Letteratura scientifica selezionata sul tema "Safety protocol"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Safety protocol".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Safety protocol":

1

M Baiju, Nithya, Aboobacker Mohamed Rafi, Nittin Henry, Ramesh Bhaskaran, Susheela Jacob Innah e Athira Sasidharan. "Is It Time to Switch from Conventional Coombs Crossmatching to the Type and Screen Protocol?" Malaysian Journal of Medical Sciences 30, n. 2 (18 aprile 2023): 124–30. http://dx.doi.org/10.21315/mjms2023.30.2.11.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Background: ABO grouping, Rh typing and crossmatching are routinely done as part of pre-transfusion testing. The Type and Screen (T&S) protocol has been used in developed countries to ensure the survival of transfused red cells. In this study, we compared the safety, costs and turnaround times (TATs) of the T&S protocol and the conventional pre-transfusion testing protocol for patients who had been scheduled for elective obstetrical or gynaecological procedures. Methods: This observational study was conducted in three phases at the Department of Transfusion Medicine, Jubilee Mission Medical College and Research Institute, Kerala, India and involved 1,800 patients from the Department of Obstetrics and Gynaecology, Jubilee Mission Medical College & Research Institute, Kerala, India over the course of 2 years. Phase I involved the traditional pre-transfusion testing and crossmatching of 150 patients. Phase II involved the use of the T&S protocol on 150 patients. Phase III involved the use of both the traditional and T&S protocols on 1,500 patients without considering the results of each protocol. The safety, costs and TATs of both protocols were compared. Results: In this study, the T&S protocol provided a safety 100% level when compared to the traditional protocol. The T&S protocol detected unexpected antibodies in 0.4% of cases, which would have gone unnoticed otherwise, demonstrating its usefulness. There was no significant difference in cost between the traditional crossmatching and T&S protocols. We discovered that using only the T&S protocol can save technologists 30% of their time. Conclusion: Implementing the T&S protocol as a pre-transfusion testing procedure can help improve hospital transfusion practices by supplying blood quickly and safely. Coombs cross-matching remains more of a tradition than a necessity.
2

PARKER, BARBARA, e YVONNE ULRICH. "A Protocol of Safety". Nursing Research 39, n. 4 (luglio 1990): 248???249. http://dx.doi.org/10.1097/00006199-199007000-00016.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Kalla, G. N. "A protocol for safety". Anaesthesia 42, n. 6 (giugno 1987): 667. http://dx.doi.org/10.1111/j.1365-2044.1987.tb03101.x.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Neal-Kluever, April, Queenster Nartey, Jason Aungst, Federica Basso, Karen Davis-Bruno, Ikram Elayan, Jie Liu, Arippa Ravindran e Yen-Ching Wu. "Utility of generational developmental and reproductive toxicity and juvenile animal study protocols for the infant safety assessment of food contact materials". Toxicology Research and Application 2 (1 gennaio 2018): 239784731880604. http://dx.doi.org/10.1177/2397847318806043.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The US Food and Drug Administration (FDA) Division of Food Contact Notifications (DFCN) performs infant lifestage-specific exposure and safety assessments during the premarket review of FCNs proposed for use with infant formula or human milk. DFCN previously identified two protocols that may be best suited to support infant safety: the multigenerational developmental and reproductive toxicology (Gen-DART) protocol and the juvenile animal study (JAS) protocol. The Gen-DART protocol tests chemical exposure from prior to mating through one or two generations in rodents, while JAS protocols test a chemical during a specific developmental window. At FDA, Gen-DART studies are currently recommended to support the safety of food additives (FAs), including food contact substances, across lifestages (from conception through adulthood). JAS protocols are recommended in the nonclinical safety assessment of drugs seeking pediatric indications. To improve our recommendations regarding the use of either Gen-DART or JAS protocols for the infant safety assessment of food contact materials, we created a database of FDA-reviewed Gen-DART or JAS. Our database contains information from 41 Gen-DART studies (38 FAs) and 51 JAS (29 drugs). Both protocols can detect toxicity relevant to infant safety assessment, such as developmental toxicity in neurological, endocrine, reproductive, immunological, or skeletal systems. Selection of either protocol will depend on the amount of information available for the chemical under study. The Gen-DART protocol may be preferred when limited data on the mode of action or target organ of the chemical are available. However, if these data are available, a JAS may provide the best assessment of potential juvenile toxicity.
5

Du, Jinze, Chengtai Gao e Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service". Future Internet 15, n. 1 (31 dicembre 2022): 24. http://dx.doi.org/10.3390/fi15010024.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The Data Distribution Service (DDS) for real-time systems is an industrial Internet communication protocol. Due to its distributed high reliability and the ability to transmit device data communication in real-time, it has been widely used in industry, medical care, transportation, and national defense. With the wide application of various protocols, protocol security has become a top priority. There are many studies on protocol security, but these studies lack a formal security assessment of protocols. Based on the above status, this paper evaluates and improves the security of the DDS protocol using a model detection method combining the Dolev–Yao attack model and the Coloring Petri Net (CPN) theory. Because of the security loopholes in the original protocol, a timestamp was introduced into the original protocol, and the shared key establishment process in the original protocol lacked fairness and consistency. We adopted a new establishment method to establish the shared secret and re-verified its security. The results show that the overall security of the protocol has been improved by 16.7% while effectively preventing current replay attack.
6

