Search results

1 – 10 of over 39000
Article
Publication date: 20 March 2009

Bruce Thompson, Martha Kyrillidou and Colleen Cook

Survey researchers sometimes develop large pools of items about which they seek participants' views. As a general proposition, library participants cannot reasonably be expected…

1439

Abstract

Purpose

Survey researchers sometimes develop large pools of items about which they seek participants' views. As a general proposition, library participants cannot reasonably be expected to respond to 100+ items on a given service quality assessment protocol. This paper seeks to describe the use of matrix sampling to reduce that burden on the participant.

Design/methodology/approach

Matrix sampling is a survey method that can be used to collect data on all survey items without requiring every participant to react to every survey question. Here the features of data are investigated from one such survey, the LibQUAL+® Lite protocol, and the participation rates, completion times, and result comparisons across the two administration protocols – the traditional LibQUAL+® protocol and the LibQUAL+® Lite protocol – at each of the four institutions are explored.

Findings

Greater completion rates were realized with the LibQUAL+® Lite protocol.

Originality/value

The data from the Lite protocol might be the most accurate representation of the views of all the library users in a given community.

Details

Performance Measurement and Metrics, vol. 10 no. 1
Type: Research Article
ISSN: 1467-8047

Keywords

Article
Publication date: 1 December 1994

Tim Heymann

The use of clinical protocols allows health care providers to offerappropriate diagnostic treatment and care services to patients, variancereports to purchasers and quality…

1334

Abstract

The use of clinical protocols allows health care providers to offer appropriate diagnostic treatment and care services to patients, variance reports to purchasers and quality training to clinical staff. Such protocols provide a locally agreed standard to which clinicians and the organization can work and against which they can be audited. By embedding protocols into patients’ records and reporting by exception, the use of protocols may help to tackle a raft of other issues successfully such as the reduction in junior doctors’ hours, and the facilitation of shared care. It may also bolster the medico‐legal robustness of the health care delivered. If the protocols are sufficiently detailed, costing, coding and other resource usage information can flow directly from the clinical records. Such benefits may be maximized by using protocols within the framework of an electronic patient record system.

Details

International Journal of Health Care Quality Assurance, vol. 7 no. 7
Type: Research Article
ISSN: 0952-6862

Keywords

Article
Publication date: 10 November 2023

Billy Melo Araujo and Dylan Wilkinson

The Ireland-Northern Ireland Protocol has been one of the most contentious aspects of the EU-UK post-Brexit trade relationship. By requiring the UK to comply with EU customs and…

Abstract

Purpose

The Ireland-Northern Ireland Protocol has been one of the most contentious aspects of the EU-UK post-Brexit trade relationship. By requiring the UK to comply with EU customs and internal market rules in relation to Northern Ireland (NI), the Protocol has created a hybrid trade regime where NI is subject to multiple, overlapping and often conflicting rules. This paper aims to examine one area in which this hybridity manifests itself. It focusses on the interplay between the Protocol and post-Brexit UK trade agreements. It examines potential areas of conflict between Protocol obligations and obligations derived from UK trade agreements. In doing so, it sheds light on the extent to which compliance with the Protocol may undermine NI’s ability to export and import goods under the preferential terms negotiated under UK trade agreements. It further discusses the consequences of these incompatibilities between the Protocol and these agreements for NI and, more widely, the functioning of the UK internal market as whole.

Design/methodology/approach

Doctrinal legal research

Findings

The paper examines potential areas of conflict between Protocol obligations and obligations derived from UK trade agreements. In doing so, it sheds light on the extent to which compliance with the Protocol may undermine NI’s ability to export and import goods under the preferential terms negotiated under UK trade agreements. It further discusses the consequences of these incompatibilities between the Protocol and these agreements for NI and, more widely, the functioning of the UK internal market as whole.

Originality/value

To the best of the authors’ knowledge this is the first paper carrying out a comprehensive legal analysis of the interaction and potential conflicts between the Protocol on Ireland-Northern Ireland and the UK’s post Brexit trade agreements.

Details

Journal of International Trade Law and Policy, vol. 23 no. 1
Type: Research Article
ISSN: 1477-0024

Keywords

Abstract

Details

Transforming Information Security
Type: Book
ISBN: 978-1-83909-928-1

Article
Publication date: 17 May 2023

Ishita Seth, Kalpna Guleria and Surya Narayan Panda

The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in…

22

Abstract

Purpose

The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in significant standards and guidelines that have engaged various researchers and companies. In IoV, routing protocols play a significant role in enhancing communication safety for the transportation system. The high mobility of nodes in IoV and inconsistent network coverage in different areas make routing challenging. This paper aims to provide a lane-based advanced forwarding protocol for internet of vehicles (LAFP-IoV) for efficient data distribution in IoV. The proposed protocol’s main feature is that it can identify the destination zone by using position coordinates and broadcasting the packets toward the direction of destination. The novel suppression technique is used in the broadcast method to reduce the network routing overhead.

Design/methodology/approach

The proposed protocol considers the interferences between different road segments, and a novel lane-based forwarding model is presented. The greedy forwarding notion, the broadcasting mechanism, and the suppression approach are used in this protocol to reduce the overhead generated by standard beacon forwarding procedures. The SUMO tool and NS-2 simulator are used for the vehicle's movement pattern and to simulate LAFP-IoV.

Findings

The simulation results show that the proposed LAFP-IoV protocol performs better than its peer protocols. It uses a greedy method for forwarding data packets and a carry-and-forward strategy to recover from the local maximum stage. This protocol's low latency and good PDR make it ideal for congested networks.

Originality/value

The proposed paper provides a unique lane-based forwarding for IoV. The proposed work achieves a higher delivery ratio than its peer protocols. The proposed protocol considers the lanes while forwarding the data packets applicable to the highly dense scenarios.

Open Access
Article
Publication date: 4 April 2023

Ana Isabel Polo-Peña, Hazel Andrews and Javier Torrico-Jódar

This paper examines whether following a health crisis the use of health and safety protocols and hotel brand awareness influences hotel perceived value and intention to visit.

Abstract

Purpose

This paper examines whether following a health crisis the use of health and safety protocols and hotel brand awareness influences hotel perceived value and intention to visit.

Design/methodology/approach

Using an experimental design, the study evaluates the effectiveness of the use of health and safety protocols and the moderating effect of brand awareness on perceived value and intention to visit.

Findings

The results show that the hotels using health and safety protocols (compared to those that do not use them) will achieve a higher perceived value and intention to visit. In addition, the awareness of brand does not moderate the effect of the health and safety protocols on perceived value and intention to visit.

Practical implications

This research identifies mechanisms for future consideration by hotel companies to promote the recovery of their activity after a health crisis. Specifically, using health and safety protocols will result in the market evaluating the brand more highly and produce a greater intention to visit. At the same time, the research indicates that regardless of whether the brand is well-known or not, the use of a health and safety protocol is advantageous.

Originality/value

This study offers new insights that can be useful for developing a resilient hotel sector in the face of future health crises. Specifically, the results show progress in understanding the effects that the use of health and safety protocols and brand awareness have on key consumer variables for the recovery of the sector in a post-pandemic context.

Details

Journal of Hospitality and Tourism Insights, vol. 7 no. 1
Type: Research Article
ISSN: 2514-9792

Keywords

Article
Publication date: 1 April 1994

R.E. Leon

In this article we review the Internet's protocols and mainstream services. Section I provides an overview of the Internet's history and its bodies. Section 2 looks at the…

Abstract

In this article we review the Internet's protocols and mainstream services. Section I provides an overview of the Internet's history and its bodies. Section 2 looks at the Internet's overall architecture and goals. The IP protocol which deals with data encapsulation and host addressing is reviewed in Section 3, whilst transport control protocols are discussed in Section 4. Section 5 looks at the mainstream services based on TCP/IP protocols, i.e. telnet, ftp, electronic mail, newsgroups and finger.

Details

Online and CD-Rom Review, vol. 18 no. 4
Type: Research Article
ISSN: 1353-2642

Article
Publication date: 9 August 2021

Gnaneshwari G.R., M.S. Hema and S.C. Lingareddy

Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a…

Abstract

Purpose

Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment.

Design/methodology/approach

This paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions.

Findings

The proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario.

Originality/value

The communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 April 1990

Clifford A. Lynch

The nature of information retrieval applications, the Z39.50 protocol, and its relationship to other OSI protocols are described. Through Z39.50 a client system views a remote…

Abstract

The nature of information retrieval applications, the Z39.50 protocol, and its relationship to other OSI protocols are described. Through Z39.50 a client system views a remote server's database as an information resource, not merely a collection of data. Z39.50 allows a client to build queries in terms of logical information elements supported by the server. It also provides a framework for transmitting queries, managing results, and controlling resources. Sidebars describe the Z39.50 Implementors Group, the Z39.50 Maintenance Agency, and international standards for OSI library application protocols.

Details

Library Hi Tech, vol. 8 no. 4
Type: Research Article
ISSN: 0737-8831

Article
Publication date: 13 June 2019

Samia Ben Amarat and Peng Zong

This paper aims to present a comprehensive review in major research areas of unmanned air vehicles (UAVs) navigation, i.e. three degree-of-freedom (3D) path planning, routing…

1070

Abstract

Purpose

This paper aims to present a comprehensive review in major research areas of unmanned air vehicles (UAVs) navigation, i.e. three degree-of-freedom (3D) path planning, routing algorithm and routing protocols. The paper is further aimed to provide a meaningful comparison among these algorithms and methods and also intend to find the best ones for a particular application.

Design/methodology/approach

The major UAV navigation research areas are further classified into different categories based on methods and models. Each category is discussed in detail with updated research work done in that very domain. Performance evaluation criteria are defined separately for each category. Based on these criteria and research challenges, research questions are also proposed in this work and answered in discussion according to the presented literature review.

Findings

The research has found that conventional and node-based algorithms are a popular choice for path planning. Similarly, the graph-based methods are preferred for route planning and hybrid routing protocols are proved better in providing performance. The research has also found promising areas for future research directions, i.e. critical link method for UAV path planning and queuing theory as a routing algorithm for large UAV networks.

Originality/value

The proposed work is a first attempt to provide a comprehensive study on all research aspects of UAV navigation. In addition, a comparison of these methods, algorithms and techniques based on standard performance criteria is also presented the very first time.

Details

Aircraft Engineering and Aerospace Technology, vol. 91 no. 9
Type: Research Article
ISSN: 1748-8842

Keywords

1 – 10 of over 39000