Articoli di riviste sul tema "Safety protocol"

Segui questo link per vedere altri tipi di pubblicazioni sul tema: Safety protocol.

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Safety protocol".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

M Baiju, Nithya, Aboobacker Mohamed Rafi, Nittin Henry, Ramesh Bhaskaran, Susheela Jacob Innah e Athira Sasidharan. "Is It Time to Switch from Conventional Coombs Crossmatching to the Type and Screen Protocol?" Malaysian Journal of Medical Sciences 30, n. 2 (18 aprile 2023): 124–30. http://dx.doi.org/10.21315/mjms2023.30.2.11.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Background: ABO grouping, Rh typing and crossmatching are routinely done as part of pre-transfusion testing. The Type and Screen (T&S) protocol has been used in developed countries to ensure the survival of transfused red cells. In this study, we compared the safety, costs and turnaround times (TATs) of the T&S protocol and the conventional pre-transfusion testing protocol for patients who had been scheduled for elective obstetrical or gynaecological procedures. Methods: This observational study was conducted in three phases at the Department of Transfusion Medicine, Jubilee Mission Medical College and Research Institute, Kerala, India and involved 1,800 patients from the Department of Obstetrics and Gynaecology, Jubilee Mission Medical College & Research Institute, Kerala, India over the course of 2 years. Phase I involved the traditional pre-transfusion testing and crossmatching of 150 patients. Phase II involved the use of the T&S protocol on 150 patients. Phase III involved the use of both the traditional and T&S protocols on 1,500 patients without considering the results of each protocol. The safety, costs and TATs of both protocols were compared. Results: In this study, the T&S protocol provided a safety 100% level when compared to the traditional protocol. The T&S protocol detected unexpected antibodies in 0.4% of cases, which would have gone unnoticed otherwise, demonstrating its usefulness. There was no significant difference in cost between the traditional crossmatching and T&S protocols. We discovered that using only the T&S protocol can save technologists 30% of their time. Conclusion: Implementing the T&S protocol as a pre-transfusion testing procedure can help improve hospital transfusion practices by supplying blood quickly and safely. Coombs cross-matching remains more of a tradition than a necessity.
2

PARKER, BARBARA, e YVONNE ULRICH. "A Protocol of Safety". Nursing Research 39, n. 4 (luglio 1990): 248???249. http://dx.doi.org/10.1097/00006199-199007000-00016.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Kalla, G. N. "A protocol for safety". Anaesthesia 42, n. 6 (giugno 1987): 667. http://dx.doi.org/10.1111/j.1365-2044.1987.tb03101.x.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Neal-Kluever, April, Queenster Nartey, Jason Aungst, Federica Basso, Karen Davis-Bruno, Ikram Elayan, Jie Liu, Arippa Ravindran e Yen-Ching Wu. "Utility of generational developmental and reproductive toxicity and juvenile animal study protocols for the infant safety assessment of food contact materials". Toxicology Research and Application 2 (1 gennaio 2018): 239784731880604. http://dx.doi.org/10.1177/2397847318806043.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The US Food and Drug Administration (FDA) Division of Food Contact Notifications (DFCN) performs infant lifestage-specific exposure and safety assessments during the premarket review of FCNs proposed for use with infant formula or human milk. DFCN previously identified two protocols that may be best suited to support infant safety: the multigenerational developmental and reproductive toxicology (Gen-DART) protocol and the juvenile animal study (JAS) protocol. The Gen-DART protocol tests chemical exposure from prior to mating through one or two generations in rodents, while JAS protocols test a chemical during a specific developmental window. At FDA, Gen-DART studies are currently recommended to support the safety of food additives (FAs), including food contact substances, across lifestages (from conception through adulthood). JAS protocols are recommended in the nonclinical safety assessment of drugs seeking pediatric indications. To improve our recommendations regarding the use of either Gen-DART or JAS protocols for the infant safety assessment of food contact materials, we created a database of FDA-reviewed Gen-DART or JAS. Our database contains information from 41 Gen-DART studies (38 FAs) and 51 JAS (29 drugs). Both protocols can detect toxicity relevant to infant safety assessment, such as developmental toxicity in neurological, endocrine, reproductive, immunological, or skeletal systems. Selection of either protocol will depend on the amount of information available for the chemical under study. The Gen-DART protocol may be preferred when limited data on the mode of action or target organ of the chemical are available. However, if these data are available, a JAS may provide the best assessment of potential juvenile toxicity.
5

Du, Jinze, Chengtai Gao e Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service". Future Internet 15, n. 1 (31 dicembre 2022): 24. http://dx.doi.org/10.3390/fi15010024.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The Data Distribution Service (DDS) for real-time systems is an industrial Internet communication protocol. Due to its distributed high reliability and the ability to transmit device data communication in real-time, it has been widely used in industry, medical care, transportation, and national defense. With the wide application of various protocols, protocol security has become a top priority. There are many studies on protocol security, but these studies lack a formal security assessment of protocols. Based on the above status, this paper evaluates and improves the security of the DDS protocol using a model detection method combining the Dolev–Yao attack model and the Coloring Petri Net (CPN) theory. Because of the security loopholes in the original protocol, a timestamp was introduced into the original protocol, and the shared key establishment process in the original protocol lacked fairness and consistency. We adopted a new establishment method to establish the shared secret and re-verified its security. The results show that the overall security of the protocol has been improved by 16.7% while effectively preventing current replay attack.
6