Paterson, Barbara L., David Gregory e Sally Thorne. "A Protocol for Researcher Safety". Qualitative Health Research 9, n. 2 (marzo 1999): 259–69. http://dx.doi.org/10.1177/104973299129121820.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Kishino, Maiko, Teppei Omori, Yukiko Takayama, Shinichi Nakamura e Katsutoshi Tokushige. "Safety protocol of endoscopic examinations". Progress of Digestive Endoscopy 92, n. 1 (15 giugno 2018): 59–63. http://dx.doi.org/10.11641/pde.92.1_59.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Štohl, R., e K. Stibor. "Safety through Common Industrial Protocol". IFAC Proceedings Volumes 45, n. 7 (2012): 362–65. http://dx.doi.org/10.3182/20120523-3-cz-3015.00069.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Darmaya, I. Gede, Kadek Ayu Ekasani e Ni Luh Supartini. "Penerapan Cleanliness Health Safety Environmental Sustainability di Sektor Pariwisata". Jurnal Ilmiah Pariwisata dan Bisnis 2, n. 9 (30 settembre 2023): 1950–60. http://dx.doi.org/10.22334/paris.v2i9.530.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The 101 Bali Fontana Seminyak merupakan salah satu tempat yang menyediakan akomodasi untuk berbagai kegiatan namun keberadaannya harus memberikan rasa aman dan nyaman bagi pemakainya. Melalui protokol kesehatan Cleanliness, Health, Safety,& Environmental Sustainability sektor pariwisata dan ekonomi kreatif dalam negeri dapat segera bangkit dan pulih, untuk itu Kementerian Pariwisata dan Ekonomi Kreatif telah mewajibkan semua industri pariwisata untuk menerapkan protokol Cleanliness, Health, Safety, & Environmental Sustainability. Penelitian ini bertujuan untuk mengetahui bagaimana penerapan dan f aktor – faktor yang mempengaruhi penerapan Cleanliness, Health, Safety, & Environmental Sustainability. CHSE dalam teknik pengumpulan data menggunakan metode wawancara, dokumentasi dan kuesioner. Teknik analisis data yang digunakan yaitu statistik deskriptif sehinggga diketahui nilai rata-rata penilaian tamu secara umum. Berdasarkan hasil penelitian terdapat nilai rata- rata penerapan sebesar 4,4 dengan kreteria penerapan Cleanliness, Health, Safety, & Environmental Sustainability dinyatakan sangat baik. Faktor-faktor yang mempengaruhi penerapan Cleanliness, Health, Safety,& Environmental Sustainability yaitu pembiayaan peralatan protokol kesehatan, kurangnya pendapatan serta pihak hotel mengundang PMI dan Dinas Kesehatan Kabupaten Badung bergabung dalam mensosialisasikan penerapan protokol kesehatan dan penerapan Cleanliness, Health, Safety , & Environmental Sustainability. The 101 Bali Fontana Seminyak is a place that provides accommodation for various activities but its existence must provide a sense of security and comfort for the wearer. Through the health protocol Cleanliness, Health, Safety, & Environmental Sustainability the tourism sector and the domestic creative economy can quickly rise and recover, for this reason the Ministry of Tourism and Creative Economy has made it mandatory for all tourism industries to implement the Cleanliness, Health, Safety, & Environmental Sustainability protocol. This study aims to find out how the implementation and f the factors that influence the implementation of Cleanliness, Health, Safety, & Environmental Sustainability. CHSE in data collection techniques uses interview, documentation and questionnaire methods. The data analysis technique used is descriptive statistics so that the average value of guest ratings in general is known. Based on the research results, there is an average implementation value of 4.4 with the criteria for implementing Cleanliness, Health, Safety, & Environmental Sustainability stated to be very good. Factors that influence the implementation of Cleanliness, Health, Safety, & Environmental Sustainability, namely financing for health protocol equipment, lack of income and the hotel inviting PMI and the Badung District Health Office to join in socializing the implementation of health protocols and implementing Cleanliness, Health, Safety, & Environmental Sustainability.
10

Rohman, Hendra. "Health Protocol Implementation on Medical Record Document Management At Primary Health Centre". JURNAL ILMU KESEHATAN BHAKTI SETYA MEDIKA 6, n. 2 (25 dicembre 2021): 64–72. http://dx.doi.org/10.56727/bsm.v6i2.64.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Health protocols are rules and regulations need followed by related parties in order to carry out activities safely during COVID-19 pandemic. Health Protocol is established so people can continue to carry out their activities safely and do not endanger safety or health of others. This study aims to identify health protocol flow implementation on medical record document management at Sewon I and II Health Centers, Bantul Yogyakarta. Qualitative descriptive research method. Interviews were conducted with filling officers. Result, health protocol implementation flow at Sewon I and II Health Centers has been implemented and carried out by all relevant parties. Officers use personal protective equipment, namely masks, gowns, handscoons, face shields, and headscaps. Medical record document management by drying and spraying after service. Conclusion, health protocol flow needs to implemented by all officers. Medical record document management during covid-19 pandemic needs adjustments to circulars from professional organizations. SOPs related to health protocols have been listed in policy for medical records organizing.

