Search results for: nursing protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1703

Search results for: nursing protocol

1613 Orphan Node Inclusion Protocol for Wireless Sensor Network

Authors: Sandeep Singh Waraich

Abstract:

Wireless sensor network (WSN ) consists of a large number of sensor nodes. The disparity in their energy consumption usually lead to the loss of equilibrium in wireless sensor network which may further results in an energy hole problem in wireless network. In this paper, we have considered the inclusion of orphan nodes which usually remain unutilized as intermediate nodes in multi-hop routing. The Orphan Node Inclusion (ONI) Protocol lets the cluster member to bring the orphan nodes into their clusters, thereby saving important resources and increasing network lifetime in critical applications of WSN.

Keywords: wireless sensor network, orphan node, clustering, ONI protocol

Procedia PDF Downloads 388
1612 Actual Nursing Competency among Nurses in Hospital in Vietnam

Authors: Do Thi Ha, Khanitta Nuntaboot

Abstract:

Background: Competency of nurses is vital to safe nursing practice as well as essential component to drive quality of nursing services. There exists little up to date information concerning actual competency among Vietnamese nurses. Purposes: The purpose of this study is to identify the actual nursing competency among nurses in clinical settings in Vietnam. Methods: A qualitative study, ethnographic method, comprised of the participant-observation, in-depth interview, and focus group discussion with multidisciplinary groups of nurses employing in Cho Ray hospital, Vietnam, managers/administrators, nurse teachers, medical doctors, other health care providers, patients and family members which derived from purposeful sampling technique. Content analysis was used for data analysis. Results: Five essential themes of nursing competencies among nurses were identified include (1) knowledge, (2) skills, (3) attitude and value-based nursing practice, (4) legal and ethical competencies, and (5) transcultural competencies. Basic and advanced knowledge were identified as further two dimensions of knowledge. There were five sub themes identified as further dimensions of skills include technical skills, communication skills, organizing and management skills, teamwork and interrelationship, and critical thinking skills. Conclusions: The findings from this study provide valuable information and understanding of the actual competency among nurses in clinical settings in Vietnam. It is expected that this understanding would assist in developing a guide to nursing education and training, nursing practice and relevant policy regulation used for promoting nursing competency among nurses.

Keywords: ethnographic method, nursing competency, qualitative design, Vietnam

Procedia PDF Downloads 259
1611 A Low Power Consumption Routing Protocol Based on a Meta-Heuristics

Authors: Kaddi Mohammed, Benahmed Khelifa D. Benatiallah

Abstract:

A sensor network consists of a large number of sensors deployed in areas to monitor and communicate with each other through a wireless medium. The collected routing data in the network consumes most of the energy of the sensor nodes. For this purpose, multiple routing approaches have been proposed to conserve energy resource at the sensors and to overcome the challenges of its limitation. In this work, we propose a new low energy consumption routing protocol for wireless sensor networks based on a meta-heuristic methods. Our protocol is to operate more fairly energy when routing captured data to the base station.

Keywords: WSN, routing, energy, heuristic

Procedia PDF Downloads 314
1610 Medical and Surgical Nursing Care

Authors: Nassim Salmi

Abstract:

Postoperative mobilization is an important part of fundamental care. Increased mobilization has a positive effect on recovery, but immobilization is still a challenge in postoperative care. Aims: To report how the establishment of a national nursing database was used to measure postoperative mobilization in patients undergoing surgery for ovarian cancer. Mobilization was defined as at least 3 hours out of bed on postoperative day 1, with the goal set at achieving this in 60% of patients. Clinical nurses on 4400 patients with ovarian cancer performed data entry. Findings: 46.7% of patients met the goal for mobilization on the first postoperative day, but variations in duration and type of mobilization were observed. Of those mobilized, 51.8% had been walking in the hallway. A national nursing database creates opportunities to optimize fundamental care. By comparing nursing data with oncological, surgical, and pathology data, it became possible to study mobilization in relation to cancer stage, comorbidity, treatment, and extent of surgery.

Keywords: postoperative care, gynecology, nursing documentation, database

Procedia PDF Downloads 83
1609 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 232
1608 Framework for Explicit Social Justice Nursing Education and Practice: A Constructivist Grounded Theory Research

Authors: Victor Abu

Abstract:

Background: Social justice ideals are considered as the foundation of nursing practice. These ideals are not always clearly integrated into nursing professional standards or curricula. This hinders concerted global nursing agendas for becoming aware of social injustice or engaging in action for social justice to improve the health of individuals and groups. Aim and objectives: The aim was to create an educational framework for empowering nursing students for social justice awareness and action. This purpose was attained by understanding the meaning of social justice, the effect of social injustice, the visibility of social justice learning, and ways of integrating social justice in nursing education and practice. Methods: Critical interpretive methodologies and constructivist grounded theory research designs guided the processes of recruiting nursing students (n = 11) and nurse educators (n = 11) at a London nursing university to participate in interviews and focus groups, which were analysed by coding systems. Findings: Firstly, social justice was described as ethical practices that enable individuals and groups to have good access to health resources. Secondly, social injustice was understood as unfair practices that caused minimal access to resources, social deprivation, and poor health. Thirdly, social justice learning was considered to be invisible in nursing education due to a lack of explicit modules, educator knowledge, and organisational support. Lastly, explicit modules, educating educators, and attracting leaders’ support were suggested as approaches for the visible integration of social justice in nursing education and practice. Discussion: This research proposes approaches for nursing awareness and action for the development of critical active nurse-learner, critical conscious nurse-educator, and servant nurse leader. The framework on Awareness for Social Justice Action (ASJA) created in this research is an approach for empowering nursing students for social justice practices. Conclusion: This research contributes to and advocates for greater nursing scholarship to raise the spotlight on social justice in the profession.

Keywords: social justice, nursing practice, nursing education, nursing curriculum, social justice awareness, social justice action, constructivist grounded theory

Procedia PDF Downloads 16
1607 On Virtual Coordination Protocol towards 5G Interference Mitigation: Modelling and Performance Analysis

Authors: Bohli Afef

Abstract:

The fifth-generation (5G) wireless systems is featured by extreme densities of cell stations to overcome the higher future demand. Hence, interference management is a crucial challenge in 5G ultra-dense cellular networks. In contrast to the classical inter-cell interference coordination approach, which is no longer fit for the high density of cell-tiers, this paper proposes a novel virtual coordination based on the dynamic common cognitive monitor channel protocol to deal with the inter-cell interference issue. A tractable and flexible model for the coverage probability of a typical user is developed through the use of the stochastic geometry model. The analyses of the performance of the suggested protocol are illustrated both analytically and numerically in terms of coverage probability.

Keywords: ultra dense heterogeneous networks, dynamic common channel protocol, cognitive radio, stochastic geometry, coverage probability

Procedia PDF Downloads 297
1606 A Novel Unconditionally Secure and Lightweight Bipartite Key Agreement Protocol

Authors: Jun Liu

Abstract:

This paper introduces a new bipartite key agreement (2PKA) protocol which provides unconditionally security and lightweight. The unconditional security is stemmed from the known impossibility of distinguishing a particular solution from all possible solutions of an underdetermined system of equations. The indistinguishability prevents an adversary from inferring to the common secret-key even with the access to an unlimited amount of computing capability. This new 2PKA protocol is also lightweight because that the calculation of a common secret-key only makes use of simple modular arithmetic. This information-theoretic 2PKA scheme provides the desired features of Key Confirmation (KC), Session Key (SK) security, Know-Key (KK) security, protection of individual privacy, and uniformly distributed value of a common key under prime modulus.

Keywords: bipartite key agreement, information-theoretic cryptography, perfect security, lightweight

Procedia PDF Downloads 29
1605 Baby Boomers and Millennials: Creating a Specialized Orientation Program

Authors: K. Rowan

Abstract:

In this paper, the author will discuss how developing a specialized orientation has improved nursing satisfaction and decrease the incidence of incivility among staff. With the predicted shortages in nursing, we must provide an environment that reflects the needs of the current workforce while also focusing on the sustainability of nursing. Each generation has different qualities and methods in which he or she prefers to learn. The Baby Boomer has a desire to share their knowledge. They feel that the quality of undergraduate nursing education has declined. Millennials have grown up with 'helicopter parents' and expect the preceptor to behave in the same manner. This information must be shared with the Baby Boomer, as it is these staff members who are passing the torch of perioperative nursing. Currently, nurse fellows are trained with the Association of periOperative Nurse’s Periop 101 program, with a didactic and clinical observation program. There is no specialized perioperative preceptor program. In creation of a preceptor program, the concept of Novice to Expert, communication techniques, dealing with horizontal violence and generational gap education is reviewed with the preceptor. The fellows are taught communication and de-escalation skills, and generational gaps information. The groups are then brought together for introductions and teamwork exercises. At the program’s core is the knowledge of generational differences. The preceptor training has increased preceptor satisfaction, as well as the new nurse fellows. The creation of a specialized education program has significantly decreased incivility amongst our nurses, all while increasing nursing satisfaction and improving nursing retention. This model of program can translate to all nursing specialties and assist in overcoming the impending shortage.

