963 resultados para Key recovery attack


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background Infant mortality in rural areas of Nigeria can be minimized if childhood febrile conditions are treated by trained health personnel, deployed to primary healthcare centres (PHCs) rather than the observed preference of mothers for patent medicine dealers (PMDs). However, health service utilization/patronage is driven by consumer satisfaction and perception of services/product value. The objective of this study was to determine ‘mothers’ perception of recovery’ and ‘mothers’ satisfaction’ after PMD treatment of childhood febrile conditions, as likely drivers of mothers’ health-seeking behaviour, which must be targeted to reverse the trend. Methods Ugwuogo-Nike, in Enugu, Nigeria, has many PMDs/PHCs, and was selected based on high prevalence of childhood febrile conditions. In total, 385 consenting mothers (aged 15–45 years) were consecutively recruited at PMD shops, after purchasing drugs for childhood febrile conditions, in a cross-sectional observational study using a pre-tested instrument; 33 of them (aged 21–47 years) participated in focus group discussions (FGDs). Qualitative data were thematically analysed while a quantitative study was analysed with Z score and Chi square statistics, at p < 0.05. Results Most participants in FGDs perceived that their child had delayed recovery, but were satisfied with PMDs’ treatment of childhood febrile conditions, for reasons that included politeness, caring attitude, drug availability, easy accessibility, flexibility in pricing, shorter waiting time, their God-fearing nature, and disposition as good listeners. Mothers’ satisfaction with PMDs’ treatment is significantly (p < 0.05) associated with mothers’ perception of recovery of their child (χ2 = 192.94, df = 4; p < 0.0001; Cramer’s V = 0.7079). However, predicting mothers’ satisfaction with PMDs’ treatment from a knowledge of mothers’ perception of recovery shows a high accord (lambda[A from B] = 0.8727), unlike when predicting mothers’ perception of recovery based on knowledge of mothers’ satisfaction with PMDs’ treatment (lambda[A from B] = 0.4727). Conclusions Mothers’ satisfaction could be the key ‘driver’ of mothers’ health-seeking behaviour and is less likely to be influenced by mothers’ perception of recovery of their child. Therefore, mothers’ negative perception of their child’s recovery may not induce proportionate decline in mothers’ health-seeking behaviour (patronage of PMDs), which might be influenced mainly by mothers’ satisfaction with the positive attributes of PMDs’ personality/practice and sets an important agenda for PHC reforms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recovery and the use of routine outcome measurement tools are key topics for mental health nurses. This article reports on research carried out to assess the usability of an outcome measure designed to assess recovery in clinical practice. Results indicate that the Individual Recovery Outcomes Counter (I.ROC) is both easy to use and well liked by services users.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In a industrial environment, to know the process one is working with is crucial to ensure its good functioning. In the present work, developed at Prio Biocombustíveis S.A. facilities, using process data, collected during the present work, and historical process data, the methanol recovery process was characterized, having started with the characterization of key process streams. Based on the information retrieved from the stream characterization, Aspen Plus® process simulation software was used to replicate the process and perform a sensitivity analysis with the objective of accessing the relative importance of certain key process variables (reflux/feed ratio, reflux temperature, reboiler outlet temperature, methanol, glycerol and water feed compositions). The work proceeded with the application of a set of statistical tools, starting with the Principal Components Analysis (PCA) from which the interactions between process variables and their contribution to the process variability was studied. Next, the Design of Experiments (DoE) was used to acquire experimental data and, with it, create a model for the water amount in the distillate. However, the necessary conditions to perform this method were not met and so it was abandoned. The Multiple Linear Regression method (MLR) was then used with the available data, creating several empiric models for the water at distillate, the one with the highest fit having a R2 equal to 92.93% and AARD equal to 19.44%. Despite the AARD still being relatively high, the model is still adequate to make fast estimates of the distillate’s quality. As for fouling, its presence has been noticed many times during this work. Not being possible to directly measure the fouling, the reboiler inlet steam pressure was used as an indicator of the fouling growth and its growth variation with the amount of Used Cooking Oil incorporated in the whole process. Comparing the steam cost associated to the reboiler’s operation when fouling is low (1.5 bar of steam pressure) and when fouling is high (reboiler’s steam pressure of 3 bar), an increase of about 58% occurs when the fouling increases.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work, we examine unbalanced computation between an initiator and a responder that leads to resource exhaustion attacks in key exchange protocols. We construct models for two cryp-tographic protocols; one is the well-known Internet protocol named Secure Socket Layer (SSL) protocol, and the other one is the Host Identity Protocol (HIP) which has built-in DoS-resistant mechanisms. To examine such protocols, we develop a formal framework based on Timed Coloured Petri Nets (Timed CPNs) and use a simulation approach provided in CPN Tools to achieve a formal analysis. By adopting the key idea of Meadows' cost-based framework and re¯ning the de¯nition of operational costs during the protocol execution, our simulation provides an accurate cost estimate of protocol execution compar- ing among principals, as well as the percentage of successful connections from legitimate users, under four di®erent strategies of DoS attack.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador: