949 resultados para Multi-protocol label switching
Resumo:
New substation technology, such as non-conventional instrument transformers,and a need to reduce design and construction costs, are driving the adoption of Ethernet based digital process bus networks for high voltage substations. Protection and control applications can share a process bus, making more efficient use of the network infrastructure. This paper classifies and defines performance requirements for the protocols used in a process bus on the basis of application. These include GOOSE, SNMP and IEC 61850-9-2 sampled values. A method, based on the Multiple Spanning Tree Protocol (MSTP) and virtual local area networks, is presented that separates management and monitoring traffic from the rest of the process bus. A quantitative investigation of the interaction between various protocols used in a process bus is described. These tests also validate the effectiveness of the MSTP based traffic segregation method. While this paper focusses on a substation automation network, the results are applicable to other real-time industrial networks that implement multiple protocols. High volume sampled value data and time-critical circuit breaker tripping commands do not interact on a full duplex switched Ethernet network, even under very high network load conditions. This enables an efficient digital network to replace a large number of conventional analog connections between control rooms and high voltage switchyards.
Resumo:
This is the protocol for a review and there is no abstract. The objectives are as follows: Primary research objective To determine the effects of community wide, multi-strategic interventions upon community levels of physical activity. Secondary research objectives 1. To explore whether any effects of the intervention are different within and between populations, and whether these differences form an equity gradient. 2. To describe other health (e.g. cardiovascular disease morbidity) and behavioural effects (e.g. diet) where appropriate outcomes are available. 3. To explore the influence of context in the design, delivery, and outcomes of the interventions. 4. To explore the relationship between the number of components, duration, and effects of the interventions. 5. To highlight implications for further research and research methods to improve knowledge of the interventions in relation to the primary research objective.
Resumo:
BACKGROUND: Given the expanding scope of extracorporeal membrane oxygenation (ECMO) and its variable impact on drug pharmacokinetics as observed in neonatal studies, it is imperative that the effects of the device on the drugs commonly prescribed in the intensive care unit (ICU) are further investigated. Currently, there are no data to confirm the appropriateness of standard drug dosing in adult patients on ECMO. Ineffective drug regimens in these critically ill patients can seriously worsen patient outcomes. This study was designed to describe the pharmacokinetics of the commonly used antibiotic, analgesic and sedative drugs in adult patients receiving ECMO. METHODS: This is a multi-centre, open-label, descriptive pharmacokinetic (PK) study. Eligible patients will be adults treated with ECMO for severe cardiac and/or respiratory failure at five Intensive Care Units in Australia and New Zealand. Patients will receive the study drugs as part of their routine management. Blood samples will be taken from indwelling catheters to investigate plasma concentrations of several antibiotics (ceftriaxone, meropenem, vancomycin, ciprofloxacin, gentamicin, piperacillin-tazobactum, ticarcillin-clavulunate, linezolid, fluconazole, voriconazole, caspofungin, oseltamivir), sedatives and analgesics (midazolam, morphine, fentanyl, propofol, dexmedetomidine, thiopentone). The PK of each drug will be characterised to determine the variability of PK in these patients and to develop dosing guidelines for prescription during ECMO. DISCUSSION: The evidence-based dosing algorithms generated from this analysis can be evaluated in later clinical studies. This knowledge is vitally important for optimising pharmacotherapy in these most severely ill patients to maximise the opportunity for therapeutic success and minimise the risk of therapeutic failure
Resumo:
Background Recurrent protracted bacterial bronchitis (PBB), chronic suppurative lung disease (CSLD) and bronchiectasis are characterised by a chronic wet cough and are important causes of childhood respiratory morbidity globally. Haemophilus influenzae and Streptococcus pneumoniae are the most commonly associated pathogens. As respiratory exacerbations impair quality of life and may be associated with disease progression, we will determine if the novel 10-valent pneumococcal-Haemophilus influenzae protein D conjugate vaccine (PHiD-CV) reduces exacerbations in these children. Methods A multi-centre, parallel group, double-blind, randomised controlled trial in tertiary paediatric centres from three Australian cities is planned. Two hundred six children aged 18 months to 14 years with recurrent PBB, CSLD or bronchiectasis will be randomised to receive either two doses of PHiD-CV or control meningococcal (ACYW(135)) conjugate vaccine 2 months apart and followed for 12 months after the second vaccine dose. Randomisation will be stratified by site, age (<6 years and >= 6 years) and aetiology (recurrent PBB or CSLD/bronchiectasis). Clinical histories, respiratory status (including spirometry in children aged >= 6 years), nasopharyngeal and saliva swabs, and serum will be collected at baseline and at 2, 3, 8 and 14 months post-enrolment. Local and systemic reactions will be recorded on daily diaries for 7 and 30 days, respectively, following each vaccine dose and serious adverse events monitored throughout the trial. Fortnightly, parental contact will help record respiratory exacerbations. The primary outcome is the incidence of respiratory exacerbations in the 12 months following the second vaccine dose. Secondary outcomes include: nasopharyngeal carriage of H. influenzae and S. pneumoniae vaccine and vaccine-related serotypes; systemic and mucosal immune responses to H. influenzae proteins and S. pneumoniae vaccine and vaccine-related serotypes; impact upon lung function in children aged >= 6 years; and vaccine safety. Discussion As H. influenzae is the most common bacterial pathogen associated with these chronic respiratory diseases in children, a novel pneumococcal conjugate vaccine that also impacts upon H. influenzae and helps prevent respiratory exacerbations would assist clinical management with potential short- and long-term health benefits. Our study will be the first to assess vaccine efficacy targeting H. influenzae in children with recurrent PBB, CSLD and bronchiectasis.
