Search results

1 – 10 of over 34000
Article
Publication date: 20 March 2009

Bruce Thompson, Martha Kyrillidou and Colleen Cook

Survey researchers sometimes develop large pools of items about which they seek participants' views. As a general proposition, library participants cannot reasonably be…

1399

Abstract

Purpose

Survey researchers sometimes develop large pools of items about which they seek participants' views. As a general proposition, library participants cannot reasonably be expected to respond to 100+ items on a given service quality assessment protocol. This paper seeks to describe the use of matrix sampling to reduce that burden on the participant.

Design/methodology/approach

Matrix sampling is a survey method that can be used to collect data on all survey items without requiring every participant to react to every survey question. Here the features of data are investigated from one such survey, the LibQUAL+® Lite protocol, and the participation rates, completion times, and result comparisons across the two administration protocols – the traditional LibQUAL+® protocol and the LibQUAL+® Lite protocol – at each of the four institutions are explored.

Findings

Greater completion rates were realized with the LibQUAL+® Lite protocol.

Originality/value

The data from the Lite protocol might be the most accurate representation of the views of all the library users in a given community.

Details

Performance Measurement and Metrics, vol. 10 no. 1
Type: Research Article
ISSN: 1467-8047

Keywords

Article
Publication date: 1 December 1994

Tim Heymann

The use of clinical protocols allows health care providers to offerappropriate diagnostic treatment and care services to patients, variancereports to purchasers and…

1170

Abstract

The use of clinical protocols allows health care providers to offer appropriate diagnostic treatment and care services to patients, variance reports to purchasers and quality training to clinical staff. Such protocols provide a locally agreed standard to which clinicians and the organization can work and against which they can be audited. By embedding protocols into patients’ records and reporting by exception, the use of protocols may help to tackle a raft of other issues successfully such as the reduction in junior doctors’ hours, and the facilitation of shared care. It may also bolster the medico‐legal robustness of the health care delivered. If the protocols are sufficiently detailed, costing, coding and other resource usage information can flow directly from the clinical records. Such benefits may be maximized by using protocols within the framework of an electronic patient record system.

Details

International Journal of Health Care Quality Assurance, vol. 7 no. 7
Type: Research Article
ISSN: 0952-6862

Keywords

Abstract

Details

Transforming Information Security
Type: Book
ISBN: 978-1-83909-928-1

Open Access
Article
Publication date: 4 March 2022

Caroline B. Ncube

This paper aims to explore the contours of the future intellectual property (IP) protocol of the African Continental Free Trade Area (AfCFTA) Agreement.

1110

Abstract

Purpose

This paper aims to explore the contours of the future intellectual property (IP) protocol of the African Continental Free Trade Area (AfCFTA) Agreement.

Design/methodology/approach

This paper frames the IP protocol within the architecture of the AfCFTA Agreement, meaning that it will follow the structure of other protocols and will be guided by the Agreement’s foundational principles and objectives. With the place, shape and form of the protocol so established, the paper considers the substantive aspects that ought to be addressed. It also considers provisions on technical assistance, capacity building and cooperation.

Findings

The paper finds that the Tripartite Free Trade Phase 2 IP agenda is a credible starting place, which must be broadened to better meet gendered challenges and the continent’s developmental priorities. This will entail including provisions on specific aspects enumerated in the paper, which must be aligned with provisions on technical assistance, capacity building and cooperation to enhance implementation. The best outcomes in the negotiation, adoption and implementation of the IP protocol will be achieved by an inclusive approach incorporating all national, sub-regional and regional institutions guided by coherent policy and coordinated to ensure efficiency in resources and capacity mobilisation.

Originality/value

To the best of the author’s knowledge, this is the first paper to formally consider both the architecture and substantive provisions of the future AfCFTA IP protocol with specific focus on gendered dimensions.

Details

Journal of International Trade Law and Policy, vol. 21 no. 2
Type: Research Article
ISSN: 1477-0024

Keywords

Article
Publication date: 28 December 2021

Abdulla Alateeq, Wael Elmedany, Nedal Ababneh and Kevin Curran

The purpose of this paper is to investigate the latest research related to secure routing protocols in Wireless Sensor Network (WSN) and propose a new approach that can…

Abstract

Purpose

The purpose of this paper is to investigate the latest research related to secure routing protocols in Wireless Sensor Network (WSN) and propose a new approach that can achieve a higher security level compared to the existing one. One of the main security issues in WSNs is the security of routing protocols. A typical WSN consists of a large number of small size, low-power, low-cost sensor devices. These devices are very resource-constrained and usually use cheap short-range radios to communicate with each other in an ad hoc fashion thus, achieving security in these networks is a big challenge, which is open for research.