Tesi sul tema "Safety protocol":

1

Bennett, Jill M. "Assessing school preparedness an evaluation of a safety assessment protocol /". Menomonie, WI : University of Wisconsin--Stout, 2007. http://www.uwstout.edu/lib/thesis/2007/2007bennettj.pdf.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Nelson, Kevin R. "Critical analysis of XYZ Secondary School's technology education safety protocol". Online version, 2003. http://www.uwstout.edu/lib/thesis/2003/2003nelsonk.pdf.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Meireles, Tiago Hipkin. "Wireless protocols to support vehicular safety applications". Doctoral thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/16287.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Doutoramento em Engenharia Electrotécnica
In the last decades the number of vehicles travelling in European road has raised significantly. Unfortunately, this brought a very high number of road accidents and consequently various injuries and fatalities. Even after the introduction of passive safety systems, such as seat belts, airbags, and some active safety systems, such as electronic brake system (ABS) and electronic stabilization (ESP), the number of accidents is still too high. Approximately eight per cent of the fatal accidents occur in motorways, in the Portuguese case, the number of fatalities has remained constant in the first decade of the 21st century. The evolution of wireless communications, along with the north-American and European policies that reserve spectrum near the 5,9GHz band for safety applications in the vehicular environment, has lead to the development of several standards. Many of these applications are based on the possibility of using a wireless communication system to warn drivers and passengers of events occurring on the road that can put at risk their own safety. Some examples of safety applications are the hard-brake warning, the wrong-way warning and the accident warning. This work aims to contribute in defining a communication protocol that guarantees the timely dissemination of safety critical events, occurring in scenarios with a high number of vehicles or in the neighbourhood of so called motorway “blackspots”, to all vehicles in the zone of interest. To ensure information integrity and user trust, the proposed system is based on the motorway infrastructure, which will validate all events reported by the vehicles with the usage of several means, such as video surveillance or other sensors. The usage of motorway infrastructure that has full motorway coverage using fixed stations also known as road side units, allows to have a global vision of the interest zone, avoiding the problems associated to networks that depend solely on vehicle to vehicle communication, generally total ad-hoc networks. By using the infrastructure, it is possible to control medium access, avoiding possible badly intended intrusions and also avoiding the phenomenon known as alarm showers or broadcast storm that occur when all vehicles want to simultaneously access the medium to warn others of a safety event. The thesis presented in this document is that it is possible to guarantee in time information about safety events, using an architecture where the road side units are coordinated among themselves, and communicate with on board units (in vehicles) that dynamically register and deregister from the system. An exhaustive and systematic state of the art of safety applications and related research projects is done, followed by a study on the available wireless communications standards that are able to support them. The set of standards IEEE802.11p and ETSI-G5 was created for this purpose and is found to be the more adequate, but care is taken to define a scenario where WAVE enabled and non-enabled vehicles can coexist. The WAVE medium access control protocol suffers from collision problems that do not guarantee a bounded delay, therefore a new protocol (V-FTT) is proposed, based on the adaptation of the Flexible Time Triggered protocol to the vehicular field. A theoretical analysis of the V-FTT applied to WAVE and ETSI-G5 is done, including quantifying a real scenario based on the A5 motorway from Lisbon to Cascais, one of the busiest Portuguese motorways. We conclude the V-FTT protocol is feasible and guarantees a bounded delay.
Nas últimas décadas tem-se assistido a um aumento do número de veículos a circular nas vias rodoviárias europeias, trazendo consigo um elevado número de acidentes e como consequência muitos feridos e vítimas mortais. Apesar da introdução de sistemas de segurança passivos, tais como cintos de segurança, airbags e de alguns sistemas de segurança activos, tais como o sistema electrónico de travagem (ABS) e o sistema electrónico de estabilidade (ESP), o número de acidentes continua a ser demasiado elevado. Aproximadamente oito por cento dos acidentes fatais na Europa ocorrem em auto-estradas, no caso Português, o número de vítimas mortais tem-se mantido constante ao longo da primeira década do século XXI. A evolução das comunicações sem fios, acompanhada de políticas europeias e norte-americanas no sentido de reservar frequências próximas dos 5,9GHz para aplicações de segurança no ambiente veicular, levou à especificação de várias normas. A maior parte destas aplicações baseiam-se na possibilidade de usar um sistema confiável de comunicação sem fios para alertar os condutores e passageiros de veículos para eventos ocorridos nas estradas que possam colocar em risco a sua segurança. Exemplos de aplicações de segurança crítica são o aviso de travagem brusca, o aviso de veículo em contra mão e o aviso de acidente na estrada. Este trabalho contribui para a definição de protocolos de comunicação capazes de garantir que a informação sobre eventos relacionados com situações de segurança crítica, que ocorram em cenários com um elevado número de veículos em zonas urbanas ou na vizinhança dos chamados “pontos negros” das auto-estradas, é disseminada com pontualidade por todos os veículos localizados na zona de interesse Por uma questão da integridade das comunicações e confiança dos condutores, o sistema proposto baseia-se na infra-estrutura do concessionário da auto-estrada, que validará os eventos reportados pelos veículos usando vários meios à sua disposição, como por exemplo sistemas de videovigilância e outros sensores. O uso de uma infra-estrutura de comunicações, que dispõe de cobertura integral a partir de estações fixas, permite uma visão global da zona coberta, evitando os problemas associados a redes baseadas apenas na comunicação entre veículos, que são em geral totalmente ad-hoc. O uso da infra-estrutura permite, entre outras vantagens, controlar o acesso ao meio, evitando simultaneamente intrusões de estranhos ao sistema e o fenómeno conhecido como “chuva de alarmes” desencadeado quando todos os veículos querem aceder simultaneamente ao meio para avisar os restantes da existência dum evento de segurança crítica. A tese apresentada neste documento defende que é possível garantir informação atempada sobre eventos que põem em risco a segurança dos veículos a partir de uma arquitectura de interligação entre as estações de comunicações fixas, coordenadas entre si, e unidades móveis (veículos) que se registam e se desligam dinamicamente do sistema. Nesta tese faz-se um levantamento exaustivo e sistemático das aplicações de segurança abordando projectos de investigação relacionados, estudam-se as tecnologias de comunicação sem fios disponíveis e a sua possibilidade de suportar aplicações de segurança rodoviária. Desta análise, conclui-se que a norma norte americana WAVE/IEEE802.11p e a europeia ETSI-G5, criadas especificamente para o efeito são as que mais se adequam à finalidade desejada. Considera-se que o cenário de utilização é evolutivo, podendo coexistirem veículos que não dispõem de sistemas de comunicação com outros que suportam a norma WAVE. Dado que o protocolo de acesso ao meio proposto pela norma WAVE não garante um acesso determinístico ao meio partilhado, propõe-se um novo protocolo, o Vehicular Flexible Time-Triggered protocol (VFTT). Faz-se a análise teórica da viabilidade do protocolo proposto para a norma WAVE e respectiva norma europeia (ETSI-G5). Quantifica-se o protocolo VFTT para um cenário real: a auto-estrada A5 Lisboa-Cascais, uma das autoestradas portuguesas mais movimentadas. Conclui-se que o protocolo é viável e garante um atraso restringido temporalmente.
4