Paterson, Barbara L., David Gregory e Sally Thorne. "A Protocol for Researcher Safety". Qualitative Health Research 9, n. 2 (marzo 1999): 259–69. http://dx.doi.org/10.1177/104973299129121820.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Kishino, Maiko, Teppei Omori, Yukiko Takayama, Shinichi Nakamura e Katsutoshi Tokushige. "Safety protocol of endoscopic examinations". Progress of Digestive Endoscopy 92, n. 1 (15 giugno 2018): 59–63. http://dx.doi.org/10.11641/pde.92.1_59.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Štohl, R., e K. Stibor. "Safety through Common Industrial Protocol". IFAC Proceedings Volumes 45, n. 7 (2012): 362–65. http://dx.doi.org/10.3182/20120523-3-cz-3015.00069.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Darmaya, I. Gede, Kadek Ayu Ekasani e Ni Luh Supartini. "Penerapan Cleanliness Health Safety Environmental Sustainability di Sektor Pariwisata". Jurnal Ilmiah Pariwisata dan Bisnis 2, n. 9 (30 settembre 2023): 1950–60. http://dx.doi.org/10.22334/paris.v2i9.530.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The 101 Bali Fontana Seminyak merupakan salah satu tempat yang menyediakan akomodasi untuk berbagai kegiatan namun keberadaannya harus memberikan rasa aman dan nyaman bagi pemakainya. Melalui protokol kesehatan Cleanliness, Health, Safety,& Environmental Sustainability sektor pariwisata dan ekonomi kreatif dalam negeri dapat segera bangkit dan pulih, untuk itu Kementerian Pariwisata dan Ekonomi Kreatif telah mewajibkan semua industri pariwisata untuk menerapkan protokol Cleanliness, Health, Safety, & Environmental Sustainability. Penelitian ini bertujuan untuk mengetahui bagaimana penerapan dan f aktor – faktor yang mempengaruhi penerapan Cleanliness, Health, Safety, & Environmental Sustainability. CHSE dalam teknik pengumpulan data menggunakan metode wawancara, dokumentasi dan kuesioner. Teknik analisis data yang digunakan yaitu statistik deskriptif sehinggga diketahui nilai rata-rata penilaian tamu secara umum. Berdasarkan hasil penelitian terdapat nilai rata- rata penerapan sebesar 4,4 dengan kreteria penerapan Cleanliness, Health, Safety, & Environmental Sustainability dinyatakan sangat baik. Faktor-faktor yang mempengaruhi penerapan Cleanliness, Health, Safety,& Environmental Sustainability yaitu pembiayaan peralatan protokol kesehatan, kurangnya pendapatan serta pihak hotel mengundang PMI dan Dinas Kesehatan Kabupaten Badung bergabung dalam mensosialisasikan penerapan protokol kesehatan dan penerapan Cleanliness, Health, Safety , & Environmental Sustainability. The 101 Bali Fontana Seminyak is a place that provides accommodation for various activities but its existence must provide a sense of security and comfort for the wearer. Through the health protocol Cleanliness, Health, Safety, & Environmental Sustainability the tourism sector and the domestic creative economy can quickly rise and recover, for this reason the Ministry of Tourism and Creative Economy has made it mandatory for all tourism industries to implement the Cleanliness, Health, Safety, & Environmental Sustainability protocol. This study aims to find out how the implementation and f the factors that influence the implementation of Cleanliness, Health, Safety, & Environmental Sustainability. CHSE in data collection techniques uses interview, documentation and questionnaire methods. The data analysis technique used is descriptive statistics so that the average value of guest ratings in general is known. Based on the research results, there is an average implementation value of 4.4 with the criteria for implementing Cleanliness, Health, Safety, & Environmental Sustainability stated to be very good. Factors that influence the implementation of Cleanliness, Health, Safety, & Environmental Sustainability, namely financing for health protocol equipment, lack of income and the hotel inviting PMI and the Badung District Health Office to join in socializing the implementation of health protocols and implementing Cleanliness, Health, Safety, & Environmental Sustainability.
10

Rohman, Hendra. "Health Protocol Implementation on Medical Record Document Management At Primary Health Centre". JURNAL ILMU KESEHATAN BHAKTI SETYA MEDIKA 6, n. 2 (25 dicembre 2021): 64–72. http://dx.doi.org/10.56727/bsm.v6i2.64.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Health protocols are rules and regulations need followed by related parties in order to carry out activities safely during COVID-19 pandemic. Health Protocol is established so people can continue to carry out their activities safely and do not endanger safety or health of others. This study aims to identify health protocol flow implementation on medical record document management at Sewon I and II Health Centers, Bantul Yogyakarta. Qualitative descriptive research method. Interviews were conducted with filling officers. Result, health protocol implementation flow at Sewon I and II Health Centers has been implemented and carried out by all relevant parties. Officers use personal protective equipment, namely masks, gowns, handscoons, face shields, and headscaps. Medical record document management by drying and spraying after service. Conclusion, health protocol flow needs to implemented by all officers. Medical record document management during covid-19 pandemic needs adjustments to circulars from professional organizations. SOPs related to health protocols have been listed in policy for medical records organizing.
11

Crea, Francesca, Antonio Ruggiero, Orazio Genovese, Luca Tortorolo, Giulia Zorzi e Antonio Chiaretti. "Safety and efficacy of two protocols for sedation in pediatric oncology procedures". Open Medicine 3, n. 1 (1 marzo 2008): 77–82. http://dx.doi.org/10.2478/s11536-008-0001-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
AbstractInvasive procedures, such as the lumbar puncture, can cause anxiety and pain in children undergoing treatment for acute lymphoblastic leukemia (ALL). We investigated the safety and efficacy of two different protocols for pain relief in 20 children with ALL undergoing lumbar puncture. Protocol A was composed of an association between propofol and alfentanil. Protocol B consisted in the combination of propofol and ketamine. Vital and behavioural parameters, sedation and pain scores were recorded at different times during and after the procedure. All patients showed a satisfactory sedation and analgesia. We found a statistically significant difference of vital parameters between protocol A and protocol B, while there were no significative differences between sedation scores and the other parameters evaluated. Patients in protocol A showed a higher incidence of major side effects, such as respiratory depression. Our results show that both protocols are effective to obtain a good sedation and analgesia in children with ALL undergoing lumbar puncture, but the association between propofol and ketamine appears more safe due to the lower incidence of side effects.
12

Amirnovin, Rambod, Phuong Lieu, Flerida Imperial-Perez, Carol Taketomo, Barry P. Markovitz e David Y. Moromisato. "Safety, Efficacy, and Timeliness of Intravenous Potassium Chloride Replacement Protocols in a Pediatric Cardiothoracic Intensive Care Unit". Journal of Intensive Care Medicine 35, n. 4 (22 gennaio 2018): 371–77. http://dx.doi.org/10.1177/0885066617752659.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Objective: Hypokalemia in children following cardiac surgery occurs frequently, placing them at risk of life-threatening arrhythmias. However, renal insufficiency after cardiopulmonary bypass warrants careful administration of potassium (K+). Two different nurse-driven protocols (high dose and tiered dosing) were implemented to identify an optimal K+ replacement regimen, compared to an historical low-dose protocol. Our objective was to evaluate the safety, efficacy, and timeliness of these protocols. Design: A retrospective cohort review of pediatric patients placed on intravenous K+ replacement protocols over 1 year was used to determine efficacy and safety of the protocols. A prospective single-blinded review of K+ repletion was used to determine timeliness. Patients: Pediatric patients with congenital or acquired cardiac disease. Setting: Twenty-four-bed cardiothoracic intensive care unit in a tertiary children’s hospital. Interventions: Efficacy was defined as fewer supplemental potassium chloride (KCl) doses, as well as a higher protocol to total doses ratio per patient. Safety was defined as a lower percentage of serum K+ levels ≥4.8 mEq/L after a dose of KCl. Between-group differences were assessed by nonparametric univariate analysis. Results: There were 138 patients with a median age of 3.0 (interquartile range: 0.23-10.0) months. The incidence of K+ levels ≥4.8 mEq/L after a protocol dose was higher in the high-dose protocol versus the tiered-dosing protocol but not different between the low-dose and tiered-dosing protocols (high dose = 2.2% vs tiered dosing = 0.5%, P = .05). The ratio of protocol doses to total doses per patient was lower in the low-dose protocol compared to the tiered-dosing protocol ( P < .05). Protocol doses were administered 45 minutes faster ( P < .001). Conclusion: The tiered-dosed, nurse-driven K+ replacement protocol was associated with decreased supplemental K+ doses without increased risk of hyperkalemia, administering doses faster than individually ordered doses; the protocol was effective, safe, and timely in the treatment of hypokalemia in pediatric patients after cardiac surgery.
13

Hota, Lopamudra, Biraja Prasad Nayak, Arun Kumar, G. G. Md Nawaz Ali e Peter Han Joo Chong. "An Analysis on Contemporary MAC Layer Protocols in Vehicular Networks: State-of-the-Art and Future Directions". Future Internet 13, n. 11 (17 novembre 2021): 287. http://dx.doi.org/10.3390/fi13110287.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Traffic density around the globe is increasing on a day-to-day basis, resulting in more accidents, congestion, and pollution. The dynamic vehicular environment induces challenges in designing an efficient and reliable protocol for communication. Timely delivery of safety and non-safety messages is necessary for traffic congestion control and for avoiding road mishaps. For efficient resource sharing and optimized channel utilization, the media access control (MAC) protocol plays a vital role. An efficient MAC protocol design can provide fair channel access and can delay constraint safety message dissemination, improving road safety. This paper reviews the applications, characteristics, and challenges faced in the design of MAC protocols. A classification of the MAC protocol is presented based on contention mechanisms and channel access. The classification based on contention is oriented as contention-based, contention-free, and hybrid, whereas the classification based on channel access is categorized as distributed, centralized, cluster-based, cooperative, token-based, and random access. These are further sub-classified as single-channel and multi-channel, based on the type of channel resources they utilize. This paper gives an analysis of the objectives, mechanisms, advantages/disadvantages, and simulators used in specified protocols. Finally, the paper concludes with a discussion on the future scope and open challenges for improving the MAC protocol design.
14

Chalasani Srinivas, Dr, Dr Srinivas Malladi e . "A Light Protocol for Tracking Secure Stuff for the Internet of Things". International Journal of Engineering & Technology 7, n. 2.32 (31 maggio 2018): 121. http://dx.doi.org/10.14419/ijet.v7i2.32.15384.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.
15

Chalasani Srinivas, Dr, e Dr Srinivas Malladi. "A light protocol for tracking secure stuff for the internet of things". International Journal of Engineering & Technology 7, n. 3 (11 luglio 2018): 1491. http://dx.doi.org/10.14419/ijet.v7i3.11254.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The Internet of Things (IoT) is growing in the web of an age-old IPv6 address for Internet connections and messages that arise between these and other devices and systems that work with the Internet. It is equipped with the unique ID and data transfer capability through the network. Among other things, tracking and tracking online travel is a major issue. Although there are many tracking techniques for moving objects, many are at risk. So there is a need for tracking the safety of an object Safety protocols should provide visibility and tracking of street objects in support of the Internet (IoT). This protocol is based on the RFID Identity System for IoT Objects. Existing ones do not provide authentication of sites that lead to fakes. Great use of energy. The proposed protocol improves road safety tracking using the base protocol light and SPDL. The requested protocol is intended to ensure accuracy, accuracy, confidentiality and encryption. To ensure safe monitoring of objects, the requested protocols use cryptic primitives that use HMAC concepts that are used to authenticate an object. This protocol introduction relies on code authentication code (CMC), which is used to reduce power consumption at low cost. The testing of a test network evaluates protocol implementation and is found to be safer and requires less calculation than existing protocols.
16

E. Owusu-Ansah, Frances, Christian Amoah, Akua A. Addae, Victoria DeGraft-Adjei, Addo Frimpong-Manso e John Appiah-Poku. "Psychological correlates of COVID safety protocol adherence among university students". Ghana Medical Journal 57, n. 1 (28 febbraio 2023): 49–57. http://dx.doi.org/10.4314/gmj.v57i1.8.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Background: The COVID-19 pandemic continues to be a global concern. Reports of insidious asymptomatic variants of the virus raise concerns about the safety of huge numbers of students on university campuses.Objective: The study aimed to delineate psychological correlates for students’ adherence to safety protocols for appropriate context-specific coping intervention designs.Setting & Design: 751 students from the various colleges of the KNUST were conveniently sampled for this cross-sectional survey.Measures: Psychological instruments with good psychometric properties (DASS-21; Rosenberg Self-Esteem Scale and Perceived Control Scales) were used in addition to demographics and questions on COVID safety protocol adherence.Results: Self-esteem positively correlated with perceived control (r = 0.40, p<0.001) and COVID adherence (r = 0.16, p<0.001); but negatively correlated with psychological distress (r = -0.44 p<0.001). Greater perceived control was associated with lower psychological distress (r = -0.20 p<0.001) and greater adherence to safety protocols (r = 0.24 p<0.001). Protocol adherence was regressed on psychological distress, self-esteem, and perceived control to determine any significant prediction. All the variables accounted for 7% of the variance in COVID protocol adherence (R2 = 0.07, F (3, 661) =17.29, p<0.001) with perceived control significantly predicting adherence to COVID safety protocol (B = 0.11, β=0.23, t=5.54 p<0.001).Conclusion: Results indicated that perceived control over important life events and healthy self-esteem would likely facilitate adherence to COVID safety protocols and attenuate psychological distress. Implications for further research and design of appropriate COVID coping response interventions are discussed.
17

Lin, Zhidong, Yanmin Fu e Xuefeng Deng. "Safety Training Monitoring System of Ski Resort Based on Wireless Sensor Network". Wireless Communications and Mobile Computing 2022 (17 febbraio 2022): 1–12. http://dx.doi.org/10.1155/2022/6355567.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
With the gradual rise in China’s ski industry, skiing is now the most common sport among winter outdoor sports, which is closely related to the origin of safety issues. Based on the ski resort, training is the key to safety detection, only to ensure the safety of training personnel and to maintain the momentum of high-speed development of skiing sports for a long time. The monitoring system plays an important role in the wireless sensor network monitoring system. Common monitoring systems are used for agriculture, smart home, and outdoor environment monitoring systems, most of which are professional fields. Based on the safety of ski resorts, this paper puts forward the research of ski training safety system based on the wireless sensor. In the research of ski training detection system based on the wireless sensor network, first, the safety system of domestic ski resort is analyzed and detailed suggestions are given. Then, this paper studies the routing protocol of wireless communication technology in detail and compares the service life and energy consumption of nodes under the use of two different routing protocols in wireless sensor networks. According to the data experiment in this paper, LEACH-MH protocol has great advantages over the LEACH protocol. The LEACH-MH protocol detects 185 more rounds than the LEACH protocol in the total detection lifetime. In the detection of energy consumption of 100 m ∗ 100 m, the LEACH protocol consumes 50J in 400 rounds, while the LEACH-MH protocol consumes only 50J in 760 rounds.
18

Wang, Wenjie, Tao Luo e Ying Hu. "An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET". Mobile Information Systems 2016 (2016): 1–12. http://dx.doi.org/10.1155/2016/2195496.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.
19

Cannon, C. Ron. "Safety Protocol for Laser-assisted Tonsillectomy". Otolaryngology–Head and Neck Surgery 117, n. 2 (agosto 1997): P182. http://dx.doi.org/10.1016/s0194-59989780384-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
20

&NA;. "TIND protocol: effective drug safety evaluation". Inpharma Weekly &NA;, n. 880 (marzo 1993): 14. http://dx.doi.org/10.2165/00128413-199308800-00032.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
21

YOSHINO, Masanori, Tohru MIZUTANI, Ryuji YUYAMA, Takayuki HARA e Takahiro OTA. "Protocol Improves Safety of Carotid Endarterectomy". Surgery for Cerebral Stroke 39, n. 4 (2011): 257–61. http://dx.doi.org/10.2335/scs.39.257.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Cannon, C. Ron. "Safety protocol for laser-assisted tonsillectomy". Laryngoscope 108, n. 8 (agosto 1998): 1249–51. http://dx.doi.org/10.1097/00005537-199808000-00029.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
23

CANNON, C. "Safety protocol for laser-assisted tonsillectomy". Otolaryngology - Head and Neck Surgery 117, n. 2 (agosto 1997): P182. http://dx.doi.org/10.1016/s0194-5998(97)80384-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Barer, Arnold S., e Sergei Filipenkov. "Decompression safety of EVA: Soviet protocol". Acta Astronautica 32, n. 1 (gennaio 1994): 73–74. http://dx.doi.org/10.1016/0094-5765(94)90151-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Huang, Jiawei, Yi Huang e Jianxin Wang. "Vehicle Density Based Forwarding Protocol for Safety Message Broadcast in VANET". Scientific World Journal 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/584164.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In vehicular ad hoc networks (VANETs), the medium access control (MAC) protocol is of great importance to provide time-critical safety applications. Contemporary multihop broadcast protocols in VANETs usually choose the farthest node in broadcast range as the forwarder to reduce the number of forwarding hops. However, in this paper, we demonstrate that the farthest forwarder may experience large contention delay in case of high vehicle density. We propose an IEEE 802.11-based multihop broadcast protocol VDF to address the issue of emergency message dissemination. To achieve the tradeoff between contention delay and forwarding hops, VDF adaptably chooses the forwarder according to the vehicle density. Simulation results show that, due to its ability to decrease the transmission collisions, the proposed protocol can provide significantly lower broadcast delay.
26

Mohamed, Taha M., Islam Z. Ahmed e Rowayda A. Sadek. "Efficient VANET safety message delivery and authenticity with privacy preservation". PeerJ Computer Science 7 (4 maggio 2021): e519. http://dx.doi.org/10.7717/peerj-cs.519.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Vehicular ad-hoc networks (VANETs) play an essential role in the development of the intelligent transportation system (ITS). VANET supports many types of applications that have strict time constraints. The communication and computational overheads are minimal for these computations and there are many security requirements that should be maintained. We propose an efficient message authentication system with a privacy preservation protocol. This protocol reduces the overall communication and computational overheads. The proposed protocol consists of three main phases: the group registration phase, send/receive messages phase, and the leave/join phase. For cryptography algorithms, we combined symmetric and asymmetric key algorithms. The symmetric key was generated and exchanged without using the Diffie–Hellman (DH) protocol. Furthermore, we used an efficient version of the RSA algorithm called CRT-RSA. The experimental results showed that the computational overhead in the registration phase was significantly reduced by 91.7%. The computational overhead for sending and receiving the non-safety message phase was reduced by 41.2% compared to other existed protocols. Moreover, our results showed that the time required to broadcast a safety and non-safety group message was below 100 ms and 150 ms, respectively. The average computational time of sending and receiving a one-to-one message was also calculated. The proposed protocol was also evaluated with respect to performance and security and was shown to be invulnerable to many security attacks.
27

Musselman, B., C. Della Badia, M. Green e M. Podolsky. "The Safety Net: Implementation of an Office Surgery Safety Protocol". Journal of Minimally Invasive Gynecology 18, n. 6 (novembre 2011): S80. http://dx.doi.org/10.1016/j.jmig.2011.08.274.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Zhou, Cheng Hong, e Jun Hai Guo. "Quantum Safety Control System". Applied Mechanics and Materials 496-500 (gennaio 2014): 1941–43. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.1941.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Range safety control system ends up with the task or test of aircraft when there is an irreparable fault during powered phase. The security and the reliability are vital for safety control system. Inspired by the principle of quantum entanglement, we put forward a theoretical quantum safety control protocol which is based on two-step command transmission. In the two-step protocol, a quantum switch and a classical switch are fixed in the safety control process. Quantum switch and the classical switch are in charge of the transmission of cryptogram command and the transmission of execution command respective. Quantum principle guarantees the absolute security of this protocol. Besides, this is the first quantum safety control system.
29

Meredith, Sean, Jane Hilliard e Regis Vaillancourt. "Evaluation of a rapid hydration protocol: Safety and effectiveness". Journal of Oncology Pharmacy Practice 23, n. 4 (23 febbraio 2016): 249–54. http://dx.doi.org/10.1177/1078155216631406.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Background The Children’s Hospital of Eastern Ontario (CHEO) has implemented a rapid hydration protocol that may reduce the time required to achieve urine specific gravity and pH targets prior to chemotherapy. Objective The aim of this study was to determine if a rapid hydration protocol resulted in a shorter time to chemotherapy administration and during peak staffing levels without increasing adverse effects. Methods A retrospective chart review was conducted using data from electronic and paper medical charts, the hematology/oncology whiteboard, and video recordings. Patients who received cyclophosphamide, methotrexate, cisplatin and ifosfamide during the study period were included in the chart review. A urine specific gravity of ≤1.01, and in most cases a urine pH ≥7 was required to begin chemotherapy. Differences in time parameters between the standard and rapid hydration protocols were measured. Comparable parameters included the time from the start of pre-chemotherapy hydration to meeting urine targets, time from starting hydration to administration of chemotherapy, length of hospital stay and the number of chemotherapy administrations that were initiated prior to the nursing shift change at 19:30 h. Results Data were collected from 116 pre-chemotherapy intravenous hydration events administered to 25 different patients. There was a shorter time required to reach urine specific gravity and pH targets with the rapid hydration protocol compared to the standard hydration protocol, which translated into initiating chemotherapy sooner. There was also a shorter overall length of hospital stay and administration of chemotherapy occurred before the nursing shift change more often in the rapid hydration cohort compared to those patients who received the standard hydration protocol. There were no significant differences in adverse effects between the groups. Conclusion Patients receiving rapid hydration had a shorter time to chemotherapy administration and had a shorter length of stay in hospital. Rapid hydration resulted in the first dose of chemotherapy being administered earlier when more staff are available, which could reduce errors due to change in hospital personnel. The rapid hydration protocol did not result in an increase in reported adverse effects.
30

Chiluveru, Rajeshwari, Nishu Gupta e Ariel Soares Teles. "Distribution of Safety Messages Using Mobility-Aware Multi-Hop Clustering in Vehicular Ad Hoc Network". Future Internet 13, n. 7 (29 giugno 2021): 169. http://dx.doi.org/10.3390/fi13070169.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Reliability and security when distributing safety messages among vehicles in an extremely mobile environment are prominent issues in Vehicular Ad-Hoc Networks (VANETs). In VANET, data transfer becomes challenging because of inherent features such as excessive speed, geographically constrained topologies, unsteady communication links, diversity in the capacity of the channel, etc. A major challenge in the multi-hop framework is maintaining and building a path under such a rigid environment. With VANET, potency in the traffic safety applications has performed well because of the proper design of medium access control (MAC) protocols. In this article, a protocol is proposed pertaining to the distribution of safety messages named mobility-aware multi-hop clustering-based MAC (MAMC-MAC) to accomplish minimum communication overhead, high reliability, and delivery of safety messages in real-time environments. MAMC-MAC has the ability to establish clustering-based multi-hop sequence using the time-division multiple access (TDMA) technique. The protocol was specially developed for highway outlines to achieve network enhancement and efficient channel usage and guarantees integrity among the vehicles. The performance of the proposed protocol is evaluated using Network Simulator (NS-2), and it demonstrates its superiority over various standard protocols in terms of a number of quality-of-service (QoS)-based parameters. The criteria to select and assess these parameters are their sensitivity and importance to the safety-based applications they provide.
31

Chalouhi, Nohra, Pascal Jabbour, David Kung e David Hasan. "Safety and Efficacy of Tirofiban in Stent-Assisted Coil Embolization of Intracranial Aneurysms". Neurosurgery 71, n. 3 (4 giugno 2012): 710–14. http://dx.doi.org/10.1227/neu.0b013e31826213f9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Abstract BACKGROUND: Thromboembolic complications are a major concern in stent-assisted coiling of intracranial aneurysms that may be prevented with adequate antiplatelet therapy. OBJECTIVE: To assess the safety and efficacy of tirofiban in stent-assisted coiling. METHODS: Two protocols were used. In the initial protocol, tirofiban was administered intravenously as a 0.4 μg/kg per min bolus for 30 minutes followed by 0.10 μg.kg−1 min−1 maintenance infusion. The revised protocol consisted of a 0.10 μg.kg−1 min−1 maintenance infusion alone. RESULTS: Sixty-seven patients received tirofiban, 16 under the initial protocol and 51 under the revised protocol. Thirty (44.8%) patients had sustained a subarachnoid hemorrhage (SAH). Tirofiban infusion was initiated after thromboembolic events in 9 (13.4%) patients and prophylactically in 58 (86.6%). Four (6.0%) intracranial hemorrhages were noted. Three (18.8%) intracranial hemorrhages occurred with the initial protocol in patients treated electively and were fatal in 2 (66.7%) cases. The only complication (1.9%) under the revised protocol was a subclinical worsening of the computed tomographic appearance of an SAH. There was no tirofiban-related morbidity or deaths with the revised protocol. Of 9 patients that received tirofiban as a rescue treatment, 7 (77.8%) had complete and 2 (22.2%) had partial arterial recanalization. No thromboembolic events occurred in patients receiving prophylactic tirofiban. CONCLUSION: A bolus followed by a maintenance dose of tirofiban appears to have a high risk of cerebral hemorrhage. A maintenance infusion without an initial bolus, however, has an exceedingly low risk of hemorrhage and appears to be very safe and effective, even in the setting of SAH.
32

Alrajhi, Abdullah M., Mashael Alrouqi, Jude Howaidi, Mohammmad Alwadi, Hassan Alshehri, Imran K. Tailor, Mohammed S. Alnoamani et al. "Efficacy and Safety of AALL0232 Protocol in Adults with Acute Lymphoblastic Leukemia: Single Institution Experience". Blood 142, Supplement 1 (28 novembre 2023): 7367. http://dx.doi.org/10.1182/blood-2023-189082.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Background Over the past few decades, the outcomes for children with ALL have significantly improved with current regimens that yield a 5-year complete remission (CR) and event-free survival (EFS) rates of 98% and 70-80%, respectively. In contrast, the adult population has a CR of 85-90%, with a less satisfactory disease-free survival (DFS) rate of only 30-40% at 5-years. The feasibility of Children's Oncology Group (COG) AALL0232 protocol in older patients has not been established, especially adults older than 40 years and whether they will tolerate such unmodified pediatric based regimen. Therefore, we planned to assess our practice's outcomes in terms of the efficacy and safety of the COG AALL0232 protocol in adult ALL patients. Method This was a retrospective observational study that included patients ≥ 14 years with newly diagnosed ALL. Patients were excluded if they have secondary ALL. Our institute has adopted the AALL0232 protocol for both B-cell and T-cell ALL due to the similarities between the AALL0232 and CALGB 10403 protocols. MRD data was not included in our study since the cut-off for detection has been changed over the study period. Patient demographics and treatment-related outcomes will be reported using descriptive statistics. OS and RFS probabilities will be calculated using the Kaplan-Meier product-limit method from the date of pre-phase initiation. All P-values will be two-sided with P &lt;0.05 indicating significance. Results Between 2014 and 2022, a total of 96 patients were included in our study. 74% had B-cell and 26% had T-cell ALL. The majority of the patients had standard risk ALL (23%). 65% of the patients were receiving AALL0232 protocol. Early death with AALL0232 protocol occurred in 11.1% of our population. The 2-year OS rate was 72.6% (95% CI 61.4-81.1) (Figure 1). The OS rate for B-cell ALL was 78.5% compared to 53.8% for T-cell ALL at 2-years (P =0.0912). The use of AALL0232 protocol was comparable to other protocols in terms of survival with a 2-year OS rate of 77% and 62.3%, respectively (P=0.0761). Adults with favorable cytogenetic risk had an OS rate of 100% compared to 67.6% for standard and 49.2% for poor risk (P =0.047). Adults younger than 40 years had a higher OS rate compared to those older than 40 (76.4% vs. 54.7%, P= 0.0187). RFS rate at 2-years was durable in 68.2% of the patients (95% CI 56.8-77.2) (Figure 2). RFS rates were 72.3% for B-cell and 54.8% for T-cell ALL. The AALL0232 Protocol had a significant impact on RFS compared to other protocols (73.6% vs. 56.5%, P= 0.0277) (Figure 3). Those who were younger than 40 had an RFS rate of 73.9%. The 2-year NRM occurred in 21.7% of the population. The AALL0232 protocol did not result in a higher NRM compared to other protocols (P= 0.492). Conclusion Although the use of AALL0232 protocol in the adult population has a remarkable impact on the rate of relapse, its effect on survival remains questionable especially for patients with T-cell ALL and poor cytogenetic risk. Another point of concern is the early death rate that was observed in our study. Further studies are needed to assess the overall impact of COG protocol in the adult population.
33

Qiao, Chengzhen, Yanzhi Qiu, Chunhui Yang e Shaozhe Zhang. "Design and Implementation of EMU On-board Data Protocol Management System". Journal of Physics: Conference Series 2356, n. 1 (1 ottobre 2022): 012022. http://dx.doi.org/10.1088/1742-6596/2356/1/012022.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In view of the problems of various types, frequent upgrades and inconsistent standards of WTDS on-board protocols and fault dictionaries of EMU, sort out various on-board protocol documents and fault dictionaries of EMU on the whole railway. Analyse the differences of various on-board protocols and fault dictionaries of multiple units of different vehicle types and batches, and study the unified and standardized management method. Design a EMU on-board data protocol management system with complete business functions, standard specifications, safety and reliability, and realize the functions of structuring the content of the protocol file, version of the protocol file, process management, etc., so as to provide data support for EMU data mining and PHM application.
34

Li, Ping, e Lin Ning. "Clustering Routing Protocol Based on Base Station Authentication with TLEACH in WSN". Advanced Materials Research 734-737 (agosto 2013): 3107–13. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3107.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
This paper introduced a new safety and energy saved routing protocol BSATLEACH, it is focus on existing issues of protocols in wireless sensor networks (WSNs) what just considered energy saving only without security concern or designed for security only ignored large overheads and complex algorithm, so on. This protocol is built up based on TLEACH protocol, utilized Base Station to authenticate the identity of nodes, combined the identity trust and the behavior trust, and considered the factor of residual energy in nodes. It balanced above existing issues of protocols in WSNs. The results come from analysis and simulation in MATLAB shown that this new protocol can provide excellent security in WSNs and can extend the lifetime of network efficiently.
35

Yao, Jianan, Runzhou Tao, Ronghui Gu e Jason Nieh. "Mostly Automated Verification of Liveness Properties for Distributed Protocols with Ranking Functions". Proceedings of the ACM on Programming Languages 8, POPL (5 gennaio 2024): 1028–59. http://dx.doi.org/10.1145/3632877.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Distributed protocols have long been formulated in terms of their safety and liveness properties. Much recent work has focused on automatically verifying the safety properties of distributed protocols, but doing so for liveness properties has remained a challenging, unsolved problem. We present LVR, the first framework that can mostly automatically verify liveness properties for distributed protocols. Our key insight is that most liveness properties for distributed protocols can be reduced to a set of safety properties with the help of ranking functions. Such ranking functions for practical distributed protocols have certain properties that make them straightforward to synthesize, contrary to conventional wisdom. We prove that verifying a liveness property can then be reduced to a simpler problem of verifying a set of safety properties, namely that the ranking function is strictly decreasing and nonnegative for any protocol state transition, and there is no deadlock. LVR automatically synthesizes ranking functions by formulating a parameterized function of integer protocol variables, statically analyzing the lower and upper bounds of the variables as well as how much they can change on each state transition, then feeding the constraints to an SMT solver to determine the coefficients of the ranking function. It then uses an off-the-shelf verification tool to find inductive invariants to verify safety properties for both ranking functions and deadlock freedom. We show that LVR can mostly automatically verify the liveness properties of several distributed protocols, including various versions of Paxos, with limited user guidance.
36

Wilson, Joseph, Chima Onuekwe, Abdulmutallib Ado Abubakar, Collins Owili e Henry Okoro-Nwanja. "Information sources, knowledge and compliance to COVID-19 safety protocol in Borno State, Nigeria". World of Media. Journal of Russian Media and Journalism Studies 4, n. 2021 (1 dicembre 2021): 55–82. http://dx.doi.org/10.30547/worldofmedia.4.2021.3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Borno State, Nigeria has experienced active COVID-19 with quite a number of cases and mortalities. The extensive global campaign to create awareness about the pandemic and safety measures through various stakeholders appeared to have worked, especially when it became obvious that people in Borno keyed into safety protocols and observed the lockdown. They wore face masks, routinely applied hand sanitizers and handwashing in public places. It was observed, at some points however, there was obvious nonadherence to these protocols. Therefore, this study examines adherence to COVID-19 safety protocol issues in the state. Could the noncompliance be by those not aware or knowledgeable about the pandemic? Are there issues with the sources of information? The objectives of the study are to determine: the sources of information/knowledge on COVID-19; the effectiveness of the sources of information/knowledge on COVID-19; level of compliance to COVID-19 preventive/safety measures, and to identify challenges in complying with COVID-19 safety/preventive measures. The study used knowledge, attitude and practice theory employed survey method as well as convenience and purposive sampling techniques to select 2949 respondents across three LGAs in the state. The study found that people are aware and knowledgeable about the pandemic. The mass media, especially radio are the major sources of information. The noncompliance to COVID-19 safety protocol is largely due lack of fund to purchase and use face mask and hand sanitizer. It concludes that there are diverse sources of knowledge and information with poor compliance to the safety protocols in Borno State.
37

LI, Yi-qiang, Zhong-wei XU, Gang YU e Yuan TAN. "Safety requirement oriented test sequence generation algorithm for safety communication protocol". Journal of Computer Applications 29, n. 7 (30 luglio 2009): 1828–31. http://dx.doi.org/10.3724/sp.j.1087.2009.01828.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Meng, Mei, Xu Zhongwei, Wang Xi e Wan Yongbing. "Model checking-based safety verification for railway signal safety protocol-I". International Journal of Computer Applications in Technology 46, n. 3 (2013): 195. http://dx.doi.org/10.1504/ijcat.2013.052795.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Olufemi, Olakanmi Oladayo, e Adama Pamela. "An Efficient Multipath Routing Protocol for Decentralized Wireless Sensor Networks for Mission and Safety-Critical Systems". International Journal of Sensors, Wireless Communications and Control 10, n. 3 (2 novembre 2020): 368–81. http://dx.doi.org/10.2174/2210327909666190531113558.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Background: Wireless Sensor Network (WSN) is a useful integral part of mission and safety-critical systems, whose failure may result in injury, loss of life, serious environmental damage and/or may result in the failure of some goal-directed activities. Its major challenges are reliability, and security related issues during data delivery. To mitigate these, the development of secure routing protocols, which are capable of optimum utilization of WSNs’ nodes resources for effective data delivery, has been one of the major research interests. However, most of the existing single path routing protocols for WSNs are not able to meet with up with the performance requirements of the mission and safety-critical systems. Meanwhile, a few that are multipath require high computational power, energy and their multiple paths are not ranked, this makes them unsuitable as routing protocol for WSNs in mission and safety-critical systems. Objective: In this work, we propose a secure multipath routing protocol based on sectorisation and best neighbouring nodes selection models to meet up with the performance requirements of WSNs in the mission and safety-critical systems. The protocol is capable of providing optimal multiple ranked route paths for reliable data delivery. Methods: A route management technique, using direct approach, is developed for selecting different optimal data paths for reliable data routing. Also, simple but efficient lightweight privacy preserving authentication scheme is proposed for the protocol to ensure security and privacy during data routing. Computational and security analysis were performed to ascertain its efficiency in terms of computational cost, energy consumption and security. Results: The results showed that SMRP achieved better performance compared to the two stateof- the-art solutions in terms of end-to-end delay, energy consumption and data routing reliability. Conclusion: The proposed protocol is suitable for wireless sensor network due to its low delay, low energy consumption and routing reliability metrics.
40

Radek, Stohl, e Stibor Karel. "The Common Industrial Protocol in Machine Safety". Procedia Engineering 100 (2015): 773–81. http://dx.doi.org/10.1016/j.proeng.2015.01.431.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Walker, Mary K., Marquis D. Foreman e the NICHE Faculty. "Medication Safety: A Protocol for Nursing Action". Geriatric Nursing 20, n. 1 (gennaio 1999): 34–39. http://dx.doi.org/10.1016/s0197-4572(99)70054-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Mohd Jawi, Z., K. A. Abu Kassim, N. W. Nik Hassan, K. S. Tan, D. D. I. Daruis, S. A. F. Mohamed Ishak, Y. Ahmad, M. H. Johari e M. S. Ahmad Laili. "Comparing ASEAN NCAP Ratings between Editions of the Same Models". Journal of the Society of Automotive Engineers Malaysia 4, n. 1 (1 gennaio 2020): 106–18. http://dx.doi.org/10.56381/jsaem.v4i1.56.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
From a total of 20 car models crash-tested by ASEAN NCAP, seven models from four makes have undergone ASEAN NCAP assessment twice, whereas two car models from two domestic powerhouses had undergone the assessment thrice. This study shall evaluate the improvements to the newer editions which supposedly led to better safety ratings. The focus is on the passive safety systems comprising airbags, seatbelt, and child seats. ASEAN NCAP star rating is mainly based on the Adult Occupant Protection (AOP) and Children Occupant Protection (COP) for passive safety as well as some elements in active safety. The ratings and points earned for the AOP and COP were compared between previous and newer editions of the same car models. An analysis was conducted as to whether or not the different editions used the same protocol. There is a difference between the inaugural and the latest protocols to assess both the AOP and COP. Cars using different protocols were analysed in terms of the chest deflection value, in which the value from the latest protocol shall be calculated using the previous protocol to obtain AOP scores and making the comparison. Overall, the new batch of car models was rated to be safer and mostly the newer edition of the car models obtained better COP scores compared to their predecessors.
43

Punia, Divya, e Rajender Kumar. "A Kalman Filter Based Hybrid Routing Protocol for Efficient Vehicle Connectivity and Traffic Management". Transport and Telecommunication Journal 23, n. 1 (1 febbraio 2022): 25–32. http://dx.doi.org/10.2478/ttj-2022-0003.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Abstract The geographic routing protocols in Vehicular Ad Hoc Networks (VANETs) are contemplated as most efficacious protocols. Though, such types of protocols communicate a huge quantity of data that influence the network connectivity negatively. Also, out of bound issue is the second major disadvantage of geographic routing protocols. To provide a solution to these impediments, a novel K-PGRP (Kalman filter-Predictive Geographic Routing Protocol) routing protocol is proposed in this paper. K-PGRP is an improvement to PGRP (Predictive Geographic Routing Protocol) routing protocol and wields Kalman filter as a prediction module in PGRP routing protocol in order to anticipate the neighbor location and to select the propitious neighbor for advancing packets in both urban and highway framework which leads to efficient connectivity in the network and improves road safety. K-PGRP is then compared with PGRP, GPSR (Greedy Perimeter Stateless Routing) and GPCR (Greedy Perimeter Coordinator Routing) routing protocols in terms of throughput and packet delivery ratio metrics and outperformed all the simulation cases. The simulations were performed on MATLAB R2018a along with traffic simulator SUMO.
44

Hong, Chih-Duo, e Anthony W. Lin. "Regular Abstractions for Array Systems". Proceedings of the ACM on Programming Languages 8, POPL (5 gennaio 2024): 638–66. http://dx.doi.org/10.1145/3632864.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Verifying safety and liveness over array systems is a highly challenging problem. Array systems naturally capture parameterized systems such as distributed protocols with an unbounded number of processes. Such distributed protocols often exploit process IDs during their computation, resulting in array systems whose element values range over an infinite domain. In this paper, we develop a novel framework for proving safety and liveness over array systems. The crux of the framework is to overapproximate an array system as a string rewriting system (i.e. over a finite alphabet) by means of a new predicate abstraction that exploits the so-called indexed predicates. This allows us to tap into powerful verification methods for string rewriting systems that have been heavily developed in the last two decades or so (e.g. regular model checking). We demonstrate how our method yields simple, automatically verifiable proofs of safety and liveness properties for challenging examples, including Dijkstra's self-stabilizing protocol and the Chang-Roberts leader election protocol.
45

G S, Moses Raj. "Nuclear Safety in India :". Jindal Journal of International Affairs 4, n. 1 (1 ottobre 2016): 60–84. http://dx.doi.org/10.54945/jjia.v4i1.55.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Ever since the Fukushima incident, civilian nuclear energy in India has been a matter of great contestation, leading to several debates on domestic plant safety, disaster preparedness and ability to contain any such radioactive leakage through natural or man made disasters. In this regard, India ratified the Additional Protocol under the condition that civilian nuclear facilities will be separated from the military facilities and be compliant with IAEA safeguards. This compromise, while not being a signatory to the Non Proliferation Treaty and considered as a Non Nuclear Weapons State, has been a challenge and forced acceptance of opening up nuclear facilities which were earlier a state protected entity without external access. This paper offers a brief outlook into the history of Additional Protocol as an international safeguards measure adopted by India while examining the relevant provisions within the context of Additional Protocol. Further, an overview of India’s energy demand and consumption specific to the nuclear sector is analysed. Finally, a legal framework of nuclear safety in India covering separation, inspection and sampling of nuclear facilities to arrest proliferation and maintain plant safety will be addressed.
46

Jobaer, Sayed, Yihong Zhang, Muhammad Ather Iqbal Hussain e Foysal Ahmed. "UAV-Assisted Hybrid Scheme for Urban Road Safety Based on VANETs". Electronics 9, n. 9 (12 settembre 2020): 1499. http://dx.doi.org/10.3390/electronics9091499.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Traffic congestion control is becoming a popular field of research due to the rapid development of the automotive market. Vehicular ad hoc networks (VANETs) have become the core research technology for numerous application possibilities related to road safety. Road congestions have been a serious issue of all time since the nodes have high mobility and transmission range is limited, resulting in an interruption of communication. One of the significant technical challenges faced in implementing VANET is the design of the routing protocol, providing adequate information and a reliable source for the destination. We proposed a novel mechanism unmanned aerial vehicle (UAV)-assisted ad hoc on-demand distance vector (AODV) routing protocol (UAVa) for current-time traffic information accumulation and sharing to the entire traffic network and to control congestions before it happens. The UAV-assisted (UAVa) protocol is dedicated to urban environments, and its primary goal is to enhance the performance of routing protocols based on intersections. We compared the overall performance of existing routing protocols, namely ad hoc on-demand distance vector. The simulations were done by using OpenStreetMap (OSM), Network Simulator (NS-2.35), Simulation of Urban Mobility (SUMO), and VanetMobiSim. Furthermore, we compared the simulation results with AODV, and it shows that UAV-assisted (UAVa) AODV has significantly enhanced the packet delivery ratio, reduced the end-to-end delay, improved the average and instant throughput, and saved more energy. The results show that the UAVa is more robust and effective and we can conclude that UAVa is more suitable for VANETs.
47

