991 resultados para Security protocol


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The research examines the relationships between three common trust considerations (vendor, Internet and third parties) and attitudes towards online purchasing. The study incorporates privacy and security concerns as a moderating variable and finds that these relationships vary depending on the level of concerns a consumer has when purchasing online. The study suggests that "fears" surrounding the Internet as a place to do business still hinder the use of it for e-commerce purposes, but that the presence of a reputable agent might in some manner mitigate this risk. In the context of business to consumer relationships trust in the vendor is important for the consumer to accept any risk associated with a transaction. Theoretical implications for online customer behavior theory are also discussed. © 2009 Elsevier Inc.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The identification and classification of network traffic and protocols is a vital step in many quality of service and security systems. Traffic classification strategies must evolve, alongside the protocols utilising the Internet, to overcome the use of ephemeral or masquerading port numbers and transport layer encryption. This research expands the concept of using machine learning on the initial statistics of flow of packets to determine its underlying protocol. Recognising the need for efficient training/retraining of a classifier and the requirement for fast classification, the authors investigate a new application of k-means clustering referred to as 'two-way' classification. The 'two-way' classification uniquely analyses a bidirectional flow as two unidirectional flows and is shown, through experiments on real network traffic, to improve classification accuracy by as much as 18% when measured against similar proposals. It achieves this accuracy while generating fewer clusters, that is, fewer comparisons are needed to classify a flow. A 'two-way' classification offers a new way to improve accuracy and efficiency of machine learning statistical classifiers while still maintaining the fast training times associated with the k-means.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Photodynamic therapy of deep or nodular skin tumours is currently limited by the poor tissue penetration of the porphyrin precursor 5-aminolevulinic acid (ALA) and preformed photosensitisers. In this study, we investigated the potential of jet injection to deliver both ALA and a preformed photosensitiser (meso-tetra (N-methyl-4-pyridyl) porphine tetra tosylate, TMP) into a defined volume of skin. Initial studies using a model hydrogel showed that as standoff distance is increased, injection depth decreases. As the ejected volume is increased, injection depth increases. It was also shown, for the first time, that, as injection solution viscosity was increased, for a given injection setting and standoff distance, both total depth of jet penetration, L-t, and depth at which the maximum width of the penetration pattern occurred, L-m, decreased progressively. For a standoff distance of zero, the maximum width of the penetration pattern, L-w, increased progressively with increasing viscosity at each of the injection settings. Conversely, when the standoff distance was 2.5 mm, L-w decreased progressively with increasing viscosity. Studies with neonate porcine skin revealed that an injection protocol comprising an 8.98 mPas solution, an arbitrary injection setting of 8 and a standoff distance of zero was capable of delivering photosensitisers to a volume of tissue (L-t of 2.91 mm, L-m of 2.14 mm, L-w of 5. 10 mm) comparable to that occupied by a typical nodular basal cell carcinoma. Both ALA and TMP were successfully delivered using jet injection, with peak tissue concentrations (67.3 mg cm(-3) and 5.6 mg cm(-3), respectively) achieved at a depth of around 1.0 mm and substantial reductions in drug concentration seen at depths below 3.0 mm. Consequently, jet injection may be suitable for selective targeting of ALA or preformed photosensitisers to skin tumours. (c) 2007 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background-Asthma, post-nasal drip syndrome (PNDS), and gastrooesophageal reflux (GOR) account for many cases of chronic non-productive cough (CNPC). Each may simultaneously contribute to cough even when clinically silent, and failure to recognise their contribution may lead to unsuccessful treatment.

Methods—Patients (all lifetime non-smokers with normal chest radiographs and spirometric measurements) referred with CNPC persisting for more than three weeks as their sole respiratory symptom underwent histamine challenge, home peak flow measurements, ear, nose and throat (ENT) examination, sinus CT scanning, and 24 hour oesophageal pH monitoring. Treatment was prescribed on the basis of diagnoses informed by investigation results.

RESULTS—Forty three patients (29 women) of mean age 47.5 years (range 18-77) and mean cough duration 67 months (range 2-240) were evaluated. On the basis of a successful response to treatment, a cause for the cough was identified in 35 patients (82%) as follows: cough variant asthma (CVA) (10 cases), PNDS (9 cases), GOR (8cases), and dual aetiologies (8 cases). Histamine challenge correctly predicted CVA in 15 of 17 (88%) positive tests. ENT examination and sinus CT scans each had low positive predictive values for PNDS (10 of 16 (63%) and 12 of 18 (67%) positive cases, respectively), suggesting that upper airways disease frequently co-exists but does not always contribute to cough. When negative, histamine challenge and 24 hour oesophageal pH monitoring effectively ruled out CVA and GOR, respectively, as a cause for cough.

CONCLUSION—This comprehensive approach aids the accurate direction of treatment and, while CVA, PNDS and GOR remain the most important causes of CNPC to consider, a group with no identifiable aetiology remains.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Summary

Decolonisation may reduce the risk of meticillin-resistant Staphylococcus aureus (MRSA) infection in individual carriers and prevent transmission to other patients. The aims of this prospective cohort study were to determine the long-term efficacy of a standardised decolonisation regimen and to identify factors associated with failure. Patients colonised with MRSA underwent decolonisation, which was considered to be successful if there was no growth in three consecutive sets of site-specific screening swabs obtained weekly post treatment. If patients were successfully decolonised, follow-up cultures were performed 6 and 12 months later. Of 137 patients enrolled, 79 (58%) were successfully decolonised. Of these 79, 53 (67%) and 44 (56%) remained decolonised at 6 and 12 months respectively. Therefore only 44/137 (32%) patients who completed decolonisation were MRSA negative 12 months later. Outcome was not associated with a particular strain of MRSA. Successful decolonisation was less likely in patients colonised with a mupirocin-resistant isolate (adjusted odds ratio: 0.08; 95% confidence interval: 0.02–0.30), in patients with throat colonisation (0.22; 0.07–0.68) and in patients aged >80 years (0.30; 0.10–0.93) compared with those aged 60–80 years. These findings suggest that although initially successful in some cases, the protocol used did not result in long-term clearance of MRSA carriage for most patients.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Traditional Time Division Multiple Access (TDMA) protocol provides deterministic periodic collision free data transmissions. However, TDMA lacks flexibility and exhibits low efficiency in dynamic environments such as wireless LANs. On the other hand contention-based MAC protocols such as the IEEE 802.11 DCF are adaptive to network dynamics but are generally inefficient in heavily loaded or large networks. To take advantage of the both types of protocols, a D-CVDMA protocol is proposed. It is based on the k-round elimination contention (k-EC) scheme, which provides fast contention resolution for Wireless LANs. D-CVDMA uses a contention mechanism to achieve TDMA-like collision-free data transmissions, which does not need to reserve time slots for forthcoming transmissions. These features make the D-CVDMA robust and adaptive to network dynamics such as node leaving and joining, changes in packet size and arrival rate, which in turn make it suitable for the delivery of hybrid traffic including multimedia and data content. Analyses and simulations demonstrate that D-CVDMA outperforms the IEEE 802.11 DCF and k-EC in terms of network throughput, delay, jitter, and fairness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Synchronous islanded operation involves continuously holding an islanded power network in virtual synchronism with the main power system to aid paralleling and avoid potentially damaging out-of-synchronism reclosure. This requires phase control of the generators in the island and the transmission of a reference signal from a secure location on the main power system. Global positioning system (GPS) time-synchronized phasor measurements transmitted via an Internet protocol (IP) are used for the reference signal. However, while offering low cost and a readily available solution for distribution networks, IP communications have variable latency and are susceptible to packet loss, which can make time-critical control applications difficult. This paper investigates the ability of the phase-control system to tolerate communications latency. Phasor measurement conditioning algorithms that can tolerate latency are used in the phase-control loop of a 50-kVA diesel generator. © 2010 IEEE.