Xie, Hong. "A Protocol Stack in TinyTimber for PIEs that Cooperate for Traffic Safety". Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17541.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
There is an increasing demand for reliable wireless communication in embedded real time systems.  Various communication requirements make the development and deployment of applications that rely on the existence of a protocol stack a challenging research and industrial field of activity. Suitable protocol stacks need to be designed and implemented on new hardware platforms and software structures. Applications that exchange packets over a wireless medium have to deal with time constraints, error checks and have to be aware of energy consumption.   PIE (Platform for Intelligent Embedded Systems) is an experimental platform developed at Halmstad University for educational purposes.  It is a robotic vehicle with wireless communication capabilities that can be used to experiment with traffic scenarios where the vehicles communicate in order to cooperate, for example to avoid hazards or to build platoons.   This thesis addresses the design and implementation of a protocol stack suitable for the PIE platform in the area of vehicle alert systems. Requirements include low latencies along with low packet loss ratios.  The thesis addresses also experimenting with reactive objects for programming network software.
5

Foster, Nathalie Louise. "The application of software and safety engineering techniques to security protocol development". Thesis, University of York, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.412617.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Lorenzen, Torsten [Verfasser]. "Design of an adaptive congestion control protocol for reliable vehicle safety communication / Torsten Lorenzen". Hannover : Technische Informationsbibliothek (TIB), 2018. http://d-nb.info/1166077322/34.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Alsubaihi, Badr. "Semantic and Self-Decision Geocast Protocol for Data Dissemination over Vehicle Ad Hoc Network". Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31783.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In this work, we provide a qualitative comparison between existing geocast protocols and then we present an efficient geocast routing protocol for VANET. This protocol is a semantic and self-decision geocast routing protocol for disseminating safety and non-safety information over VANET (SAS-GP). SAS-PG initially executes an algorithm to locally determine the semantic geocast area. Then, the protocol disseminates the information in three phases: Spread, Preserve, and Assurance, which utilize the traffic information system and the digital map. SAS-GP principally employs timer-based techniques in order to avoid overhead and broadcast storm problems; nonetheless, novel factors are enhanced to calculate the timer’s values in each phase. Simulation results demonstrate effective and reliable dissemination in terms of delivery ratio and number of false warnings compared to existing protocols when evaluated in high scale and realistic scenarios. Also, SAS-GP performs faster in notifying vehicles resulting in a higher geocast distance before approaching the location of the event.
8