Kaniasari, Dewi, Mila Mardotillah e Anwari Masatip. "Penerapan Protokol Kesehatan Hotel sebagai Langkah Preventif pada Masa Pandemi". Jurnal Akademi Pariwisata Medan 9, n. 1 (6 gennaio 2021): 36–43. http://dx.doi.org/10.36983/japm.v9i1.120.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Hotel is one of the places to stay for tourists while on their tour. During the Covid-19 pandemic, hotel operations still running but with limited activities. Due to the relaxation period, the number of usable rooms increase along with the implementation of the Health Protocol as a preventive way in every hotel facility. This study aims to determine the application of hotel Health Protocols in Bandung. The method used is descriptive quantitative in assessing the importance of Health Protocols in each hotel services in providing safety and comfort for tourists during their stay. The results showed that the flow of hotel Health Protocol application was socialized and implemented for both employees and visitors. The number of hotels visited during the second quarter of 2020 along relaxation is 225 facilities or 56% of all hotels in Bandung City. Adherence to the implementation of the Health Protocol in the first 2 weeks was 76% and increased to 100% at the second 2 weeks or there was an increase in adherence by 25%. The total increase in compliance with hotel Health Protocol implementation is 25%. The conclusion of this study is that the implementation of the hotel Health Protocol has increased, which is one of the guarantees of tourist safety and preventive steps to break the chain of Covid-19 transmission in hotels.
48

Boutet, Alexandre, Gavin J. B. Elias, Robert Gramer, Clemens Neudorfer, Jürgen Germann, Asma Naheed, Nicole Bennett et al. "Safety assessment of spine MRI in deep brain stimulation patients". Journal of Neurosurgery: Spine 32, n. 6 (giugno 2020): 973–83. http://dx.doi.org/10.3171/2019.12.spine191241.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
OBJECTIVEMany centers are hesitant to perform clinically indicated MRI in patients who have undergone deep brain stimulation (DBS). Highly restrictive guidelines prohibit the use of most routine clinical MRI protocols in these patients. The authors’ goals were to assess the safety of spine MRI in patients with implanted DBS devices, first through phantom model testing and subsequently through validation in a DBS patient cohort.METHODSA phantom was used to assess DBS device heating during 1.5-T spine MRI. To establish a safe spine protocol, routinely used clinical sequences deemed unsafe (a rise in temperature > 2°C) were modified to decrease the rise in temperature. This safe phantom-based protocol was then used to prospectively run 67 spine MRI sequences in 9 DBS participants requiring clinical imaging. The primary outcome was acute adverse effects; secondary outcomes included long-term adverse clinical effects, acute findings on brain MRI, and device impedance stability.RESULTSThe increases in temperature were highest when scanning the cervical spine and lowest when scanning the lumbar spine. A temperature rise < 2°C was achieved when 3D sequences were modified to 2D and when the number of slices was decreased by the minimum amount compared to routine spine MRI protocols (but there were still more slices than allowed by vendor guidelines). Following spine MRI, no acute or long-term adverse effects or acute findings on brain MR images were detected. Device impedances remained stable.CONCLUSIONSPatients with DBS devices may safely undergo spine MRI with a fewer number of slices compared to those used in routine clinical protocols. Safety data acquisition may allow protocols outside vendor guidelines with a maximized number of slices, reducing the need for radiologist supervision.Clinical trial registration no.: NCT03753945 (ClinicalTrials.gov).
49

Wang, Xiufeng, Mingcheng Qu, Gang Cui, Moshe Yan, Nwe Nwe Htay Win, Saif ur Rehman e Chunmeng Wang. "Regular-hexagon-equilateral-triangle area grouping–based broadcast protocol for safety message in urban vehicular ad hoc networks". International Journal of Distributed Sensor Networks 13, n. 1 (gennaio 2017): 155014771668382. http://dx.doi.org/10.1177/1550147716683829.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Road-based directional broadcast protocols are proposed in the literatures to offset efficiency of message dissemination of traditional broadcast protocol in urban vehicular ad hoc networks. However, these protocols cannot provide enough reliability and efficiency for vehicles’ misclassification at intersection or on straight road. Therefore, we present regular-hexagon-equilateral-triangle area grouping–based broadcast protocol for urban vehicular ad hoc networks. The area covered by relay node is averagely divided using regular-hexagon-equilateral-triangle, and vehicles are grouped according to the area that they reside. The algorithm for constructing regular-hexagon-equilateral-triangle is proposed. We adopt same vehicles’ grouping method at intersection and on straight road, and no neighbor list is maintained to identify road intersection. We design waiting time formula to calculate time for node forwarding message. It is ruled that node with waiting time dropping to zero first is defined as the relay node, and this relay node transmits message. So there is only one relay node which forwards message in each group. It also rules in regular-hexagon-equilateral-triangle area grouping–based broadcast protocol that each relay node forwards the same message only once, therefore, it limits redundant message retransmission. Using the vehicles’ grouping method and selection strategy of relay node as mentioned above, the proposed protocol enables message to be transmitted in different directions along different roads at the same time. Simulation indicates that our protocol has a better performance
50

Borges, AB, FS de Abreu, MC Mailart, RF Zanatta e CRG Torres. "Efficacy and Safety of Bleaching Gels According to Application Protocol". Operative Dentistry 46, n. 2 (1 marzo 2021): E105—E116. http://dx.doi.org/10.2341/19-253-l.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
SUMMARY Objectives: This study evaluated bleaching efficacy, enamel microhardness, and roughness of highly concentrated hydrogen peroxide (HP) gels (35%–40%) using different application protocols. Gel decomposition and pH alteration were also analyzed. Methods and Materials: Bovine enamel/dentin specimens were divided into groups according to the bleaching gel—Pola Office Plus (POP–SDI, 37.5% HP), Opalescence Boost (OPB–Ultradent, 40% HP), Whiteness HP (WHP–FGM, 35% HP)—and application protocol—single application (SA) and multiple application (MA) during the in-office session. Deionized water was used in control group (no bleaching). Thus, seven final groups were obtained (n=15/group). Color (CIE L*a*b*), surface microhardness (SMH), and roughness (Ra) were assessed before/after treatments. The pH of gels was measured, and HP concentration was determined with potassium permanganate titration method in different times. Data were submitted to analysis of variance and Tukey tests (5%). Results: All gels presented similar and clinically acceptable bleaching efficacy (ΔE&gt;2.7) for both SA and MA, as well as no significant differences for SMH and Ra comparing the two protocols in the same gel. Peroxide decomposition significantly increased with time, but final gel concentrations were still high after 45 minutes (32.29% POP; 38.45% OPB; and 32.74% WHP). The pH decreased over time (initial - after 45 min) for WHP (6.83±0.07 - 5.81±0.06), but minimal alterations were observed for POP (8.09±0.09 - 7.88±0.07) and OPB (7.82±0.11 - 7.87±0.07). Conclusions: Peroxide decomposition was very low for all gels tested, and pH remained stable for POP and OPB gels. Bleaching protocol did not influence whitening efficacy and hazardous effects over enamel, thus potentially there was no clinical significance. Therefore, for the products tested, there is no evidence for recommending the gel change during the bleaching session.

Vai alla bibliografia