988 resultados para lan merkatua
Resumo:
This study evaluates three versions of the Wayfinding Effectiveness Scale (WES), developed to differentiate problems of wayfinding and wandering behavior of community-residing elders with dementia (EWD), in 266 dyads (EWD and caregiver) recruited from Alzheimer's Association chapters. Factor analyses yield a five-factor solution (explained variance = 62.6%): complex wayfinding goals, analytic strategies, global strategies, simple wayfinding goals, and being stimulus bound. Overall, internal consistencies are high: WES (.94-.95), and subscales are stable across all versions. Testretest reliability is acceptable for the overall WES and two subscales (complex and simple wayfinding goals) for the care recipient current behavior version. Construct validity is supported by the pattern of correlations among subscales and analyses of variance (ANOVAs) showing significant differences among the care recipient (current vs. prior behavior) and caregiver versions overall and for all subscales. Results support the WES as a valid and reliable measure of wayfinding effectiveness in persons with dementia.
Resumo:
As the acceptance and popularity of wireless networking technologies has proliferated, the security of the IEEE 802.11 wireless local area network (WLAN) has advanced in leaps and bounds. From tenuous beginnings, where the only safe way to deploy a WLAN was to assume it was hostile and employ higherlayer information security controls, to the current state of the art, all manner of improvements have been conceived and many implemented. This work investigates some of the remaining issues surrounding IEEE 802.11 WLAN operation. While the inherent issues in WLAN deployments and the problems of the original Wired Equivalent Privacy (WEP) provisions are well known and widely documented, there still exist a number of unresolved security issues. These include the security of management and control frames and the data link layer protocols themselves. This research introduces a novel proposal to enhance security at the link layer of IEEE 802.11 WLANs and then conducts detailed theoretical and empirical investigation and analysis of the eects of such proposals. This thesis �rst de�nes the state of the art in WLAN technology and deployment, including an overview of the current and emerging standards, the various threats, numerous vulnerabilities and current exploits. The IEEE 802.11i MAC security enhancements are discussed in detail, along with the likely outcomes of the IEEE 802.11 Task Group W1, looking into protected management frames. The problems of the remaining unprotected management frames, the unprotected control frames and the unprotected link layer headers are reviewed and a solution is hypothesised, to encrypt the entire MAC Protocol Data Unit (MPDU), including the MAC headers, not just the MAC Service Data Unit (MSDU) commonly performed by existing protocols. The proposal is not just to encrypt a copy of the headers while still using cleartext addresses to deliver the frame, as used by some existing protocols to support the integrity and authenticity of the headers, but to pass the entire MPDU only as ciphertext to also support the con�dentiality of the frame header information. This necessitates the decryption of every received frame using every available key before a station can determine if it is the intended recipient. As such, this raises serious concerns as to the viability of any such proposal due to the likely impact on throughput and scalability. The bulk of the research investigates the impacts of such proposals on the current WLAN protocols. Some possible variations to the proposal are also provided to enhance both utility and speed. The viability this proposal with respect to the eect on network throughput is then tested using a well known and respected network simulation tool, along with a number of analysis tools developed speci�cally for the data generated here. The simulator's operation is �rst validated against recognised test outputs, before a comprehensive set of control data is established, and then the proposal is tested and and compared against the controls. This detailed analysis of the various simulations should be of bene�t to other researchers who need to validate simulation results. The analysis of these tests indicate areas of immediate improvement and so the protocols are adjusted and a further series of experiments conducted. These �nal results are again analysed in detail and �nal appraisals provided.
Resumo:
Background: Sun exposure is the main source of vitamin D. Increasing scientific and media attention to the potential health benefits of sun exposure may lead to changes in sun exposure behaviors. Methods: To provide data that might help frame public health messages, we conducted an online survey among office workers in Brisbane, Australia, to determine knowledge and attitudes about vitamin D and associations of these with sun protection practices. Of the 4,709 people invited to participate, 2,867 (61%) completed the questionnaire. This analysis included 1,971 (69%) participants who indicated that they had heard about vitamin D. Results: Lack of knowledge about vitamin D was apparent. Eighteen percent of people were unaware of the bone benefits of vitamin D but 40% listed currently unconfirmed benefits. Over half of the participants indicated that more than 10 minutes in the sun was needed to attain enough vitamin D in summer, and 28% indicated more than 20 minutes in winter. This was significantly associated with increased time outdoors and decreased sunscreen use. People believing sun protection might cause vitamin D deficiency (11%) were less likely to be frequent sunscreen users (summer odds ratio, 0.63; 95% confidence interval, 0.52-0.75). Conclusions: Our findings suggest that there is some confusion about sun exposure and vitamin D, and that this may result in reduced sun-protective behavior. Impact: More information is needed about vitamin D production in the skin. In the interim, education campaigns need to specifically address the vitamin D issue to ensure that skin cancer incidence does not increase.