Design/methodology/approach

The route updates and data messages of the protocol are authenticated using Edwards-curves Digital Signature Algorithm (EdDSA). Routing protocols play an essential role in WSNs, they ensure the delivery of the sensed data from the remote sensor nodes to back-end systems via a data sink. Routing protocols depend on route updates received from neighboring nodes to determine the best path to the sink. Manipulating these updates by inserting rouge nodes in the network that advertise false updates can lead to a catastrophic impact on the compromised WSN performance.

Findings

As a result, a new secure energy-aware routing protocol (SEARP) is proposed, which uses security enhanced clustering algorithm and EdDSA to authenticate route advertisements and messages. A secure clustering algorithm is also used as part of the proposed protocol to conserve energy, prolong network lifetime and counteract wormhole attacks.

Originality/value

In this paper, a SEARP is proposed to address network layer security attacks in WSNs. A secure clustering algorithm is also used as part of the proposed protocol to conserve energy, prolong network lifetime and counteract wormhole attacks. A simulation has been carried out using Sensoria Simulator and the performance evaluation has been discussed.

Details

Journal of Engineering, Design and Technology , vol. 20 no. 3
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 9 August 2021

Gnaneshwari G.R., M.S. Hema and S.C. Lingareddy

Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have…

Abstract

Purpose

Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment.

Design/methodology/approach

This paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions.

Findings

The proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario.

Originality/value

The communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 25 March 2021

Marianthi Leon and Richard Laing

This paper proposes and tests, through a series of structured multi-disciplinary design activities, a “Concept Design Stages Protocol” (CDS Protocol) to structure project…

Abstract

Purpose

This paper proposes and tests, through a series of structured multi-disciplinary design activities, a “Concept Design Stages Protocol” (CDS Protocol) to structure project initiation, to attain smoother collaboration and greater consensus among multi-disciplinary project teams.

Design/methodology/approach

A collaborative approach from the outset is imperative for project success, especially when considering multi-disciplinary teams in the architecture, engineering and construction (AEC) industry. However, involving different disciplines hinders communication paths and affects informed decision-making.

Findings

Based on these findings, the research demonstrates that the CDS Protocol provides a solid foundation to aid in the optimal implementation of collaborative design, and with particular regard to multi-disciplinary working.

Originality/value

The research demonstrates the potential for significant improvement in the optimisation of the conceptual design stages, with positive implications for time, communication and whole-team engagement.

Details

Journal of Engineering, Design and Technology , vol. 20 no. 3
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 18 March 2021

Ravi Kumar D.N.S. and Barani S.

The purpose of this paper is to introduce a new data dissemination model in order to improve the performance of transmission in VANET. It proposes a protocol named…

Abstract

Purpose

The purpose of this paper is to introduce a new data dissemination model in order to improve the performance of transmission in VANET. It proposes a protocol named Epidemic and Transmission-Segment-based Geographic Routing (ETSGR) and outlining the issues due to high mobility of nodes and uncertain physical topologies in the network. The proposed ETSGR is mainly used to analyze the vehicle state, direction, distance, traffic density and link quality of the network.

Design/methodology/approach

This research work based on ETSGR protocol mainly uses epidemic algorithm in order to find the vehicle state based on susceptible, infected and recovered (SIR) model. Furthermore, the vehicle position and finding the head node in the network is utilized using the transmission segment protocol based on geographic routing and analyses each node to form the segments and find the destination to transmit the data in timely manner.

Findings

The paper provides the enhancement of the performance based on some metrics such as end-to-end delay that obtained 0.62%, data throughput as 32.3%, packet delivery ratio as 67% and one-hop communication as 13%. The proposed ETSGR protocol analyzes the state of the vehicle correctly and each node segmented to transmit the data with the timely manner and obtaining reliable performance even with high mobility of nodes in the network.