Rasoamanana, Aina Toky. "Derivation and Analysis of Cryptographic Protocol Implementation". Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAS005.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
TLS et SSH sont deux protocoles de sécurité très répandu et étudiés par la communauté de la recherche. Dans cette thèse, nous nous concentrons sur une classe spécifique de vulnérabilités affectant les implémentations TLS et SSH, tels que les problèmes de machine à états. Ces vulnérabilités sont dues par des différences d'interprétation de la norme et correspondent à des écarts par rapport aux spécifications, par exemple l'acceptation de messages non valides ou l'acceptation de messages valides hors séquence.Nous développons une méthodologie généralisée et systématique pour déduire les machines d'état des protocoles tels que TLS et SSH à partir de stimuli et d'observations, et pour étudier leur évolution au fil des révisions. Nous utilisons l'algorithme L* pour calculer les machines d'état correspondant à différents scénarios d'exécution.Nous reproduisons plusieurs vulnérabilités connues (déni de service, contournement d'authentification) et en découvrons de nouvelles. Nous montrons également que l'inférence des machines à états est suffisamment efficace et pratique dans de nombreux cas pour être intégrée dans un pipeline d'intégration continue, afin d'aider à trouver de nouvelles vulnérabilités ou déviations introduites au cours du développement.Grâce à notre approche systématique en boîte noire, nous étudions plus de 600 versions différentes d'implémentations de serveurs et de clients dans divers scénarios (versions de protocoles, options). En utilisant les machines d'état résultantes, nous proposons un algorithme robuste pour identifier les piles TLS et SSH. Il s'agit de la première application de cette approche sur un périmètre aussi large, en termes de nombre de piles TLS et SSH, de révisions ou de scénarios étudiés
TLS and SSH are two well-known and thoroughly studied security protocols. In this thesis, we focus on a specific class of vulnerabilities affecting both protocols implementations, state machine errors. These vulnerabilities are caused by differences in interpreting the standard and correspond to deviations from the specifications, e.g. accepting invalid messages, or accepting valid messages out of sequence.We develop a generalized and systematic methodology to infer the protocol state machines such as the major TLS and SSH stacks from stimuli and observations, and to study their evolution across revisions. We use the L* algorithm to compute state machines corresponding to different execution scenarios.We reproduce several known vulnerabilities (denial of service, authentication bypasses), and uncover new ones. We also show that state machine inference is efficient and practical enough in many cases for integration within a continuous integration pipeline, to help find new vulnerabilities or deviations introduced during development.With our systematic black-box approach, we study over 600 different versions of server and client implementations in various scenarios (protocol versions, options). Using the resulting state machines, we propose a robust algorithm to fingerprint TLS and SSH stacks. To the best of our knowledge, this is the first application of this approach on such a broad perimeter, in terms of number of TLS and SSH stacks, revisions, or execution scenarios studied
9

Sjödin, Andreas, e Marcus Gruneau. "The ADS-B protocol and its'weaknesses : Exploring potential attack vectors". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
ADS-B är ett protokoll som används över hela världen för att piloter och flygledning ska få en bättre bild över trafiksituationen i luften.Tidigare studier har uppmärksammat att säkerheten kring protokollet är bristfällig eftersom det saknas kryptering. Det huvudsakliga sårbarheten som finns i protokollet beror på att autentisering saknas. Protokollet är alltså byggt på ett blint förtroende mellan sändare och mottagare.Vårt arbete är inspirerat av tidigare forskning som gjorts inom området som bland annat visar att det går att skapa s.k. “spökflygplan” genom att sända falsk data över protokollet. Syftet bakom denna rapport var att utföra ett penetrationstest på en populär ADS-B produkt riktad mot piloter. Våra tester bygger på OSSTMM3, en vetenskaplig metod för att testa säkerhet.Våra tester visar att mottagaren som testade, inte helt oväntat, följer protokollet utan att validera data. Vi lyckades precis som tidigare forskare injicera statiska spökflygplan men också manipulera rörelsen av ett spökflygplan på ett sätt som strider mot fysikens rörelselagar. Våra tester visar att tjänsten som levereras av mottagaren kan störas ut genom att utföra liknande attacker.
The ADS-B protocol is currently in use all around the world. The purpose behind the protocol is to give pilots and traffic control a better picture of the situation in the air. Previous research shows that there exists a vulnerability in the protocol since it lacks authentication. The protocol is solely built upon trust between sender and receiver.Our work is inspired by previous studies made in the area, where it has been demonstrated that one can inject fake aircraft by sending fake ADS-B data using the protocol. The purpose behind this report was to perform a penetration test according to the OSSTMM3, a manual on how to perform scientific penetration tests.We wanted to test a real product (ADS-B receiver) made for pilots and measure if we could manipulate the environment presented to the pilot.Our testing shows that the receiver blindly trusts the protocol without any data validation. We managed to inject fake static aircraft just like previous researchers have done, but also move them around in the environment in a way that breaks the laws of physics and flood the device with fake data, effectively denying the service provided.Since we managed to deny the service, which is to give the user a correct picture of the nearby air traffic, we feel like our tests were successful.
10

