Search results
1 – 10 of over 41000Bruce Thompson, Martha Kyrillidou and Colleen Cook
Survey researchers sometimes develop large pools of items about which they seek participants' views. As a general proposition, library participants cannot reasonably be expected…
Abstract
Purpose
Survey researchers sometimes develop large pools of items about which they seek participants' views. As a general proposition, library participants cannot reasonably be expected to respond to 100+ items on a given service quality assessment protocol. This paper seeks to describe the use of matrix sampling to reduce that burden on the participant.
Design/methodology/approach
Matrix sampling is a survey method that can be used to collect data on all survey items without requiring every participant to react to every survey question. Here the features of data are investigated from one such survey, the LibQUAL+® Lite protocol, and the participation rates, completion times, and result comparisons across the two administration protocols – the traditional LibQUAL+® protocol and the LibQUAL+® Lite protocol – at each of the four institutions are explored.
Findings
Greater completion rates were realized with the LibQUAL+® Lite protocol.
Originality/value
The data from the Lite protocol might be the most accurate representation of the views of all the library users in a given community.
Details
Keywords
The use of clinical protocols allows health care providers to offerappropriate diagnostic treatment and care services to patients, variancereports to purchasers and quality…
Abstract
The use of clinical protocols allows health care providers to offer appropriate diagnostic treatment and care services to patients, variance reports to purchasers and quality training to clinical staff. Such protocols provide a locally agreed standard to which clinicians and the organization can work and against which they can be audited. By embedding protocols into patients’ records and reporting by exception, the use of protocols may help to tackle a raft of other issues successfully such as the reduction in junior doctors’ hours, and the facilitation of shared care. It may also bolster the medico‐legal robustness of the health care delivered. If the protocols are sufficiently detailed, costing, coding and other resource usage information can flow directly from the clinical records. Such benefits may be maximized by using protocols within the framework of an electronic patient record system.
Details
Keywords
Billy Melo Araujo and Dylan Wilkinson
The Ireland-Northern Ireland Protocol has been one of the most contentious aspects of the EU-UK post-Brexit trade relationship. By requiring the UK to comply with EU customs and…
Abstract
Purpose
The Ireland-Northern Ireland Protocol has been one of the most contentious aspects of the EU-UK post-Brexit trade relationship. By requiring the UK to comply with EU customs and internal market rules in relation to Northern Ireland (NI), the Protocol has created a hybrid trade regime where NI is subject to multiple, overlapping and often conflicting rules. This paper aims to examine one area in which this hybridity manifests itself. It focusses on the interplay between the Protocol and post-Brexit UK trade agreements. It examines potential areas of conflict between Protocol obligations and obligations derived from UK trade agreements. In doing so, it sheds light on the extent to which compliance with the Protocol may undermine NI’s ability to export and import goods under the preferential terms negotiated under UK trade agreements. It further discusses the consequences of these incompatibilities between the Protocol and these agreements for NI and, more widely, the functioning of the UK internal market as whole.
Design/methodology/approach
Doctrinal legal research
Findings
The paper examines potential areas of conflict between Protocol obligations and obligations derived from UK trade agreements. In doing so, it sheds light on the extent to which compliance with the Protocol may undermine NI’s ability to export and import goods under the preferential terms negotiated under UK trade agreements. It further discusses the consequences of these incompatibilities between the Protocol and these agreements for NI and, more widely, the functioning of the UK internal market as whole.
Originality/value
To the best of the authors’ knowledge this is the first paper carrying out a comprehensive legal analysis of the interaction and potential conflicts between the Protocol on Ireland-Northern Ireland and the UK’s post Brexit trade agreements.
Details
Keywords
Ishita Seth, Kalpna Guleria and Surya Narayan Panda
The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in…
Abstract
Purpose
The internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in significant standards and guidelines that have engaged various researchers and companies. In IoV, routing protocols play a significant role in enhancing communication safety for the transportation system. The high mobility of nodes in IoV and inconsistent network coverage in different areas make routing challenging. This paper aims to provide a lane-based advanced forwarding protocol for internet of vehicles (LAFP-IoV) for efficient data distribution in IoV. The proposed protocol’s main feature is that it can identify the destination zone by using position coordinates and broadcasting the packets toward the direction of destination. The novel suppression technique is used in the broadcast method to reduce the network routing overhead.
Design/methodology/approach
The proposed protocol considers the interferences between different road segments, and a novel lane-based forwarding model is presented. The greedy forwarding notion, the broadcasting mechanism, and the suppression approach are used in this protocol to reduce the overhead generated by standard beacon forwarding procedures. The SUMO tool and NS-2 simulator are used for the vehicle's movement pattern and to simulate LAFP-IoV.
Findings
The simulation results show that the proposed LAFP-IoV protocol performs better than its peer protocols. It uses a greedy method for forwarding data packets and a carry-and-forward strategy to recover from the local maximum stage. This protocol's low latency and good PDR make it ideal for congested networks.
Originality/value
The proposed paper provides a unique lane-based forwarding for IoV. The proposed work achieves a higher delivery ratio than its peer protocols. The proposed protocol considers the lanes while forwarding the data packets applicable to the highly dense scenarios.