Resumo:
SAP and its research partners have been developing a lan- guage for describing details of Services from various view- points called the Unified Service Description Language (USDL). At the time of writing, version 3.0 describes technical implementation aspects of services, as well as stakeholders, pricing, lifecycle, and availability. Work is also underway to address other business and legal aspects of services. This language is designed to be used in service portfolio management, with a repository of service descriptions being available to various stakeholders in an organisation to allow for service prioritisation, development, deployment and lifecycle management. The structure of the USDL metadata is specified using an object-oriented metamodel that conforms to UML, MOF and EMF Ecore. As such it is amenable to code gener-ation for implementations of repositories that store service description instances. Although Web services toolkits can be used to make these programming language objects available as a set of Web services, the practicalities of writing dis- tributed clients against over one hundred class definitions, containing several hundred attributes, will make for very large WSDL interfaces and highly inefficient “chatty” implementations. This paper gives the high-level design for a completely model-generated repository for any version of USDL (or any other data-only metamodel), which uses the Eclipse Modelling Framework’s Java code generation, along with several open source plugins to create a robust, transactional repository running in a Java application with a relational datastore. However, the repository exposes a generated WSDL interface at a coarse granularity, suitable for distributed client code and user-interface creation. It uses heuristics to drive code generation to bridge between the Web service and EMF granularities.
Resumo:
Cell-based therapy is one of the major potential therapeutic strategies for cardiovascular, neuronal and degenerative diseases in recent years. Synthetic biodegradable polymers have been utilized increasingly in pharmaceutical, medical and biomedical engineering. Control of the interaction of living cells and biomaterials surfaces is one of the major goals in the design and development of new polymeric biomaterials in tissue engineering. The aims of this study is to develop a novel bio-mimic polymeric materials which will facilitate the delivery cells, control cell bioactivities and enhance the focal integration of graft cells with host tissues.
Resumo:
Ethernet is a key component of the standards used for digital process buses in transmission substations, namely IEC 61850 and IEEE Std 1588-2008 (PTPv2). These standards use multicast Ethernet frames that can be processed by more than one device. This presents some significant engineering challenges when implementing a sampled value process bus due to the large amount of network traffic. A system of network traffic segregation using a combination of Virtual LAN (VLAN) and multicast address filtering using managed Ethernet switches is presented. This includes VLAN prioritisation of traffic classes such as the IEC 61850 protocols GOOSE, MMS and sampled values (SV), and other protocols like PTPv2. Multicast address filtering is used to limit SV/GOOSE traffic to defined subsets of subscribers. A method to map substation plant reference designations to multicast address ranges is proposed that enables engineers to determine the type of traffic and location of the source by inspecting the destination address. This method and the proposed filtering strategy simplifies future changes to the prioritisation of network traffic, and is applicable to both process bus and station bus applications.
Resumo:
This study is conducted within the IS-Impact Research Track at Queensland University of Technology (QUT). The goal of the IS-Impact Track is, “to develop the most widely employed model for benchmarking information systems in organizations for the joint benefit of both research and practice” (Gable et al, 2006). IS-Impact is defined as “a measure at a point in time, of the stream of net benefits from the IS, to date and anticipated, as perceived by all key-user-groups” (Gable Sedera and Chan, 2008). Track efforts have yielded the bicameral IS-Impact measurement model; the “impact” half includes Organizational-Impact and Individual-Impact dimensions; the “quality” half includes System-Quality and Information-Quality dimensions. The IS-Impact model, by design, is intended to be robust, simple and generalizable, to yield results that are comparable across time, stakeholders, different systems and system contexts. The model and measurement approach employ perceptual measures and an instrument that is relevant to key stakeholder groups, thereby enabling the combination or comparison of stakeholder perspectives. Such a validated and widely accepted IS-Impact measurement model has both academic and practical value. It facilitates systematic operationalization of a main dependent variable in research (IS-Impact), which can also serve as an important independent variable. For IS management practice it provides a means to benchmark and track the performance of information systems in use. The objective of this study is to develop a Mandarin version IS-Impact model, encompassing a list of China-specific IS-Impact measures, aiding in a better understanding of the IS-Impact phenomenon in a Chinese organizational context. The IS-Impact model provides a much needed theoretical guidance for this investigation of ES and ES impacts in a Chinese context. The appropriateness and soundness of employing the IS-Impact model as a theoretical foundation are evident: the model originated from a sound theory of IS Success (1992), developed through rigorous validation, and also derived in the context of Enterprise Systems. Based on the IS-Impact model, this study investigates a number of research questions (RQs). Firstly, the research investigated what essential impacts have been derived from ES by Chinese users and organizations [RQ1]. Secondly, we investigate which salient quality features of ES are perceived by Chinese users [RQ2]. Thirdly, we