798 resultados para cryptographic protocol
Resumo:
BACKGROUND: Cerebral palsy is a permanent disorder of posture and movement caused by disturbances in the developing brain. It affects approximately 1 in every 500 children in developed countries and is the most common form of childhood physical disability. People with cerebral palsy may also have problems with speech, vision and hearing, intellectual difficulties and epilepsy. Health and therapy services are frequently required throughout life, and this care should be effective and evidence informed; however, accessing and adopting new research findings into day-to-day clinical practice is often delayed.
METHODS/DESIGN: This 3-year study employs a before and after design to evaluate if a multi-strategy intervention can improve research implementation among allied health professionals (AHPs) who work with children and young people with cerebral palsy and to establish if children's health outcomes can be improved by routine clinical assessment. The intervention comprises (1) knowledge brokering with AHPs, (2) access to an online research evidence library, (3) provision of negotiated evidence-based training and education, and (4) routine use of evidence-based measures with children and young people aged 3-18 years with cerebral palsy. The study is being implemented in four organisations, with a fifth organisation acting as a comparison site, across four Australian states. Effectiveness will be assessed using questionnaires completed by AHPs at baseline, 6, 12 and 24 months, and by monitoring the extent of use of evidence-based measures. Children's health outcomes will be evaluated by longitudinal analyses.
DISCUSSION: Government, policy makers and service providers all seek evidence-based information to support decision-making about how to distribute scarce resources, and families are seeking information to support intervention choices. This study will provide knowledge about what constitutes an efficient, evidence-informed service and which allied health interventions are implemented for children with cerebral palsy.
TRIAL REGISTRATION: Trial is not a controlled healthcare intervention and is not registered.
Resumo:
Background: The global transfer of nursing and midwifery education to higher education institutes has led to student nurses and midwives experiencing challenges previously faced by traditional third-level students, including isolation, loneliness, financial difficulties and academic pressure. These challenges can contribute to increased stress and anxiety levels which may be detrimental to the successful transition to higher education, thus leading to an increase in attrition rates. Peer mentoring as an intervention has been suggested to be effective in supporting students in the transition to third-level education through enhancing a sense of belongingness and improving student satisfaction, engagement and retention rates. This proposed systematic review aims to determine the effectiveness of peer mentoring in enhancing levels of student engagement, sense of belonging and overall satisfaction of first-year undergraduate students following transition into higher education.
Methods: MEDLINE, Web of Knowledge, ProQuest, Embase, CINAHL, ERIC, PsycINFO and CENTRAL databases will be searched for qualitative, quantitative and mixed methods studies on the implementation of peer assessment strategies in higher education institutes (HEIs) or universities for full-time, first-year adult students (>17 years). Included studies will be limited to the English language. The quality of included studies will be assessed using a validated Mixed Methods Appraisal Tool (MMAT). The findings will be presented as a narrative synthesis or meta-analysis as appropriate following sequential explanatory synthesis.
Discussion: The review will provide clear, non-biased evidence-based guidance to all third-level educators on the effectiveness of peer-mentoring programmes for first-year undergraduates. The review is necessary to help establish which type of peer mentoring is most effective. The evidence from qualitative and quantitative studies drawn from the international literature will be utilised to illustrate the best way to implement and evaluate peer mentoring as an effective intervention and will be useful in guiding future research and practice in this area. These findings may be applied internationally across all disciplines.
Resumo:
This paper describes a novel RISC microprocessor that can be utilised to rapidly develop a reprogrammable and high performance embedded security-processing system in SoC designs. Generic and innovative algorithm-specific instructions have been developed for a wide range of private-key and hash algorithms. To the authors' knowledge, this is the first generic cryptographic microprocessor to be reported in the literature.
Resumo:
This is the protocol for a review and there is no abstract. The objectives are as follows:
To evaluate the effectiveness of child-focused psychosocial interventions for anger and aggression in children under 12 years of age.
