliver a message to at least m members, 1 m n. Such a service has potential applications in information retrieval, parallel computing, cache queries, etc. The service can provide the same Internet service with an optimal cost, reducing bandwidth consumption, network delay, and so on. We design a multi-core tree based architecture for the Minicast service and present the criteria for calculating the subcores among a subset of Minicast members. Simulation shows that the proposed architecture can even the Minicast traffic, and the Minicast application can save the consumptions of network resource.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ad hoc networks became a hot topic recently, but the routing algorithm of anycast in the ad hoc networks has not yet been much explored. In this paper, we propose a mesh-based anycast routing algorithm (MARP) for ad hoc networks. The proposed routing model is robust and reliable, which can solve the unsteady topology problem in ad hoc networks. The future work is discussed at the end of this paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile computing has enabled users to seamlessly access databases even when they are on the move. Mobile computing environments require data management approaches that are able to provide complete and highly available access to shared data at any time from any where. In this paper, we propose a novel replicated data protocol for achieving such goal. The proposed scheme replicates data synchronously over stationary sites based on three dimensional grid structure while objects in mobile sites are asynchronously replicated based on commonly visited sites for each user. This combination allows the proposed protocol to operate with less than full connectivity, to easily adapt to changes in group membership and not require all sites to agree to update data objects at any given time, thus giving the technique flexibility in mobile environments. The proposed replication technique is compared with a baseline replication technique and shown to exhibit high availability, fault tolerance and minimal access times of the data and services, which are very important in an environment with low-quality communication links.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Selective feeding programs are centres for the treatment of persons suffering from acute malnutrition. Unlike chronic malnutrition, acute malnutrition reflects recent problems. In a crisis situation, wasting is preferred above other indicators because it is sensitive to rapid change, indicates present change, can be used to monitor the impact of interventions and is a good predictor of immediate mortality risk. This paper reviews the current approach being used in the field to evaluate the effectiveness of feeding programs. There is no comprehensive evaluation framework in place to assess the impact of feeding programs on mortality due to malnutrition. Some loose outcome measures, such as the number of children enrolled in a feeding centre, are being used to determine if a feeding centre should continue. In addition, malnutrition prevalence and crude mortality rates determined through nutritional and mortality surveys are used to assess the impact of feeding programs. This procedure does not take into account potential confounding factors that impact on malnutrition prevalence, including access to non-relief foods and the general food ration. Therefore, one could not confidently say that the reduction of malnutrition prevalence is a result of feeding programs. This paper presents an alternative approach to evaluating feeding centres.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a framework for merging inconsistent beliefs in the analysis of security protocols. The merge application is a procedure of computing the inferred beliefs of message sources and resolving the conflicts among the sources. Some security properties of secure messages are used to ensure the correctness of authentication of messages. Several instances are presented, and demonstrate our method is useful in resolving inconsistent beliefs in secure messages.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work we evaluate the performance of routing protocols for mobile ad hoc networks using different physical layer models. The results obtained show that the performance results obtained using idealized models such as the free space propagation model vary significantly when propagation effects such as path loss and shadowing are considered. This difference in performance indicates that optimization is required in the protocol development space that takes into account channel state information (CSI). Such an optimization requires a cross layer approach to be adopted and a framework for protocol performance evaluation to be established. We believe that this work would serve as a first step in this direction. We provide comparative performance results through network simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Conservative treatment of patellar tendinopathy has been minimally investigated. Effective validated treatment protocols are required.

Objectives:
To investigate the immediate (12 weeks) and long term (12 months) efficacy of two eccentric exercise programmes for the treatment of patellar tendinopathy.

Methods: This was a prospective randomised controlled trial of 17 elite volleyball players with clinically diagnosed and imaging confirmed patellar tendinopathy. Participants were randomly assigned to one of two treatment groups: a decline group and a step group. The decline group were required to perform single leg squats on a 25° decline board, exercising into tendon pain and progressing their exercises with load. The step group performed single leg squats on a 10 cm step, exercising without tendon pain and progressing their exercises with speed then load. All participants completed a 12 week intervention programme during their preseason. Outcome measures used were the Victorian Institute of Sport Assessment (VISA) score for knee function and 100 mm visual analogue scale (VAS) for tendon pain with activity. Measures were taken throughout the intervention period and at 12 months.

Results: Both groups had improved significantly from baseline at 12 weeks and 12 months. Analysis of the likelihood of a 20 point improvement in VISA score at 12 months revealed a greater likelihood of clinical improvements in the decline group than the step group. VAS scores at 12 months did not differ between the groups.

Conclusions: Both exercise protocols improved pain and sporting function in volleyball players over 12 months. This study indicates that the decline squat protocol offers greater clinical gains during a rehabilitation programme for patellar tendinopathy in athletes who continue to train and play with pain.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background
The PEACH study is based on an innovative 'telephone coaching' program that has been used effectively in a post cardiac event trial. This intervention will be tested in a General Practice setting in a pragmatic trial using existing Practice Nurses (PN) as coaches for people with type 2 diabetes (T2D). Actual clinical care often fails to achieve standards, that are based on evidence that self-management interventions (educational and psychological) and intensive pharmacotherapy improve diabetes control. Telephone coaching in our study focuses on both. This paper describes our study protocol, which aims to test whether goal focused telephone coaching in T2D can improve diabetes control and reduce the treatment gap between guideline based standards and actual clinical practice.
Methods/design
In a cluster randomised controlled trial, general practices employing Practice Nurses (PNs) are randomly allocated to an intervention or control group. We aim to recruit 546 patients with poorly controlled T2D (HbA1c >7.5%) from 42 General Practices that employ PNs in Melbourne, Australia. PNs from General Practices allocated to the intervention group will be trained in diabetes telephone coaching focusing on biochemical targets addressing both patient self-management and engaging patients to work with their General Practitioners (GPs) to intensify pharmacological treatment according to the study clinical protocol. Patients of intervention group practices will receive 8 telephone coaching sessions and one face-to-face coaching session from existing PNs over 18 months plus usual care and outcomes will be compared to the control group, who will only receive only usual care from their GPs. The primary outcome is HbA1c levels and secondary outcomes include cardiovascular disease risk factors, behavioral risk factors and process of care measures.
Discussion
Understanding how to achieve comprehensive treatment of T2D in a General Practice setting is the focus of the PEACH study. This study explores the potential role for PNs to help reduce the treatment and outcomes gap in people with T2D by using telephone coaching. The intervention, if found to be effective, has potential to be sustained and embedded within real world General Practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Collusion attack has been recognized as a key issue in e-commerce systems and increasingly attracted people’s attention for quite some time in the literatures of information security. Regardless of the wide application of security protocol, this attack has been largely ignored in the protocol analysis. There is a lack of efficient and intuitive approaches to identify this attack since it is usually hidden and uneasy to find. Thus, this article addresses this critical issue using a compact and intuitive Bayesian network (BN)-based scheme. It assists in not only discovering the secure messages that may lead to the attack but also providing the degree of dependency to measure the occurrence of collusion attack. The experimental results demonstrate that our approaches are useful to detect the collusion attack in secure messages and enhance the protocol analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Depression amongst adolescents is a costly societal problem. Little research documents the effectiveness of public mental health services in mapping this problem. Further, it is not clear whether usual care in such services can be improved via clinician training in a relevant evidence based intervention. One such intervention, found to be effective and easily learned amongst novice clinicians, is Interpersonal Psychotherapy (IPT). The study described in the current paper has two main objectives. First, it aims to investigate the impact on clinical care of implementing Interpersonal Psychotherapy for Adolescents for the treatment of adolescent depression within a rural mental health service compared with Treatment as Usual (TAU). The second objective is to record the process and challenges (i.e. feasibility, acceptability, sustainability) associated with implementing and evaluating an evidence-based intervention within a community service. This paper outlines the study rationale and design for this community based research trial.

