868 resultados para Medium access control protocol


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Recent technological advancements have played a key role in seamlessly integrating cloud, edge, and Internet of Things (IoT) technologies, giving rise to the Cloud-to-Thing Continuum paradigm. This cloud model connects many heterogeneous resources that generate a large amount of data and collaborate to deliver next-generation services. While it has the potential to reshape several application domains, the number of connected entities remarkably broadens the security attack surface. One of the main problems is the lack of security measures to adapt to the dynamic and evolving conditions of the Cloud-To-Thing Continuum. To address this challenge, this dissertation proposes novel adaptable security mechanisms. Adaptable security is the capability of security controls, systems, and protocols to dynamically adjust to changing conditions and scenarios. However, since the design and development of novel security mechanisms can be explored from different perspectives and levels, we place our attention on threat modeling and access control. The contributions of the thesis can be summarized as follows. First, we introduce a model-based methodology that secures the design of edge and cyber-physical systems. This solution identifies threats, security controls, and moving target defense techniques based on system features. Then, we focus on access control management. Since access control policies are subject to modifications, we evaluate how they can be efficiently shared among distributed areas, highlighting the effectiveness of distributed ledger technologies. Furthermore, we propose a risk-based authorization middleware, adjusting permissions based on real-time data, and a federated learning framework that enhances trustworthiness by weighting each client's contributions according to the quality of their partial models. Finally, since authorization revocation is another critical concern, we present an efficient revocation scheme for verifiable credentials in IoT networks, featuring decentralization, demanding minimum storage and computing capabilities. All the mechanisms have been evaluated in different conditions, proving their adaptability to the Cloud-to-Thing Continuum landscape.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Digital Breast Tomosynthesis (DBT) is an advanced mammography technique based on the reconstruction of a pseudo-volumetric image. To date, image quality represents the most deficient section of DBT quality control protocols. In fact, related tests are not yet characterized by either action levels or typical values. This thesis work focuses on the evaluation of one aspect of image quality: the z-resolution. The latter is studied in terms of Artifact Spread Function (ASF), a function that describes the signal spread of a detail along the reconstructed focal planes. To quantify the ASF numerically, its Full Width at Half Maximum (FWHM) is calculated and used as a representative index of z-resolution. Experimental measurements were acquired in 24 DBT systems, of 7 different models, currently in use in 20 hospital facilities in Italy. The analysis, performed on the clinical reconstructed images, of 5 different commercial phantoms, lead to the identification of characteristic FWHM values for each type of DBT system. The ASF clearly showed a dependence on the size of the detail, providing higher FWHM values for larger objects. The z-resolution was found to be positively influenced by the acquisition angle: Fujifilm sistematically showed wider ASF profiles in ST mode (15°) than in HR mode (40°). However, no clear relationship was found between angular range and ASF, among different DBT systems, due to the influence of the peculiarities of each reconstruction algorithm. The experimental approach shown in this thesis work can be proposed as a z-resolution quality control test procedure. Contextually, the values found could be used as a starting point for identifying typical values to be included in the test, in a DBT protocol. Clearly, a statistically significant number of images is needed to do this. The equipment involved in this work is located in hospitals and is not available for research purposes, so only a limited amount of data was acquired and processed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The project aims to experiment the Cone Beam Breast Computed Tomography technique using a standard digital mammography system. The work is focused on the definition of a protocol of quality measurements for the pre-clinical evaluation of the machine. The paper is developed in two parts. The first is specifically concerned with the methods used to define the image quality and dosimetry aspects specific for digital mammography devices. A complete characterization of the system has been performed according to the applicable IEC standards to assure the performances of the equipment and define the quality levels. Due to the lack of a quality control protocol dedicated to CBBCT mammography scanner, a new equivalent test procedure has been proposed. The second part of the paper is focused on the evaluation, through quantitative and visual analyzes, of the CBCT exam feasibility in the hardware and software conditions currently proposed by IMS Giotto. The prototype was in fact developed differing from the technical choices of competing companies and developed for a different intended use. The main difference with respect to the existing breast CT scanners is the possibility of performing on the same system the CBBCT scanning but also all the mammographic techniques. In this thesis, we aim to assess whether, in the current setup, considering a dosimetric range very close to that used in the clinic, the tests produce results that can be considered acceptable or at least indicative of the feasibility of the entire project from a commercial point of view. For this purpose, the final reconstruction images, obtained by two previously developed software, are analyzed.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The study is funded by Chiesi Farmaceutici S.p.A., Parma, Italy

Relevância:

50.00% 50.00%

Publicador:

Resumo:

BACKGROUND: Classical disease phenotypes are mainly based on descriptions of symptoms and the hypothesis that a given pattern of symptoms provides a diagnosis. With refined technologies there is growing evidence that disease expression in patients is much more diverse and subtypes need to be defined to allow a better targeted treatment. One of the aims of the Mechanisms of the Development of Allergy Project (MeDALL,FP7) is to re-define the classical phenotypes of IgE-associated allergic diseases from birth to adolescence, by consensus among experts using a systematic review of the literature and identify possible gaps in research for new disease markers. This paper describes the methods to be used for the systematic review of the classical IgE-associated phenotypes applicable in general to other systematic reviews also addressing phenotype definitions based on evidence. METHODS/DESIGN: Eligible papers were identified by PubMed search (complete database through April 2011). This search yielded 12,043 citations. The review includes intervention studies (randomized and clinical controlled trials) and observational studies (cohort studies including birth cohorts, case-control studies) as well as case series. Systematic and non-systematic reviews, guidelines, position papers and editorials are not excluded but dealt with separately. Two independent reviewers in parallel conducted consecutive title and abstract filtering scans. For publications where title and abstract fulfilled the inclusion criteria the full text was assessed. In the final step, two independent reviewers abstracted data using a pre-designed data extraction form with disagreements resolved by discussion among investigators. DISCUSSION: The systematic review protocol described here allows to generate broad,multi-phenotype reviews and consensus phenotype definitions. The in-depth analysis of the existing literature on the classification of IgE-associated allergic diseases through such a systematic review will 1) provide relevant information on the current epidemiologic definitions of allergic diseases, 2) address heterogeneity and interrelationships and 3) identify gaps in knowledge.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Background Falling in older age is a major public health concern due to its costly and disabling consequences. However very few randomised controlled trials (RCTs) have been conducted in developing countries, in which population ageing is expected to be particularly substantial in coming years. This article describes the design of an RCT to evaluate the effectiveness of a multifactorial falls prevention program in reducing the rate of falls in community-dwelling older people. Methods/design Multicentre parallel-group RCT involving 612 community-dwelling men and women aged 60 years and over, who have fallen at least once in the previous year. Participants will be recruited in multiple settings in Sao Paulo, Brazil and will be randomly allocated to a control group or an intervention group. The usual care control group will undergo a fall risk factor assessment and be referred to their clinicians with the risk assessment report so that individual modifiable risk factors can be managed without any specific guidance. The intervention group will receive a 12-week Multifactorial Falls Prevention Program consisting of: an individualised medical management of modifiable risk factors, a group-based, supervised balance training exercise program plus an unsupervised home-based exercise program, an educational/behavioral intervention. Both groups will receive a leaflet containing general information about fall prevention strategies. Primary outcome measures will be the rate of falls and the proportion of fallers recorded by monthly falls diaries and telephone calls over a 12 month period. Secondary outcomes measures will include risk of falling, fall-related self-efficacy score, measures of balance, mobility and strength, fall-related health services use and independence with daily tasks. Data will be analysed using the intention-to-treat principle.The incidence of falls in the intervention and control groups will be calculated and compared using negative binomial regression analysis. Discussion This study is the first trial to be conducted in Brazil to evaluate the effectiveness of an intervention to prevent falls. If proven to reduce falls this study has the potential to benefit older adults and assist health care practitioners and policy makers to implement and promote effective falls prevention interventions. Trial registration ClinicalTrials.gov (NCT01698580)

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Abstract Background Low back pain is a relevant public health problem, being an important cause of work absenteeism worldwide, as well as affecting the quality of life of sufferers and their individual functional performances. Supervised active physical routines and of cognitive-behavioral therapies are recommended for the treatment of chronic Low back pain, although evidence to support the effectiveness of different techniques is missing. Accordingly, the aim of this study is to contrast the effectiveness of two types of exercises, graded activity or supervised, in decreasing symptoms of chronic low back pain. Methods/design Sample will consist of 66 patients, blindly allocated into one of two groups: 1) Graded activity which, based on an operant approach, will use time-contingent methods aiming to increase participants’ activity levels; 2) Supervised exercise, where participants will be trained for strengthening, stretching, and motor control targeting different muscle groups. Interventions will last one hour, and will happen twice a week for 6 weeks. Outcomes (pain, disability, quality of life, global perceived effect, return to work, physical activity, physical capacity, and kinesiophobia) will be assessed at baseline, at treatment end, and three and six months after treatment end. Data collection will be conducted by an investigator blinded to treatment allocation. Discussion This project describes the randomisation method that will be used to compare the effectiveness of two different treatments for chronic low back pain: graded activity and supervised exercises. Since optimal approach for patients with chronic back pain have yet not been defined based on evidence, good quality studies on the subject are necessary. Trial registration NCT01719276

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Until a few years ago, most of the network communications were based in the wire as the physical media, but due to the advances and the maturity of the wireless communications, this is changing. Nowadays wireless communications offers fast, secure, efficient and reliable connections. Mobile communications are in expansion, clearly driven by the use of smart phones and other mobile devices, the use of laptops, etc… Besides that point, the inversion in the installation and maintenance of the physical medium is much lower than in wired communications, not only because the air has no cost, but because the installation and maintenance of the wire require a high economic cost. Besides the economic cost we find that wire is a more vulnerable medium to external threats such as noise, sabotages, etc… There are two different types of wireless networks: those which the structure is part of the network itself and those which have a lack of structure or any centralization, in a way that the devices that form part of the network can connect themselves in a dynamic and random way, handling also the routing of every control and information messages, this kind of networks is known as Ad-hoc. In the present work we will proceed to study one of the multiple wireless protocols that allows mobile communications, it is Optimized Link State Routing, from now on, OLSR, it is an pro-active routing, standard mechanism that works in a distributed in order to stablish the connections among the different nodes that belong to a wireless network. Thanks to this protocol it is possible to get all the routing tables in all the devices correctly updated every moment through the periodical transmission of control messages and on this way allow a complete connectivity among the devices that are part of the network and also, allow access to other external networks such as virtual private networks o Internet. This protocol could be perfectly used in environments such as airports, malls, etc… The update of the routing tables in all the devices is got thanks to the periodical transmission of control messages and finally it will offer connectivity among all the devices and the corresponding external networks. For the study of OLSR protocol we will have the help of the network simulator “Network Simulator 2”, a freeware network simulator programmed in C++ based in discrete events. This simulator is used mainly in educational and research environments and allows a very extensive range of protocols, both, wired networks protocols and wireless network protocols, what is going to be really useful to proceed to the simulation of different configurations of networks and protocols. In the present work we will also study different simulations with Network Simulator 2, in different scenarios with different configurations, wired networks, and Ad-hoc networks, where we will study OLSR Protocol. RESUMEN. Hasta hace pocos años, la mayoría de las comunicaciones de red estaban basadas en el cable como medio físico pero debido al avance y madurez alcanzados en el campo de las comunicaciones inalámbricas esto está cambiando. Hoy día las comunicaciones inalámbricas nos ofrecen conexiones veloces, seguras, eficientes y fiables. Las comunicaciones móviles se encuentran en su momento de máxima expansión, claramente impulsadas por el uso de teléfonos y demás dispositivos móviles, el uso de portátiles, etc… Además la inversión a realizar en la instalación y el mantenimiento del medio físico en las comunicaciones móviles es muchísimo menor que en comunicaciones por cable, ya no sólo porque el aire no tenga coste alguno, sino porque la instalación y mantenimiento del cable precisan de un elevado coste económico por norma. Además del coste económico nos encontramos con que es un medio más vulnerable a amenazas externas tales como el ruido, escuchas no autorizadas, sabotajes, etc… Existen dos tipos de redes inalámbricas: las constituidas por una infraestructura que forma parte más o menos de la misma y las que carecen de estructura o centralización alguna, de modo que los dispositivos que forman parte de ella pueden conectarse de manera dinámica y arbitraria entre ellos, encargándose además del encaminamiento de todos los mensajes de control e información, a este tipo de redes se las conoce como redes Ad-hoc. En el presente Proyecto de Fin de Carrera se procederá al estudio de uno de los múltiples protocolos inalámbricos que permiten comunicaciones móviles, se trata del protocolo inalámbrico Optimized Link State Routing, de ahora en adelante OLSR, un mecanismo estándar de enrutamiento pro-activo, que trabaja de manera distribuida para establecer las conexiones entre los nodos que formen parte de las redes inalámbricas Ad-hoc, las cuales carecen de un nodo central y de una infraestructura pre-existente. Gracias a este protocolo es posible conseguir que todos los equipos mantengan en todo momento las tablas de ruta actualizadas correctamente mediante la transmisión periódica de mensajes de control y así permitir una completa conectividad entre todos los equipos que formen parte de la red y, a su vez, también permitir el acceso a otras redes externas tales como redes privadas virtuales o Internet. Este protocolo sería usado en entornos tales como aeropuertos La actualización de las tablas de enrutamiento de todos los equipos se conseguirá mediante la transmisión periódica de mensajes de control y así finalmente se podrá permitir conectividad entre todos los equipos y con las correspondientes redes externas. Para el estudio del protocolo OLSR contaremos con el simulador de redes Network Simulator 2, un simulador de redes freeware programado en C++ basado en eventos discretos. Este simulador es usado principalmente en ambientes educativos y de investigación y permite la simulación tanto de protocolos unicast como multicast. El campo donde más se utiliza es precisamente en el de la investigación de redes móviles Ad-hoc. El simulador Network Simulator 2 no sólo implementa el protocolo OLSR, sino que éste implementa una amplia gama de protocolos, tanto de redes cableadas como de redes inalámbricas, lo cual va a sernos de gran utilidad para proceder a la simulación de distintas configuraciones de redes y protocolos. En el presente Proyecto de Fin de Carrera se estudiarán también diversas simulaciones con el simulador NS2 en diferentes escenarios con diversas configuraciones; redes cableadas, redes inalámbricas Ad-hoc, donde se estudiará el protocolo antes mencionado: OLSR. Este Proyecto de Fin de Carrera consta de cuatro apartados distintos: Primeramente se realizará el estudio completo del protocolo OLSR, se verán los beneficios y contrapartidas que ofrece este protocolo inalámbrico. También se verán los distintos tipos de mensajes existentes en este protocolo y unos pequeños ejemplos del funcionamiento del protocolo OLSR. Seguidamente se hará una pequeña introducción al simulador de redes Network Simulator 2, veremos la historia de este simulador, y también se hará referencia a la herramienta extra NAM, la cual nos permitirá visualizar el intercambio de paquetes que se produce entre los diferentes dispositivos de nuestras simulaciones de forma intuitiva y amigable. Se hará mención a la plataforma MASIMUM, encargada de facilitar en un entorno académico software y documentación a sus alumnos con el fin de facilitarles la investigación y la simulación de redes y sensores Ad-hoc. Finalmente se verán dos ejemplos, uno en el que se realizará una simulación entre dos PCs en un entorno Ethernet y otro ejemplo en el que se realizará una simulación inalámbrica entre cinco dispositivos móviles mediante el protocolo a estudiar, OLSR.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