seek to answer whether the quality and impacts measures are sufficient to assess ES-success in general [RQ3]. Lastly, the study attempts to address whether the IS-Impact measurement model is appropriate for Chinese organizations in terms of evaluating their ES [RQ4]. An open-ended, qualitative identification survey was employed in the study. A large body of short text data was gathered from 144 Chinese users and 633 valid IS-Impact statements were generated from the data set. A generally inductive approach was applied in the qualitative data analysis. Rigorous qualitative data coding resulted in 50 first-order categories with 6 second-order categories that were grounded from the context of Chinese organization. The six second-order categories are: 1) System Quality; 2) Information Quality; 3) Individual Impacts;4) Organizational Impacts; 5) User Quality and 6) IS Support Quality. The final research finding of the study is the contextualized Mandarin version IS-Impact measurement model that includes 38 measures organized into 4 dimensions: System Quality, information Quality, Individual Impacts and Organizational Impacts. The study also proposed two conceptual models to harmonize the IS-Impact model and the two emergent constructs – User Quality and IS Support Quality by drawing on previous IS effectiveness literatures and the Work System theory proposed by Alter (1999) respectively. The study is significant as it is the first effort that empirically and comprehensively investigates IS-Impact in China. Specifically, the research contributions can be classified into theoretical contributions and practical contributions. From the theoretical perspective, through qualitative evidence, the study test and consolidate IS-Impact measurement model in terms of the quality of robustness, completeness and generalizability. The unconventional research design exhibits creativity of the study. The theoretical model does not work as a top-down a priori seeking for evidence demonstrating its credibility; rather, the study allows a competitive model to emerge from the bottom-up and open-coding analysis. Besides, the study is an example extending and localizing pre-existing theory developed in Western context when the theory is introduced to a different context. On the other hand, from the practical perspective, It is first time to introduce prominent research findings in field of IS Success to Chinese academia and practitioner. This study provides a guideline for Chinese organizations to assess their Enterprise System, and leveraging IT investment in the future. As a research effort in ITPS track, this study contributes the research team with an alternative operationalization of the dependent variable. The future research can take on the contextualized Mandarin version IS-Impact framework as a theoretical a priori model, further quantitative and empirical testing its validity.
Resumo:
The recognition of carbohydrate moieties by cells of the innate immune system is emerging as an essential element in antifungal immunity, but despite the number and diversity of lectins expressed by innate immune cells, few carbohydrate receptors have been characterized. Mincle, a C-type lectin, is expressed predominantly on macrophages, and is here shown to play a role in macrophage responses to the yeast Candida albicans. After exposure to the yeast in vitro, Mincle localized to the phagocytic cup, but it was not essential for phagocytosis. In the absence of Mincle, production of TNF-_ by macrophages was reduced, both in vivo and in vitro. In addition, mice lacking Mincle showed a significantly increased susceptibility to systemic candidiasis. Thus, Mincle plays a novel and nonredundant role in the induction of inflammatory signaling in response to C. albicans infection.
Resumo:
The IEEE Wireless LAN standard has been a true success story by enabling convenient, efficient and low-cost access to broadband networks for both private and professional use. However, the increasing density and uncoordinated operation of wireless access points, combined with constantly growing traffic demands have started hurting the users' quality of experience. On the other hand, the emerging ubiquity of wireless access has placed it at the center of attention for network attacks, which not only raises users' concerns on security but also indirectly affects connection quality due to proactive measures against security attacks. In this work, we introduce an integrated solution to congestion avoidance and attack mitigation problems through cooperation among wireless access points. The proposed solution implements a Partially Observable Markov Decision Process (POMDP) as an intelligent distributed control system. By successfully differentiating resource hampering attacks from overload cases, the control system takes an appropriate action in each detected anomaly case without disturbing the quality of service for end users. The proposed solution is fully implemented on a small-scale testbed, on which we present our observations and demonstrate the effectiveness of the system to detect and alleviate both attack and congestion situations.
Resumo:
Hepatitis B is a significant public health challenge within some subpopulations in Australia, including Chinese and Vietnamese migrants. There has been limited research on hepatitis B knowledge and actions in these communities. The authors conducted a self-administered survey among 442 Chinese and 433 Vietnamese in Brisbane. Generally, the knowledge is best described as “moderate.” One in 2 could not identify the sexual transmission risk and less than one third knew that sharing foods or drinks did not spread the disease. The majority of Vietnamese (80%) and 60% of Chinese respondents indicated prior testing. Vaccination was reported in 60% of the Vietnamese and in 52% of the Chinese. Knowledge was better among Chinese people who had been tested and vaccinated compared with those who were nontested and nonvaccinated. Only 3.5% of the Chinese, but 11.6% of the Vietnamese, indicated having a positive test result hepatitis B virus. This study helps identify strategies for programs targeting both communities and practitioners.