Methods/design: The study involves a cluster randomisation trial to be conducted within a Child and Adolescent Mental Health Service in rural Australia. All clinicians in the service will be invited to participate.  Participating clinicians will be randomised via block design at each of four sites to (a) training and delivery of IPT, or (b) TAU. The primary measure of impact on care will be a clinically significant change in depressive  symptomatology, with secondary outcomes involving treatment satisfaction and changes in other symptomatology. Participating adolescents with significant depressive symptomatology, aged 12 to 18 years, will complete assessment measures at Weeks 0, 12 and 24 of treatment. They will also complete a depression inventory once a month during that period. This study aims to recruit 60 adolescent participants and their parent/guardian/s. A power analysis is not indicated as an intra-class correlation coefficient will be calculated and used to inform sample size calculations for subsequent large-scale trials. Qualitative data regarding process implementation will be collected quarterly from focus groups with participating clinicians over 18 months, plus phone interviews with participating adolescents and parent/guardians at 12 weeks and 24 weeks of treatment. The focus group qualitative data will be analysed using a Fourth Generation Evaluation methodology that includes a constant comparative cyclic analysis method.

Discussion
: This study protocol will be informative for researchers and clinicians interested in considering, designing and/or conducting cluster randomised trials within community practice such as mental health services.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security protocols have been recently found with subtle flaws due to incomplete or ambiguous specification. Although formal methods have remarkably assisted in protocol analysis, they ignores the effect of hostile/uncertain environment, which might lead to inconsistent belief that can be held by principals in delivered messages. This discrepant belief may prevent us from representing the insecurity and uncertainty in a real trading situation. Unfortunately, the current approaches lack the ability to handle the inconsistent belief. This article presents a probabilistic method, which intuitively measures the belief from different principals that can be put on the goal of the protocol. The experiments demonstrate our method is useful to enhance the protocol analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Protocol analysis is an empirical method applied by researchers in cognitive psychology and behavioural analysis. Protocol analysis can be used to collect, document and analyse thought processes by an individual problem solver. In general, research subjects are asked to think aloud when performing a given task. Their verbal reports are transcribed and represent a sequence of their thoughts and cognitive activities. These verbal reports are analysed to identify relevant segments of cognitive behaviours by the research subjects. The analysis results may be cross-examined (or validated through retrospective interviews with the research subjects). This paper offers a critical analysis of this research method, its approaches to data collection and analysis, strengths and limitations, and discusses its use in information systems research. The aim is to explore the use of protocol analysis in studying the creative requirements engineering process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sedation protocols are increasingly being investigated as a method of achieving improved patient outcomes whilst guiding the decision making of both nursing and medical practitioners. However, only a limited number of studies have investigated the perceptions of staff towards a sedation protocol during its implementation. This study was designed to survey the perceptions of staff regarding the implementation of a sedation protocol in an Australian intensive care unit (ICU). Questionnaires were distributed to all multidisciplinary team members who had used the sedation protocol. The response rate was 50% (n=70). The questionnaire combined the use of visual analogue scales plus a comments section to obtain qualitative data.

The results revealed that staff perceived sedation management to be enhanced with the use of a protocol and therefore should be incorporated into routine clinical practice. Staff perceived that providing clear guidelines that facilitated decision making and assisted beginner practitioners enhanced sedation management. In addition, there was a perceived improvement in the patient outcomes, including a decrease in the frequency of over-sedation resulting in a reduced ICU stay.

Positive perceptions may assist in the introduction of other interventional protocols. Other protocols may target areas where variability in clinical decision making exists, despite research evidence that supports specific therapeutic interventions. Further studies addressing protocol implementation for clinical interventions are warranted in other ICU settings.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobility service for hospital technicians involved in telemedicine applications is one of the key issues in providing more flexible and efficient in-house or remote health care services. Today, the Internet based communication has widened the opportunity of event monitoring systems in the medical field. The session initiation protocol (SIP) can work on a variety of devices and can be used to create a medical event notification system. Its adoption as the protocol of choice for third generation wireless networks allows for a robust and scalable environment. One of the advantages of SIP is that it supports personal mobility through the separation of user addressing and device addressing. In this paper, the authors propose a possible solution framework for telemedicine alert notification system based SIP-specific event notification.