Umeno, Shinya. "Proving safety properties of an aircraft landing protocol using timed and untimed I/O automata : a case study". Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/38920.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.
Page 222 blank.
Includes bibliographical references (p. 195-196).
This thesis presents an assertional-style verification of the aircraft landing protocol of NASA's SATS (Small Aircraft Transportation System) concept of operation using the timed and untimed I/O automata frameworks. We construct two mathematical models of the landing protocol using the above stated frameworks. First, we study a discrete model of the protocol, in which the airspace of the airport and every movement of the aircraft are all discretized. The model is constructed by reconstructing a mathematical model presented in using the untimed I/O automata framework. Using this model, we verify the safe separation of aircraft in terms of the bounds on the numbers of aircraft in specific discretized areas. In addition, we translate this I/O automaton model into a corresponding PVS specification, and conduct a machine verification of the proof using the PVS theorem prover. Second, we construct a continuous model of the protocol by extending the discrete model using the timed I/O automata framework. A refinement technique has been developed to reason about the external behavior between two systems. We present a new refinement proof technique, a weak refinement using a step invariant.
(cont.) Using this new refinement, we carry over the verification results for the discrete model to the new model, and thus guarantee that the safe separation of aircraft verified for the discrete model also holds for the new model. We also prove properties specific to the new model, such as a lower bound on the spacing of aircraft in a specific area of the airport, using an invariant-proof technique.
by Shinya Umeno.
S.M.

Libri sul tema "Safety protocol":

1

Association, American Industrial Hygiene. Laboratory chemical hygiene: An AIHA protocol guide. Fairfax, VA: American Industrial Hygiene Association, 1995.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Association, American Industrial Hygiene, a cura di. Confined space entry: An AIHA protocol guide. Fairfax, Va: American Industrial Hygiene Association, 1995.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Association, American Industrial Hygiene, a cura di. Confined space entry: An AIHA protocol guide. Fairfax, Va: American Industrial Hygiene Association, 2001.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

United States. Occupational Safety and Health Administration. Directorate of Compliance Programs, a cura di. Protocol for safety and health inspections at Superfund incinerator sites. Washington, D.C. (200 Constitution Ave., N.W., Washington 20210): Occupational Safety and Health Administration, Directorate of Compliance Programs, 1994.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Inc, Joint Commission Resources, a cura di. Compliance strategies for the Universal Protocol. Oakbrook Terrance, Ill: Joint Commission Resources, 2007.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Union, Barbados Workers'. Protocol Four of the Social Partnership 2001-2004. [Bridgetown, Barbados]: Barbados Workers' Union, 2002.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Miller, Derek B. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations, 2008.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Segger, Marie-Claire Cordonier. Legal aspects of implementing the Cartagena Protocol on Biosafety. Cambridge: Cambridge University Press, 2012.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Ruth, Mackenzie, Ascencio Alfonso, International Union for Conservation of Nature and Natural Resources., IUCN Environmental Law Centre, Foundation for International Environmental Law and Development. e World Resources Institute, a cura di. An explanatory guide to the Cartagena Protocol on Biosafety. Gland, Switzerland: IUCN in collaboration with FIELD and WRI, 2003.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Committee, United Nations Economic Commission for Europe Inland Transport. European agreement concerning the international carriage of dangerous goods byroad (ADR) and protocol of signature, done at Geneva on 30 September 1957. New York: United Nations, 1996.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Capitoli di libri sul tema "Safety protocol":

1

Spry, J. Andy. "Sample Safety Assessment Protocol". In Encyclopedia of Astrobiology, 1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27833-4_5576-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Spry, J. Andy. "Sample Safety Assessment Protocol". In Encyclopedia of Astrobiology, 2713–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-662-65093-6_5576.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Stahel, Philip F. "The Universal Protocol: Pitfalls and Pearls". In Patient Safety in Surgery, 175–84. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-4369-7_14.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Cansanção, Alvaro, Alexandra Condé-Green, Joshua A. David e Bianca Ohana. "Liposuction: Clinical Management and Safety Protocol". In Gluteal Fat Augmentation, 57–63. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-58945-5_8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Li, Mushu, Jie Gao, Xuemin Shen e Lian Zhao. "Protocol Design for Safety Message Broadcast". In SpringerBriefs in Computer Science, 17–48. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22860-5_3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Cirisci, Berk, Constantin Enea e Suha Orhun Mutluergil. "Quorum Tree Abstractions of Consensus Protocols". In Programming Languages and Systems, 337–62. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30044-8_13.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
AbstractDistributed algorithms solving agreement problems like consensus or state machine replication are essential components of modern fault-tolerant distributed services. They are also notoriously hard to understand and reason about. Their complexity stems from the different assumptions on the environment they operate with, i.e., process or network link failures, Byzantine failures etc. In this paper, we propose a novel abstract representation of the dynamics of such protocols which focuses on quorums of responses (votes) to a request (proposal) that form during a run of the protocol. We show that focusing on such quorums, a run of a protocol can be viewed as working over a tree structure where different branches represent different possible outcomes of the protocol, the goal being to stabilize on the choice of a fixed branch. This abstraction resembles the description of recent protocols used in Blockchain infrastructures, e.g., the protocol supporting Bitcoin or Hotstuff. We show that this abstraction supports reasoning about the safety of various algorithms, e.g., Paxos, PBFT, Raft, and HotStuff, in a uniform way. In general, it provides a novel induction based argument for proving that such protocols are safe.
7