Research limitations/implications

The proposed ETSGR protocol may have some limitation when considering the timing which should improve even in increasing many number of vehicles and different road segments.

Practical implications

This paper includes some suggestions for the practical deployment of the approach in which a real-time traffic analysis can be evaluated for taking prior actions during an emergency situation and proper dissemination of data in timely manner can help utilize the guidance of proper planning of roads.

Originality/value

This research fulfills an enhanced protocol to improve the performance of data dissemination.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 14 no. 2
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 16 August 2021

Umakant L. Tupe, Sachin D. Babar, Sonali P. Kadam and Parikshit N. Mahalle

Internet of Things (IoT) is an up-and-coming conception that intends to link multiple devices with each other. The aim of this study is to provide a significant analysis…

Abstract

Purpose

Internet of Things (IoT) is an up-and-coming conception that intends to link multiple devices with each other. The aim of this study is to provide a significant analysis of Green IoT. The IoT devices sense, gather and send out significant data from their ambiance. This exchange of huge data among billions of devices demands enormous energy. Green IoT visualizes the concept of minimizing the energy consumption of IoT devices and keeping the environment safe.

Design/methodology/approach

This paper attempts to analyze diverse techniques associated with energy-efficient protocols in green IoT pertaining to machine-to-machine (M2M) communication. Here, it reviews 73 research papers and states a significant analysis. Initially, the analysis focuses on different contributions related to green energy constraints, especially energy efficiency, and different hierarchical routing protocols. Moreover, the contributions of different optimization algorithms in different state-of-the-art works are also observed and reviewed. Later the performance measures computed in entire contributions along with the energy constraints are also checked to validate the effectiveness of entire contributions. As the number of contributions to energy-efficient protocols in IoT is low, the research gap will focus on the development of intelligent energy-efficient protocols to build up green IoT.

Findings

The analysis was mainly focused on the green energy constraints and the different robust protocols and also gives information on a few powerful optimization algorithms. The parameters considered by the previous research works for improving the performance were also analyzed in this paper to get an idea for future works. Finally, the paper gives some brief description of the research gaps and challenges for future consideration that helps during the development of an energy-efficient green IoT pertaining to M2M communication.

Originality/value

To the best of the authors’ knowledge, this is the first work that reviews 65 research papers and states the significant analysis of green IoT.

Details

International Journal of Pervasive Computing and Communications, vol. 18 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 20 January 2021

Luz Suplico-Jeong, Reynaldo Altillo Bautista Jr, Nelson Borrega Guillen Jr and Noel Sajid Murad

Iloilo province was singled out as a model province in the Philippines because of its ability to prevent the spread of COVID-19. This study aims to examine the factors…

Abstract

Purpose

Iloilo province was singled out as a model province in the Philippines because of its ability to prevent the spread of COVID-19. This study aims to examine the factors that influenced Iloilo residents' adherence to quarantine protocols.

Design/methodology/approach

A total of 334 Iloilo residents joined the survey. Using the theory of planned behavior (TPB), the results suggest a significant impact of attitude on adherence to quarantine protocols, while subjective norm, self-efficacy and controllability were not significant.

Findings

This study suggests that attitude predicts adherence to quarantine protocols. Further, the results showed that intrinsic motivation mediated the relationship between (1) attitude and adherence to quarantine protocols and (2) subjective norm and adherence to quarantine protocols. This implies that intrinsic motivation such as staying alive can encourage a resident to adhere to quarantine protocols.

Research limitations/implications

Subsequent research should also consider how to mitigate the effects of similar public health crises in the future.

Practical implications

The study implies that intrinsic motivation such as staying alive can encourage a resident to follow quarantine protocol given this pandemic.

Social implications

Health campaigns can lead to a more favorable attitude toward quarantine protocols adherence. Given the value of subjective norm, campaigns can also frame quarantine protocols adherence as socially responsible behavior. This can be used to target provinces with the highest risk of infection within the population. These insights can be used by local government units (LGUs), media and other stakeholders to encourage residents to adhere to quarantine protocols.

Originality/value

This study provides insights that can be used by the LGUs, media and other stakeholders to encourage residents to follow quarantine protocols.

Details

Asian Education and Development Studies, vol. 11 no. 2
Type: Research Article
ISSN: 2046-3162

Keywords

1 – 10 of over 34000