Resumo:
Dissertação de mestrado, Aquacultura e Pescas, Faculdade de Ciências e Tecnologia, Universidade do Algarve, 2015
Resumo:
Introduction: Coronary heart disease (CHD) is one of the leading causes of death in both men and women worldwide. Despite the common misconception that CHD is a ‘man's disease’, it is now well accepted that women endure worse clinical outcomes than men following CHD-related events. A number of studies have explored whether or not gender differences exist in patients presenting with CHD, and specifically whether women delay seeking help for cardiac conditions. UK and overseas studies on help-seeking for emergency cardiac events are contradictory, yet suggest that women often delay help-seeking. In addition, no studies have looked at presumed cardiac symptoms outside an emergency situation. Given the lack of understanding in this area, an explorative qualitative study on the gender differences in help-seeking for a non-emergency cardiac events is needed. Methods and analysis: A purposive sample of 20–30 participants of different ethnic backgrounds and ages attending a rapid access chest pain clinic will be recruited to achieve saturation. Semistructured interviews focusing on help-seeking decision-making for apparent cardiac symptoms will be undertaken. Interview data will be analysed thematically using qualitative software (NVivo) to understand any similarities and differences between the way men and women construct help-seeking. Findings will also be used to inform the preliminary development of a cardiac help-seeking intentions questionnaire. Ethics and dissemination: Ethical approvals were sought and granted. Namely, the University of Westminster (sponsor) and St Georges NHS Trust REC, and the Trust Research and Development Office granted approval to host the study on the Queen Mary's Roehampton site. The study is low risk, with interviews being conducted on hospital premises during working hours. Investigators will disseminate findings via presentations and publications. Participants will receive a written summary of the key findings.
Resumo:
Database query languages on relations (for example SQL) make it possible to join two relations. This operation is very common in desktop/server database systems but unfortunately query processing systems in networked embedded computer systems currently do not support this operation; specifically, the query processing systems TAG, TinyDB, Cougar do not support this. We show how a prioritized medium access control (MAC) protocol can be used to efficiently execute the database operation join for networked embedded computer systems where all computer nodes are in a single broadcast domain.
Resumo:
The IEEE 802.15.4 is the most widespread used protocol for Wireless Sensor Networks (WSNs) and it is being used as a baseline for several higher layer protocols such as ZigBee, 6LoWPAN or WirelessHART. Its MAC (Medium Access Control) supports both contention-free (CFP, based on the reservation of guaranteed time-slots GTS) and contention based (CAP, ruled by CSMA/CA) access, when operating in beacon-enabled mode. Thus, it enables the differentiation between real-time and best-effort traffic. However, some WSN applications and higher layer protocols may strongly benefit from the possibility of supporting more traffic classes. This happens, for instance, for dense WSNs used in time-sensitive industrial applications. In this context, we propose to differentiate traffic classes within the CAP, enabling lower transmission delays and higher success probability to timecritical messages, such as for event detection, GTS reservation and network management. Building upon a previously proposed methodology (TRADIF), in this paper we outline its implementation and experimental validation over a real-time operating system. Importantly, TRADIF is fully backward compatible with the IEEE 802.15.4 standard, enabling to create different traffic classes just by tuning some MAC parameters.
Resumo:
In this paper, we address the problem of sharing a wireless channel among a set of sporadic message streams where a message stream issues transmission requests with real-time deadlines. We propose a collision-free wireless medium access control (MAC) protocol which implements static-priority scheduling, supports a large number of priority levels and is fully distributed. It is an adaptation to a wireless channel of the dominance protocol used in the CAN bus. But, unlike that protocol, our protocol does not require a node having the ability to receive an incoming bit from the channel while transmitting to the channel. The evaluation of the protocol with real embedded computing platforms is presented to show that the proposed protocol is in fact collision-free and prioritized. We measure the response times of our implementation and show that the response-time analysis developed for the protocol offers an upper bound on the response times.
Resumo:
The IEEE 802.15.4/ZigBee protocols are gaining increasing interests in both research and industrial communities as candidate technologies for Wireless Sensor Network (WSN) applications. In this paper, we present an open-source implementation of the IEEE 802.15.4/Zigbee protocol stack under the TinyOS operating system for the MICAz motes. This work has been driven by the need for an open-source implementation of the IEEE 802.15.4/ZigBee protocols, filling a gap between some newly released complex C implementations and black-box implementations from different manufacturers. In addition, we share our experience on the challenging problem that we have faced during the implementation of the protocol stack on the MICAz motes. We strongly believe that this open-source implementation will potentiate research works on the IEEE 802.15.4/Zigbee protocols allowing their demonstration and validation through experimentation.