Banno, Ryotaro, Kotaro Matsuoka, Naoki Matsumoto, Song Bian, Masaki Waga e Kohei Suenaga. "Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption". In Computer Aided Verification, 447–68. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13185-1_22.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
AbstractIn many Internet of Things (IoT) applications, data sensed by an IoT device are continuously sent to the server and monitored against a specification. Since the data often contain sensitive information, and the monitored specification is usually proprietary, both must be kept private from the other end. We propose a protocol to conduct oblivious online monitoring—online monitoring conducted without revealing the private information of each party to the other—against a safety LTL specification. In our protocol, we first convert a safety LTL formula into a DFA and conduct online monitoring with the DFA. Based on fully homomorphic encryption (FHE), we propose two online algorithms (Reverse and Block) to run a DFA obliviously. We prove the correctness and security of our entire protocol. We also show the scalability of our algorithms theoretically and empirically. Our case study shows that our algorithms are fast enough to monitor blood glucose levels online, demonstrating our protocol’s practical relevance.
8

Wang, Dongfeng, Qinghua Li, Fengyin Li, Quanxin Zhang e Banghai Xu. "Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain". In Cyberspace Safety and Security, 274–78. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_22.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Zhu, Haojia, Can Cui, Fengyin Li, Zhongxing Liu e Quanxin Zhang. "Design of Anonymous Communication Protocol Based on Group Signature". In Cyberspace Safety and Security, 175–81. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37352-8_15.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Shen, Jian, Jun Shen, Chen Wang e Anxi Wang. "A Fibonacci Based Batch Auditing Protocol for Cloud Data". In Cyberspace Safety and Security, 215–22. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69471-9_16.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Safety protocol":

1

Stohl, Radek, e Karel Stibor. "Safety through Common Industrial Protocol". In 2013 14th International Carpathian Control Conference (ICCC). IEEE, 2013. http://dx.doi.org/10.1109/carpathiancc.2013.6560585.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Dariz, Luca, Gianpiero Costantino e Ilaria Matteucci. "Full-protocol safety analysis of CINNAMON". In 2022 IEEE 95th Vehicular Technology Conference (VTC2022-Spring). IEEE, 2022. http://dx.doi.org/10.1109/vtc2022-spring54318.2022.9860714.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Megyesi, D., J. Lesko e M. Schreiner. "Evaluation of multihop UAV communication model based on protocol-independent and protocol-dependent methods". In 2019 Modern Safety Technologies in Transportation (MOSATT). IEEE, 2019. http://dx.doi.org/10.1109/mosatt48908.2019.8944102.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Makanda, Kondwani, e Jun-Cheol Jeon. "Efficient Two-Party Quantum Secret Key-Sharing Protocol". In Security, Reliability, and Safety 2015. Science & Engineering Research Support soCiety, 2015. http://dx.doi.org/10.14257/astl.2015.109.03.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Farias, Suzi Maria Fernandes de, Daniel Aragão Machado, Carlos Luiz Dias e Flávio Vaz Machado. "Analgosedation protocol in adult intensive care units: Multidisciplinary approach with a focus on patient safety". In V Seven International Multidisciplinary Congress. Seven Congress, 2024. http://dx.doi.org/10.56238/sevenvmulti2024-138.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The multidisciplinary approach to sedating patients in Intensive Care Units (ICU) reflects a significant evolution compared to previous practices of keeping patients deeply sedated to promote rest. Current research suggests that deep sedation may be harmful and lead to negative outcomes. Therefore, the safest and most effective practice involves a multidisciplinary strategy that prioritizes minimizing sedation and performing daily awakenings to ensure patients' comfort and well-being. This study's main objective is to develop an analgosedation protocol, involving a multidisciplinary team, for adult patients in the ICU. This is an Applied Research divided into three distinct phases that included an integrative literature review, incorporating a multidisciplinary perspective on analgosedation protocols, the analysis of two case studies that highlight the research problem in a broader context and the development of an Analgosedation Protocol for patients admitted to an adult ICU. The research culminated in the creation of an educational and targeted resource to improve the management of analgosedation in adult ICUs, highlighting the importance of multidisciplinary collaboration. The implementation of a standardized analgosedation protocol in an adult ICU, supported by an engaged multidisciplinary team, can significantly improve clinical outcomes, such as reducing excessive sedation, reducing length of stay and preventing delirium. The success of this protocol depends on rigorous monitoring and personalization of treatment, highlighting the need for a well-informed and committed multidisciplinary team, capable of adjusting practices to the specific needs of patients and the conditions of the hospital environment.
6

Heinrich, Markus, Jannik Vieten, Tolga Arul e Stefan Katzenbeisser. "Security Analysis of the RaSTA Safety Protocol". In 2018 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2018. http://dx.doi.org/10.1109/isi.2018.8587371.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Lehmann, Bernd, e Lars Wolf. "Safety Analysis of a Maneuver Coordination Protocol". In 2020 IEEE Vehicular Networking Conference (VNC). IEEE, 2020. http://dx.doi.org/10.1109/vnc51378.2020.9318359.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Yoo, Hongseok, Jinhong Kim e Dongkyun Kim. "A dynamic safety interval protocol for VANETs". In the 2012 ACM Research in Applied Computation Symposium. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2401603.2401650.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Wang, Zhanjie, Hailong Wang, Kai He, Dexin Sun e Xiaobin Chen. "A safety-critical real-time network protocol". In 2008 IEEE International Conference on Granular Computing (GrC-2008). IEEE, 2008. http://dx.doi.org/10.1109/grc.2008.4664754.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Steenbruggen, I., e P. De Laat. "Methacholine challenge: Safety of the quadrupling protocol". In ERS International Congress 2022 abstracts. European Respiratory Society, 2022. http://dx.doi.org/10.1183/13993003.congress-2022.1063.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "Safety protocol":