Resumo:
BACKGROUND: The intense pain and anxiety triggered by burns and their associated wound care procedures are well established in the literature. Non-pharmacological intervention is a critical component of total pain management protocols and is used as an adjunct to pharmacological analgesia. An example is virtual reality, which has been used effectively to dampen pain intensity and unpleasantness. Possible links or causal relationships between pain/anxiety/stress and burn wound healing have previously not been investigated. The purpose of this study is to investigate these relationships, specifically by determining if a newly developed multi-modal procedural preparation and distraction device (Ditto) used during acute burn wound care procedures will reduce the pain and anxiety of a child and increase the rate of re-epithelialization. METHODS/DESIGN: Children (4 to 12 years) with acute burn injuries presenting for their first dressing change will be randomly assigned to either the (1) Control group (standard distraction) or (2) Ditto intervention group (receiving Ditto, procedural preparation and Ditto distraction). It is intended that a minimum of 29 participants will be recruited for each treatment group. Repeated measures of pain intensity, anxiety, stress and healing will be taken at every dressing change until complete wound re-epithelialization. Further data collection will aid in determining patient satisfaction and cost effectiveness of the Ditto intervention, as well as its effect on speed of wound re-epithelialization. DISCUSSION: Results of this study will provide data on whether the disease process can be altered by reducing stress, pain and anxiety in the context of acute burn wounds. TRIAL REGISTRATION: ACTRN12611000913976.
Resumo:
Background The effects of exposure to ultraviolet radiation are a significant concern in Australia which has one of the highest incidences of skin cancer in the world. Despite most skin cancers being preventable by encouraging consistent adoption of sun-protective behaviours, incidence rates are not decreasing. There is a dearth of research examining the factors involved in engaging in sun-protective behaviours. Further, online multi-behavioural theory-based interventions have yet to be explored fully as a medium for improving sun-protective behaviour in adults. This paper presents the study protocol of a randomised controlled trial of an online intervention based on the Theory of Planned Behaviour (TPB) that aims to improve sun safety among Australian adults. Methods/Design Approximately 420 adults aged 18 and over and predominantly from Queensland, Australia, will be recruited and randomised to the intervention (n = 200), information only (n = 200) or the control group (n = 20). The intervention focuses on encouraging supportive attitudes and beliefs toward sun-protective behaviour, fostering perceptions of normative support for sun protection, and increasing perceptions of control/self-efficacy over sun protection. The intervention will be delivered online over a single session. Data will be collected immediately prior to the intervention (Time 1), immediately following the intervention (Time 1b), and one week (Time 2) and one month (Time 3) post-intervention. Primary outcomes are intentions to sun protect and sun-protective behaviour. Secondary outcomes are the participants’ attitudes toward sun protection, perceptions of normative support for sun protection (i.e. subjective norms, group norms, personal norms and image norms) and perceptions of control/self-efficacy toward sun protection. Discussion The study will contribute to an understanding of the effectiveness of a TPB-based online intervention to improve Australian adults’ sun-protective behaviour. Trials registry Australian and New Zealand Trials Registry number ACTRN12613000470796
Resumo:
Classical results in unconditionally secure multi-party computation (MPC) protocols with a passive adversary indicate that every n-variate function can be computed by n participants, such that no set of size t < n/2 participants learns any additional information other than what they could derive from their private inputs and the output of the protocol. We study unconditionally secure MPC protocols in the presence of a passive adversary in the trusted setup (‘semi-ideal’) model, in which the participants are supplied with some auxiliary information (which is random and independent from the participant inputs) ahead of the protocol execution (such information can be purchased as a “commodity” well before a run of the protocol). We present a new MPC protocol in the trusted setup model, which allows the adversary to corrupt an arbitrary number t < n of participants. Our protocol makes use of a novel subprotocol for converting an additive secret sharing over a field to a multiplicative secret sharing, and can be used to securely evaluate any n-variate polynomial G over a field F, with inputs restricted to non-zero elements of F. The communication complexity of our protocol is O(ℓ · n 2) field elements, where ℓ is the number of non-linear monomials in G. Previous protocols in the trusted setup model require communication proportional to the number of multiplications in an arithmetic circuit for G; thus, our protocol may offer savings over previous protocols for functions with a small number of monomials but a large number of multiplications.