"UILU-ENG 83 1723"--Cover.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Background: Dietary behaviour interventions have the potential to reduce diet-related disease. Ample opportunity exists to implement these interventions in the workplace. The overall aim is to assess the effectiveness and cost-effectiveness of complex dietary interventions focused on environmental dietary modification alone or in combination with nutrition education in large manufacturing workplace settings. Methods/design: A clustered controlled trial involving four large multinational manufacturing workplaces in Cork will be conducted. The complex intervention design has been developed using the Medical Research Council's framework and the National Institute for Health and Clinical Excellence (NICE) guidelines and will be reported using the TREND statement for the transparent reporting of evaluations with non-randomized designs. It will draw on a soft paternalistic 'nudge' theoretical perspective. It will draw on a soft paternalistic "nudge" theoretical perspective. Nutrition education will include three elements: group presentations, individual nutrition consultations and detailed nutrition information. Environmental dietary modification will consist of five elements: (a) restriction of fat, saturated fat, sugar and salt, (b) increase in fibre, fruit and vegetables, (c) price discounts for whole fresh fruit, (d) strategic positioning of healthier alternatives and (e) portion size control. No intervention will be offered in workplace A (control). Workplace B will receive nutrition education. Workplace C will receive nutrition education and environmental dietary modification. Workplace D will receive environmental dietary modification alone. A total of 448 participants aged 18 to 64 years will be selected randomly. All permanent, full-time employees, purchasing at least one main meal in the workplace daily, will be eligible. Changes in dietary behaviours, nutrition knowledge, health status with measurements obtained at baseline and at intervals of 3 to 4 months, 7 to 9 months and 13 to 16 months will be recorded. A process evaluation and cost-effectiveness economic evaluation will be undertaken. Discussion: A 'Food Choice at Work' toolbox (concise teaching kit to replicate the intervention) will be developed to inform and guide future researchers, workplace stakeholders, policy makers and the food industry. Trial registration: Current Controlled Trials, ISRCTN35108237.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

A cellulose pulp obtained by chemical pre-treatment of brewer`s spent grain was saccharified by a commercial cellulase preparation and the produced hydrolysate (50 g/l glucose) was fermented to lactic acid by Lactobacillus delbrueckii. The effects of pH control and nutrient supplementation of the hydrolysate on fermentation performance were investigated. Addition of 5g/l yeast extract enhanced the lactic acid volumetric productivity that attained 0.53 g/l h, value 18% higher than that obtained from non-supplemented hydrolysate. Addition of the MRS broth medium components (except the carbon source) was still better, providing a productivity of 0.79 g/l h. In all the cases, the lactic acid yield factor was of 0.7 g/g glucose consumed, but the fermentations stopped after 24 h due to the pH drop from 6.0 to 4.2, resulting in large amounts of residual glucose (38-41 g/l). Fermentation runs pH-controlled at 6.0 gave better results than those where the initial pH was not further controlled. The best result, 35.54 g/l lactic acid (0.99 g/g glucose consumed) was obtained during the pH-controlled fermentation of hydrolysate medium supplemented with MRS components. The volumetric productivity at the end of this fermentation was 0.59 g/l h, with a maximum of 0.82 g/l h during the first 12 h. (c) 2008 Elsevier B.V. All rights reserved.