1

Brand, L., D. Cautley, D. Bohac, P. Francisco, L. Shen e S. Gloss. Combustion Safety Simplified Test Protocol Field Study. Office of Scientific and Technical Information (OSTI), novembre 2015. http://dx.doi.org/10.2172/1225414.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Brand, L., D. Cautley, D. Bohac, P. Francisco, L. Shen e S. Gloss. Combustion Safety Simplified Test Protocol Field Study. Office of Scientific and Technical Information (OSTI), novembre 2015. http://dx.doi.org/10.2172/1226482.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Burgess, R., C. Blake e C. E. Tracy. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures. Office of Scientific and Technical Information (OSTI), settembre 2008. http://dx.doi.org/10.2172/938567.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Msuha, Basil, Luitfred D. Kissoly e Arnold Kihaule. Design and implementation of Social Safety Nets in Tanzania: A protocol for a systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, agosto 2022. http://dx.doi.org/10.37766/inplasy2022.8.0074.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Review question / Objective: This systematic review aims to assess the design and implementation features of social safety programs in Tanzania. To this end, the proposed systematic review will answer the following questions: i. What are the types of social safety net interventions that have been and/or are being implemented in Tanzania? and ii. What evidence of the design and implementation features of social safety net programs can be discerned in existing literature? These review questions are framed based on the population, intervention, comparison, and outcome (PICO) framework for preparing review questions. Condition being studied: Our factor of interest to be addressed by the systematic review are mainly two (A) core design features; and (B) implementation features of SSNs: The discussion on core design features will focus on: type of SSNs, main recipient, transfer value and frequency, coverage, duration of exposure and outcome. The implementation features will cover aspects such as: conditionality, targeting, payment mechanisms and governance, and implementation challenges.
5

Choi, Geunjoo, HyoJin Kim e Hyun Kang. Comparison of efficacy and safety of perioperaive sufentanil and remifentanil: a protocol for systematic review and meta-analysis protocol and meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, luglio 2022. http://dx.doi.org/10.37766/inplasy2022.7.0070.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Review question / Objective: The objective of this systematic review and meta-analysis of randomized controlled trials (RCTs) was to compare the efficacy and safety of perioperaive sufentanil and remifentanil use in patients receiving elective surgery under general anesthesia. Condition being studied: Patients receiving elective surgery under general anesthesia, and receving sufentanil or remifentanil during the operation. Information sources: We will search articles in MEDLINE, EMBASE, the Cochrane Central Register of Controlled Trials (CENTRAL), Web of Science, and Google Scholar from their inception up to August, 2022. To obtain more comprehensive search results, we will also search the ClinicalTrials.gov and cris.nih.go.kr for ongoing or incomplete clinical trials. We will also conduct a search of gray literature using OpenSIGLE.
6

Wang, Zhao, Fengting Zhai, Xiaomin Zhao, Guizhi Zhao, Na Li, Fang Zhang e Jinxing Liu. The efficacy and safety of acupuncture for perimenopausal insomnia: a network meta-analysis protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, novembre 2020. http://dx.doi.org/10.37766/inplasy2020.11.0047.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Yan, Huixin, Yun An, Tao Zhao, Jiangna Zhao e Juntao Yan. Therapeutic effect and safety of Tuina on Sciatica: A protocol for systematic review and meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, ottobre 2021. http://dx.doi.org/10.37766/inplasy2021.10.0034.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Review question / Objective: This study aimed to conduct a meta-analysis of Tuina in the treatment of Sciatica to clarify its efficacy and safety. Condition being studied: Sciatica is one of the common pain symptoms in the human body, also known as radiating leg pain. Sciatica is increasingly occurring due to poor posture and lack of physical exercise all over the world. At present, many studies have indicated that Tuina can improve the clinical symptoms and functional status of sciatica. However, there is currently no relevant systematic review to evaluate and report this clinical scientific issue. Consequently, this study will conduct a meta-analysis on the effectiveness and safety of Tuina therapy for sciatica.
8

Zhou, Zhongyu. Efficacy and safety of Moxibustion for obesity A protocol for systematic review and meta analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, novembre 2020. http://dx.doi.org/10.37766/inplasy2020.11.0140.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Huang, Chunhua, Rongfang Xie, Liting Liu e Ruiqi Wang. Efficacy and safety of Buzhong-Yiqi Decoction for Myasthenia gravis:study protocol for a systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, maggio 2020. http://dx.doi.org/10.37766/inplasy2020.5.0080.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Zhang, Zhi-hui, Lei Yin, Ling-ling Zhang e Jing Song. Efficacy and safety of Bacillus Calmette-Guerin for bladder cancer: A protocol of systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, luglio 2020. http://dx.doi.org/10.37766/inplasy2020.7.0042.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Vai alla bibliografia