Resumo:
Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P 1, ..., P n , each with their own private input x i , to compute a function Y = F(x 1, ..., x n ), such that at the end of the protocol, all participants learn the correct value of Y, while secrecy of the private inputs is maintained. Classical results in the unconditionally secure MPC indicate that in the presence of an active adversary, every function can be computed if and only if the number of corrupted participants, t a , is smaller than n/3. Relaxing the requirement of perfect secrecy and utilizing broadcast channels, one can improve this bound to t a < n/2. All existing MPC protocols assume that uncorrupted participants are truly honest, i.e., they are not even curious in learning other participant secret inputs. Based on this assumption, some MPC protocols are designed in such a way that after elimination of all misbehaving participants, the remaining ones learn all information in the system. This is not consistent with maintaining privacy of the participant inputs. Furthermore, an improvement of the classical results given by Fitzi, Hirt, and Maurer indicates that in addition to t a actively corrupted participants, the adversary may simultaneously corrupt some participants passively. This is in contrast to the assumption that participants who are not corrupted by an active adversary are truly honest. This paper examines the privacy of MPC protocols, and introduces the notion of an omnipresent adversary, which cannot be eliminated from the protocol. The omnipresent adversary can be either a passive, an active or a mixed one. We assume that up to a minority of participants who are not corrupted by an active adversary can be corrupted passively, with the restriction that at any time, the number of corrupted participants does not exceed a predetermined threshold. We will also show that the existence of a t-resilient protocol for a group of n participants, implies the existence of a t’-private protocol for a group of n′ participants. That is, the elimination of misbehaving participants from a t-resilient protocol leads to the decomposition of the protocol. Our adversary model stipulates that a MPC protocol never operates with a set of truly honest participants (which is a more realistic scenario). Therefore, privacy of all participants who properly follow the protocol will be maintained. We present a novel disqualification protocol to avoid a loss of privacy of participants who properly follow the protocol.
Resumo:
Multi-party key agreement protocols indirectly assume that each principal equally contributes to the final form of the key. In this paper we consider three malleability attacks on multi-party key agreement protocols. The first attack, called strong key control allows a dishonest principal (or a group of principals) to fix the key to a pre-set value. The second attack is weak key control in which the key is still random, but the set from which the key is drawn is much smaller than expected. The third attack is named selective key control in which a dishonest principal (or a group of dishonest principals) is able to remove a contribution of honest principals to the group key. The paper discusses the above three attacks on several key agreement protocols, including DH (Diffie-Hellman), BD (Burmester-Desmedt) and JV (Just-Vaudenay). We show that dishonest principals in all three protocols can weakly control the key, and the only protocol which does not allow for strong key control is the DH protocol. The BD and JV protocols permit to modify the group key by any pair of neighboring principals. This modification remains undetected by honest principals.
Resumo:
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party P i is x i ∈ G for i = 1,...,n. For flexibility, we are interested in protocols for f G which require only black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our results are as follows. First, on the negative side, we show that if (G,·) is non-abelian and n ≥ 4, then no ⌈n/2⌉-private protocol for computing f G exists. Second, on the positive side, we initiate an approach for construction of black-box protocols for f G based on k-of-k threshold secret sharing schemes, which are efficiently implementable over any black-box group G. We reduce the problem of constructing such protocols to a combinatorial colouring problem in planar graphs. We then give two constructions for such graph colourings. Our first colouring construction gives a protocol with optimal collusion resistance t < n/2, but has exponential communication complexity O(n*2t+1^2/t) group elements (this construction easily extends to general adversary structures). Our second probabilistic colouring construction gives a protocol with (close to optimal) collusion resistance t < n/μ for a graph-related constant μ ≤ 2.948, and has efficient communication complexity O(n*t^2) group elements. Furthermore, we believe that our results can be improved by further study of the associated combinatorial problems.
Resumo:
A high-frequency-link (HFL) micro inverter with a front-end diode clamped multi-level inverter and a grid-connected half-wave cycloconverter is proposed. The diode clamped multi-level inverter with an auxiliary capacitor is used to generate high-frequency (HF) three level quasi square-wave output and it is fed into a series resonant tank to obtain high frequency continuous sinusoidal current. The obtained continuous sinusoidal current is modulated by using the grid-connected half-wave cycloconverter to obtain grid synchronized output current in phase with the grid voltage. The phase shift power modulation is used with auxiliary capacitor at the front-end multi-level inverter to have soft-switching. The phase shift between the HFL resonant current and half-wave cycloconverter input voltage is modulated to obtain grid synchronized output current.
