947 resultados para Protocol design


Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this work we evaluate the performance of routing protocols for mobile ad hoc networks using different physical layer models. The results obtained show that the performance results obtained using idealized models such as the free space propagation model vary significantly when propagation effects such as path loss and shadowing are considered. This difference in performance indicates that optimization is required in the protocol development space that takes into account channel state information (CSI). Such an optimization requires a cross layer approach to be adopted and a framework for protocol performance evaluation to be established. We believe that this work would serve as a first step in this direction. We provide comparative performance results through network simulations.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Watermarking technique enables to hide an imperceptible watermark into a multimedia content for copyright protection. However, in most conventional watermarking schemes, the watermark is embedded solely by the seller, and both the seller and the buyer know the watermarked copy, which causes unsettled dispute at the phase of arbitration. To solve this problem, many watermarking protocols have been proposed using watermarking scheme in the encrypted domain. In this paper, we firstly discuss many security aspects in the encrypted domain, and then propose a new method of homomorphism conversion for probabilistic public key cryptosystem with homomorphic property. Based on our previous work, a new secure watermarking scheme for watermarking protocol is presented using a new embedding strategy in the encrypted domain. We employ an El Gamal variant cryptosystem with additive homomorphic property to reduce the computing overload of watermark embedding in the encrypted domain, and RA code to improve the robustness of the watermarked image against many moderate attacks after decryption. Security analysis and experiment demonstrate that the secure watermarking scheme is more suitable for implementing the existing watermarking protocols.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

BACKGROUND: What study participants think about the nature of a study has been hypothesised to affect subsequent behaviour and to potentially bias study findings. In this trial we examine the impact of awareness of study design and allocation on participant drinking behaviour. METHODS/DESIGN: A three-arm parallel group randomised controlled trial design will be used. All recruitment, screening, randomisation, and follow-up will be conducted on-line among university students. Participants who indicate a hazardous level of alcohol consumption will be randomly assigned to one of three groups. Group A will be informed their drinking will be assessed at baseline and again in one month (as in a cohort study design). Group B will be told the study is an intervention trial and they are in the control group. Group C will be told the study is an intervention trial and they are in the intervention group. All will receive exactly the same brief educational material to read. After one month, alcohol intake for the past 4 weeks will be assessed. DISCUSSION: The experimental manipulations address subtle and previously unexplored ways in which participant behaviour may be unwittingly influenced by standard practice in trials. Given the necessity of relying on self-reported outcome, it will not be possible to distinguish true behaviour change from reporting artefact. This does not matter in the present study, as any effects of awareness of study design or allocation involve bias that is not well understood. There has been little research on awareness effects, and our outcomes will provide an indication of the possible value of further studies of this type and inform hypothesis generation. TRIAL REGISTRATION: Australia and New Zealand Clinical Trials Register (ANZCTR): ACTRN12610000846022.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Background: Acute respiratory distress syndrome (ARDS) is associated with high in-hospital mortality. Alveolar recruitment followed by ventilation at optimal titrated PEEP may reduce ventilator-induced lung injury and improve oxygenation in patients with ARDS, but the effects on mortality and other clinical outcomes remain unknown. This article reports the rationale, study design, and analysis plan of the Alveolar Recruitment for ARDS Trial (ART). Methods/Design: ART is a pragmatic, multicenter, randomized (concealed), controlled trial, which aims to determine if maximum stepwise alveolar recruitment associated with PEEP titration is able to increase 28-day survival in patients with ARDS compared to conventional treatment (ARDSNet strategy). We will enroll adult patients with ARDS of less than 72 h duration. The intervention group will receive an alveolar recruitment maneuver, with stepwise increases of PEEP achieving 45 cmH(2)O and peak pressure of 60 cmH2O, followed by ventilation with optimal PEEP titrated according to the static compliance of the respiratory system. In the control group, mechanical ventilation will follow a conventional protocol (ARDSNet). In both groups, we will use controlled volume mode with low tidal volumes (4 to 6 mL/kg of predicted body weight) and targeting plateau pressure <= 30 cmH2O. The primary outcome is 28-day survival, and the secondary outcomes are: length of ICU stay; length of hospital stay; pneumothorax requiring chest tube during first 7 days; barotrauma during first 7 days; mechanical ventilation-free days from days 1 to 28; ICU, in-hospital, and 6-month survival. ART is an event-guided trial planned to last until 520 events (deaths within 28 days) are observed. These events allow detection of a hazard ratio of 0.75, with 90% power and two-tailed type I error of 5%. All analysis will follow the intention-to-treat principle. Discussion: If the ART strategy with maximum recruitment and PEEP titration improves 28-day survival, this will represent a notable advance to the care of ARDS patients. Conversely, if the ART strategy is similar or inferior to the current evidence-based strategy (ARDSNet), this should also change current practice as many institutions routinely employ recruitment maneuvers and set PEEP levels according to some titration method.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