Resumo:
Consider a wireless sensor network (WSN) where a broadcast from a sensor node does not reach all sensor nodes in the network; such networks are often called multihop networks. Sensor nodes take sensor readings but individual sensor readings are not very important. It is important however to compute aggregated quantities of these sensor readings. The minimum and maximum of all sensor readings at an instant are often interesting because they indicate abnormal behavior, for example if the maximum temperature is very high then it may be that a fire has broken out. We propose an algorithm for computing the min or max of sensor reading in a multihop network. This algorithm has the particularly interesting property of having a time complexity that does not depend on the number of sensor nodes; only the network diameter and the range of the value domain of sensor readings matter.
Resumo:
Consider a network where all nodes share a single broadcast domain such as a wired broadcast network. Nodes take sensor readings but individual sensor readings are not the most important pieces of data in the system. Instead, we are interested in aggregated quantities of the sensor readings such as minimum and maximum values, the number of nodes and the median among a set of sensor readings on different nodes. In this paper we show that a prioritized medium access control (MAC) protocol may advantageously be exploited to efficiently compute aggregated quantities of sensor readings. In this context, we propose a distributed algorithm that has a very low time and message-complexity for computing certain aggregated quantities. Importantly, we show that if every sensor node knows its geographical location, then sensor data can be interpolated with our novel distributed algorithm, and the message-complexity of the algorithm is independent of the number of nodes. Such an interpolation of sensor data can be used to compute any desired function; for example the temperature gradient in a room (e.g., industrial plant) densely populated with sensor nodes, or the gas concentration gradient within a pipeline or traffic tunnel.
Resumo:
Wireless Sensor Networks (WSNs) have been attracting increasing interests for developing a new generation of embedded systems with great potential for many applications such as surveillance, environment monitoring, emergency medical response and home automation. However, the communication paradigms in WSNs differ from the ones attributed to traditional wireless networks, triggering the need for new communication protocols. In this context, the recently standardised IEEE 802.15.4 protocol presents some potentially interesting features for deployment in wireless sensor network applications, such as power-efficiency, timeliness guarantees and scalability. Nevertheless, when addressing WSN applications with (soft/hard) timing requirements some inherent paradoxes emerge, such as power-efficiency versus timeliness, triggering the need of engineering solutions for an efficient deployment of IEEE 802.15.4 in WSNs. In this technical report, we will explore the most relevant characteristics of the IEEE 802.15.4 protocol for wireless sensor networks and present the most important challenges regarding time-sensitive WSN applications. We also provide some timing performance and analysis of the IEEE 802.15.4 that unveil some directions for resolving the previously mentioned paradoxes.
Resumo:
With the current complexity of communication protocols, implementing its layers totally in the kernel of the operating system is too cumbersome, and it does not allow use of the capabilities only available in user space processes. However, building protocols as user space processes must not impair the responsiveness of the communication. Therefore, in this paper we present a layer of a communication protocol, which, due to its complexity, was implemented in a user space process. Lower layers of the protocol are, for responsiveness issues, implemented in the kernel. This protocol was developed to support large-scale power-line communication (PLC) with timing requirements.
Resumo:
Consider the problem of scheduling sporadic message transmission requests with deadlines. For wired channels, this has been achieved successfully using the CAN bus. For wireless channels, researchers have recently proposed a similar solution; a collision-free medium access control (MAC) protocol that implements static-priority scheduling. Unfortunately no implementation has been reported, yet. We implement and evaluate it to find that the implementation indeed is collision-free and prioritized. This allows us to develop schedulability analysis for the implementation. We measure the response times of messages in our implementation and find that our new response-time analysis indeed offers an upper bound on the response times. This enables a new class of wireless real-time systems with timeliness guarantees for sporadic messages and it opens-up a new research area: schedulability analysis for wireless networks.