Resumo:
Modulation and control of a cascade multilevel inverter, which has a high potential in future wind generation applications, are presented. The inverter is a combination of a high power, three level “bulk inverter” and a low power “conditioning inverter”. To minimize switching losses, the bulk inverter operates at a low frequency producing square wave outputs while high frequency conditioning inverter is used to suppress harmonic content produced by the bulk inverter output. This paper proposes an improved Space Vector Modulation (SVM) algorithm and a neutral point potential balancing technique for the inverter. Furthermore, a maximum power tracking controller for the Permanent Magnet Synchronous Generator (PMSG) is described in detail. The proposed SVM technique eliminates most of the computational burdens on the digital controller and renders a greater controllability under varying DC-link voltage conditions. The DC-link capacitor voltage balancing of both bulk and conditioning inverters is carried out using Redundant State Selection (RSS) method and is explained in detail. Experimental results are presented to verify the proposed modulation and control techniques.
Resumo:
Double-pulse tests are commonly used as a method for assessing the switching performance of power semiconductor switches in a clamped inductive switching application. Data generated from these tests are typically in the form of sampled waveform data captured using an oscilloscope. In cases where it is of interest to explore a multi-dimensional parameter space and corresponding result space it is necessary to reduce the data into key performance metrics via feature extraction. This paper presents techniques for the extraction of switching performance metrics from sampled double-pulse waveform data. The reported techniques are applied to experimental data from characterisation of a cascode gate drive circuit applied to power MOSFETs.
Resumo:
Background Dementia is a chronic illness without cure or effective treatment, which results in declining mental and physical function and assistance from others to manage activities of daily living. Many people with dementia live in long term care facilities, yet research into their quality of life (QoL) was rare until the last decade. Previous studies failed to incorporate important variables related to the facility and care provision or to look closely at the daily lives of residents. This paper presents a protocol for a comprehensive, multi-perspective assessment of QoL of residents with dementia living in long term care in Australia. A secondary aim is investigating the effectiveness of self-report instruments for measuring QoL. Methods The study utilizes a descriptive, mixed methods design to examine how facility, care staff, and resident factors impact QoL. Over 500 residents with dementia from a stratified, random sample of 53 facilities are being recruited. A sub-sample of 12 residents is also taking part in qualitative interviews and observations. Conclusions This national study will provide a broad understanding of factors underlying QoL for residents with dementia in long term care. The present study uses a similar methodology to the US-based Collaborative Studies of Long Term Care (CS-LTC) Dementia Care Study, applying it to the Australian setting.
Resumo:
Background Family caregivers provide invaluable support to stroke survivors during their recovery, rehabilitation, and community re-integration. Unfortunately, it is not standard clinical practice to prepare and support caregivers in this role and, as a result, many experience stress and poor health that can compromise stroke survivor recovery and threaten the sustainability of keeping the stroke survivor at home. We developed the Timing it Right Stroke Family Support Program (TIRSFSP) to guide the timing of delivering specific types of education and support to meet caregivers' evolving needs. The objective of this multi-site randomized controlled trial is to determine if delivering the TIRSFSP across the stroke care continuum improves caregivers' sense of being supported and emotional well-being. Methods/design Our multi-site single-blinded randomized controlled trial will recruit 300 family caregivers of stroke survivors from urban and rural acute care hospitals. After completing a baseline assessment, participants will be randomly allocated to one of three groups: 1) TIRSFSP guided by a stroke support person (health care professional with stroke care experience), delivered in-person during acute care and by telephone for approximately the first six to 12 months post-stroke; 2) caregiver self-directed TIRSFSP with an initial introduction to the program by a stroke support person, or; 3) standard care receiving the educational resource "Let's Talk about Stroke" prepared by the Heart and Stroke Foundation. Participants will complete three follow-up quantitative assessments 3, 6, and 12-months post-stroke. These include assessments of depression, social support, psychological well-being, stroke knowledge, mastery (sense of control over life), caregiving assistance provided, caregiving impact on everyday life, and indicators of stroke severity and disability. Qualitative methods will also be used to obtain information about caregivers' experiences with the education and support received and the impact on caregivers' perception of being supported and emotional well-being. Discussion This research will determine if the TIRSFSP benefits family caregivers by improving their perception of being supported and emotional well-being. If proven effective, it could be recommended as a model of stroke family education and support that meets the Canadian Stroke Best Practice Guideline recommendation for providing timely education and support to families through transitions.