BACKGROUND: Based on a subgroup analysis of 18-month BAsel Stent Kosten Effektivitäts Trial (BASKET) outcome data, we hypothesized that very late (> 12 months) stent thrombosis occurs predominantly after drug-eluting stent implantation in large native coronary vessel stenting. METHODS: To prove or refute this hypothesis, we set up an 11-center 4-country prospective trial of 2260 consecutive patients treated with > or = 3.0-mm stents only, randomized to receive Cypher (Johnson ; Johnson, Miami Lakes, FL), Vision (Abbott Vascular, Abbott Laboratories, IL), or Xience stents (Abbott Vascular). Only patients with left main or bypass graft disease, in-stent restenosis or stent thrombosis, in need of nonheart surgery, at increased bleeding risk, without compliance/consent are excluded. All patients are treated with dual antiplatelet therapy for 12 months. The primary end point will be cardiac death/nonfatal myocardial infarction after 24 months with further follow-up up to 5 years. RESULTS: By June 12, 229 patients (10% of the planned total) were included with a baseline risk similar to that of the same subgroup of BASKET (n = 588). CONCLUSIONS: This study will answer several important questions of contemporary stent use in patients with large native vessel stenting. The 2-year death/myocardial infarction-as well as target vessel revascularization-and bleeding rates in these patients with a first- versus second-generation drug-eluting stent should demonstrate the benefit or harm of these stents compared to cobalt-chromium bare-metal stents in this relevant, low-risk group of everyday patients. In addition, a comparison with similar BASKET patients will allow to estimate the impact of 12- versus 6-month dual antiplatelet therapy on these outcomes.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The purpose of this thesis was to develop an efficient routing protocol which would provide mobility support to the mobile devices roaming within a network. The routing protocol need to be compatible with the existing internet architecture. The routing protocol proposed here is based on the Mobile IP routing protocol and could solve some of the problems existing in current Mobile IP implementation e.g. ingress filtering problem. By implementing an efficient timeout mechanism and introducing Paging mechanism to the wireless network, the protocol minimizes the number of control messages sent over the network. The implementation of the system is primarily done on three components: 1) Mobile devices that need to gain access to the network, 2) Router which would be providing roaming support to the mobile devices and 3) Database server providing basic authentication services on the system. As a result, an efficient IP routing protocol is developed which would provide seamless mobility to the mobile devices on the network.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Acknowledgements Thank you to all the participants who agreed to take part in the trial. This study was supported NHS Research Scotland (NRS), through Chief Scientist Office (CSO) and the Scottish Mental Health Research Network, and the Clinical Research Network-Mental Health. We are grateful to the Psychosis Research Unit (PRU) Service User Reference Group (SURG) for their consultation regarding the design of the study and contribution to the developments of study related materials. We are grateful to our Independent Trial Steering Committee and Independent Data Monitoring Committee for provided oversight of the trial. Funding This project was funded by the National Institute for Health Research Health Technology Assessment (NIHR HTA) programme (project number10/101/02) and will be published in full in Health Technology Assessment. Visit the HTA programme website for further project information. The views and opinions expressed therein are those of the authors and do not necessarily reflect those of the HTA programme, NIHR, NHS or the Department of Health.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Software engineering best practices allow significantly improving the software development. However, the implementation of best practices requires skilled professionals, financial investment and technical support to facilitate implementation and achieve the respective improvement. In this paper we proposes a protocol to design techniques to implement best practices of software engineering. The protocol includes the identification and selection of process to improve, the study of standards and models, identification of best practices associated with the process and the possible implementation techniques. In addition, technical design activities are defined in order to create or adapt the techniques of implementing best practices for software development.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Hemophilic arthropathy limits daily life activities of patients with hemophilia, presenting with clinical manifestations such as chronic pain, limited mobility, or muscular atrophy. Although physical therapy is considered essential for these patients, few clinical studies have demonstrated the efficacy and safety of the various physiotherapy techniques. Physical therapy may be useful for treating hemophilic arthropathy by applying safe and effective techniques. However, it is necessary to create protocols for possible treatments to avoid the risk of bleeding in these patients. This article describes the musculoskeletal pathology of hemophilic arthropathy and characteristics of fascial therapy. This systematic protocol for treatment by fascial therapy of knee and ankle arthropathy in patients with hemophilia provides an analysis of the techniques that, depending on their purpose and methodology, can be used in these patients. Similarly, the protocol's applicability is analyzed and the steps to be followed in future research studies are described. Fascial therapy is a promising physiotherapy technique for treating fascial tissue and joint contractures in patients with hemophilic arthropathy. More research is needed to assess the efficacy and safety of this intervention in patients with hemophilia, particularly with randomized multicenter clinical trials

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background Colorectal cancer survivors may suffer from a range of ongoing psychosocial and physical problems that negatively impact on quality of life. This paper presents the study protocol for a novel telephone-delivered intervention to improve lifestyle factors and health outcomes for colorectal cancer survivors. Methods/Design Approximately 350 recently diagnosed colorectal cancer survivors will be recruited through the Queensland Cancer Registry and randomised to the intervention or control condition. The intervention focuses on symptom management, lifestyle and psychosocial support to assist participants to make improvements in lifestyle factors (physical activity, healthy diet, weight management, and smoking cessation) and health outcomes. Participants will receive up to 11 telephone-delivered sessions over a 6 month period from a qualified health professional or 'health coach'. Data collection will occur at baseline (Time 1), post-intervention or six months follow-up (Time 2), and at 12 months follow-up for longer term effects (Time 3). Primary outcome measures will include physical activity, cancer-related fatigue and quality of life. A cost-effective analysis of the costs and outcomes for survivors in the intervention and control conditions will be conducted from the perspective of health care costs to the government. Discussion The study will provide valuable information about an innovative intervention to improve lifestyle factors and health outcomes for colorectal cancer survivors.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Emerging data streaming applications in Wireless Sensor Networks require reliable and energy-efficient Transport Protocols. Our recent Wireless Sensor Network deployment in the Burdekin delta, Australia, for water monitoring [T. Le Dinh, W. Hu, P. Sikka, P. Corke, L. Overs, S. Brosnan, Design and deployment of a remote robust sensor network: experiences from an outdoor water quality monitoring network, in: Second IEEE Workshop on Practical Issues in Building Sensor Network Applications (SenseApp 2007), Dublin, Ireland, 2007] is one such example. This application involves streaming sensed data such as pressure, water flow rate, and salinity periodically from many scattered sensors to the sink node which in turn relays them via an IP network to a remote site for archiving, processing, and presentation. While latency is not a primary concern in this class of application (the sampling rate is usually in terms of minutes or hours), energy-efficiency is. Continuous long-term operation and reliable delivery of the sensed data to the sink are also desirable. This paper proposes ERTP, an Energy-efficient and Reliable Transport Protocol for Wireless Sensor Networks. ERTP is designed for data streaming applications, in which sensor readings are transmitted from one or more sensor sources to a base station (or sink). ERTP uses a statistical reliability metric which ensures the number of data packets delivered to the sink exceeds the defined threshold. Our extensive discrete event simulations and experimental evaluations show that ERTP is significantly more energyefficient than current approaches and can reduce energy consumption by more than 45% when compared to current approaches. Consequently, sensor nodes are more energy-efficient and the lifespan of the unattended WSN is increased.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Internationally, collection of reliable data on new and evolving health-care roles is crucial. We describe a protocol for design and administration of a national census of an emergent health-care role, namely nurse practitioners in Australia using databases held by regulatory authorities. A questionnaire was developed to obtain data on the role and scope of practice of Australian nurse practitioners. Our tool comprised five sections and included a total of 56 questions, using 28 existing items from the National Nursing and Midwifery Labour Force Census and nine items recommended in the Nurse Practitioner Workforce Planning Minimum Data Set. Australian Nurse Registering Authorities (n = 6) distributed the survey on our behalf. This paper outlines our instrument and methods. The survey was administered to 238 authorized Australian nurse practitioners (85% response rate). Rigorous collection of standardized items will ensure health policy is informed by reliable and valid data. We will re-administer the survey 2 years following the first survey to measure change over time.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.