Details
Keywords
Ana Isabel Polo-Peña, Hazel Andrews and Javier Torrico-Jódar
This paper examines whether following a health crisis the use of health and safety protocols and hotel brand awareness influences hotel perceived value and intention to visit.
Abstract
Purpose
This paper examines whether following a health crisis the use of health and safety protocols and hotel brand awareness influences hotel perceived value and intention to visit.
Design/methodology/approach
Using an experimental design, the study evaluates the effectiveness of the use of health and safety protocols and the moderating effect of brand awareness on perceived value and intention to visit.
Findings
The results show that the hotels using health and safety protocols (compared to those that do not use them) will achieve a higher perceived value and intention to visit. In addition, the awareness of brand does not moderate the effect of the health and safety protocols on perceived value and intention to visit.
Practical implications
This research identifies mechanisms for future consideration by hotel companies to promote the recovery of their activity after a health crisis. Specifically, using health and safety protocols will result in the market evaluating the brand more highly and produce a greater intention to visit. At the same time, the research indicates that regardless of whether the brand is well-known or not, the use of a health and safety protocol is advantageous.
Originality/value
This study offers new insights that can be useful for developing a resilient hotel sector in the face of future health crises. Specifically, the results show progress in understanding the effects that the use of health and safety protocols and brand awareness have on key consumer variables for the recovery of the sector in a post-pandemic context.
Details
Keywords
In this article we review the Internet's protocols and mainstream services. Section I provides an overview of the Internet's history and its bodies. Section 2 looks at the…
Abstract
In this article we review the Internet's protocols and mainstream services. Section I provides an overview of the Internet's history and its bodies. Section 2 looks at the Internet's overall architecture and goals. The IP protocol which deals with data encapsulation and host addressing is reviewed in Section 3, whilst transport control protocols are discussed in Section 4. Section 5 looks at the mainstream services based on TCP/IP protocols, i.e. telnet, ftp, electronic mail, newsgroups and finger.
Gnaneshwari G.R., M.S. Hema and S.C. Lingareddy
Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a…
Abstract
Purpose
Pervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have become a major challenging task in the Pervasive computing environment. To solve the security issues and to increase the communication reliability, an authentication-based access control approach is developed in this research to ensure the level of security in the Pervasive computing environment.
Design/methodology/approach
This paper aims to propose authentication-based access control approach performs the authentication mechanism using the hashing, encryption, and decryption function. The proposed approach effectively achieves the conditional traceability of user credentials to enhance security. Moreover, the performance of the proposed authentication-based access control approach is estimated using the experimental analysis, and performance improvement is proved using the evaluation metrics. It inherent the tradeoff between authentication and access control in the Pervasive computing environment. Here, the service provider requires authorization and authentication for the provision of service, whereas the end-users require unlinkability and untraceability for data transactions.
Findings
The proposed authentication-based access control obtained 0.76, 22.836 GB, and 3.35 sec for detection rate, memory, and time by considering password attack, and 22.772GB and 4.51 sec for memory and time by considering without attack scenario.
Originality/value
The communication between the user and the service provider is progressed using the user public key in such a way that the private key of the user can be generated through the encryption function.
Details
Keywords
The nature of information retrieval applications, the Z39.50 protocol, and its relationship to other OSI protocols are described. Through Z39.50 a client system views a remote…
Abstract
The nature of information retrieval applications, the Z39.50 protocol, and its relationship to other OSI protocols are described. Through Z39.50 a client system views a remote server's database as an information resource, not merely a collection of data. Z39.50 allows a client to build queries in terms of logical information elements supported by the server. It also provides a framework for transmitting queries, managing results, and controlling resources. Sidebars describe the Z39.50 Implementors Group, the Z39.50 Maintenance Agency, and international standards for OSI library application protocols.
Samia Ben Amarat and Peng Zong
This paper aims to present a comprehensive review in major research areas of unmanned air vehicles (UAVs) navigation, i.e. three degree-of-freedom (3D) path planning, routing…
Abstract
Purpose
This paper aims to present a comprehensive review in major research areas of unmanned air vehicles (UAVs) navigation, i.e. three degree-of-freedom (3D) path planning, routing algorithm and routing protocols. The paper is further aimed to provide a meaningful comparison among these algorithms and methods and also intend to find the best ones for a particular application.
Design/methodology/approach
The major UAV navigation research areas are further classified into different categories based on methods and models. Each category is discussed in detail with updated research work done in that very domain. Performance evaluation criteria are defined separately for each category. Based on these criteria and research challenges, research questions are also proposed in this work and answered in discussion according to the presented literature review.
Findings
The research has found that conventional and node-based algorithms are a popular choice for path planning. Similarly, the graph-based methods are preferred for route planning and hybrid routing protocols are proved better in providing performance. The research has also found promising areas for future research directions, i.e. critical link method for UAV path planning and queuing theory as a routing algorithm for large UAV networks.
Originality/value
The proposed work is a first attempt to provide a comprehensive study on all research aspects of UAV navigation. In addition, a comparison of these methods, algorithms and techniques based on standard performance criteria is also presented the very first time.
Details