Keywords: baby boomers, education, generational gap, millennials, nursing, perioperative

Procedia PDF Downloads 143
1604 The Development of Nursing Model for Pregnant Women to Prevention of Early Postpartum Hemorrhage

Authors: Wadsana Sarakarn, Pimonpan Charoensri, Baliya Chaiyara

Abstract:

Objectives: To study the outcomes of the developed nursing model to prevent early postpartum hemorrhage (PPH). Materials and Methods: The analytical study was conducted in Sunpasitthiprasong Hospital during October 1st, 2015, until May 31st, 2017. After review the prevalence, risk factors, and outcomes of postpartum hemorrhage of the parturient who gave birth in Sunpasitthiprasong Hospital, the nursing model was developed under research regulation of Kemmis&McTaggart using 4 steps of operating procedures: 1) analyzing problem situation and gathering 2) creating the plan 3) noticing and performing 4) reflecting the result of the operation. The nursing model consisted of the screening tools for risk factors associated with PPH, the clinical nursing practice guideline (CNPG), and the collecting bag for measuring postpartum blood loss. Primary outcome was early postpartum hemorrhage. Secondary outcomes were postpartum hysterectomy, maternal mortality, personnel’s practice, knowledge, and satisfaction of the nursing model. The data were analyzed by using content analysis for qualitative data and descriptive statistics for quantitative data. Results: Before using the nursing model, the prevalence of early postpartum hemorrhage was under estimated (2.97%). There were 5 cases of postpartum hysterectomy and 2 cases of maternal death due to postpartum hemorrhage. During the study period, there was 22.7% prevalence of postpartum hemorrhage among 220 pregnant women who were vaginally delivered at Sunpasitthiprasong Hospital. No maternal death or postpartum hysterectomy was reported after using the nursing model. Among 16 registered nurses at the delivery room who evaluated using of the nursing model, they reported the high level of practice, knowledge, and satisfaction Conclusion: The nursing model for the prevention of early PPH is effective to decrease early PPH and other serious complications.

Keywords: the development of a nursing model, prevention of postpartum hemorrhage, pregnant women, postpartum hemorrhage

Procedia PDF Downloads 70
1603 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data

Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda

Abstract:

Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.

Keywords: BGP, BGP hijacking, cybersecurity, detection

Procedia PDF Downloads 51
1602 Signal Strength Based Multipath Routing for Mobile Ad Hoc Networks

Authors: Chothmal

Abstract:

In this paper, we present a route discovery process which uses the signal strength on a link as a parameter of its inclusion in the route discovery method. The proposed signal-to-interference and noise ratio (SINR) based multipath reactive routing protocol is named as SINR-MP protocol. The proposed SINR-MP routing protocols has two following two features: a) SINR-MP protocol selects routes based on the SINR of the links during the route discovery process therefore it select the routes which has long lifetime and low frame error rate for data transmission, and b) SINR-MP protocols route discovery process is multipath which discovers more than one SINR based route between a given source destination pair. The multiple routes selected by our SINR-MP protocol are node-disjoint in nature which increases their robustness against link failures, as failure of one route will not affect the other route. The secondary route is very useful in situations where the primary route is broken because we can now use the secondary route without causing a new route discovery process. Due to this, the network overhead caused by a route discovery process is avoided. This increases the network performance greatly. The proposed SINR-MP routing protocol is implemented in the trail version of network simulator called Qualnet.

Keywords: ad hoc networks, quality of service, video streaming, H.264/SVC, multiple routes, video traces

Procedia PDF Downloads 219
1601 Out of Hospital Cardiac Arrest in Kuala Lumpur: A Mixed Method Study on Incidence, Adherence to Protocol, and Issues

Authors: Mohd Said Nurumal, Sarah Sheikh Abdul Karim

Abstract:

Information regarding out of hospital cardiac arrest incidence include outcome in Malaysia is limited and fragmented. This study aims to identify incidence and adherence to protocol of out of hospital cardiac arrest and also to explore the issues faced by the pre-hospital personnel in regards managing cardiac arrest victim in Kuala Lumpur, Malaysia. A mixed method approach combining the qualitative and quantitative study design was used. The 285 pre-hospital care data sheet of out of hospital cardiac arrest during the year of 2011 were examined by using checklists for identify the incidence and adherence to protocol. Nine semi-structured interviews and two focus group discussions were performed. For the incidence based on the overall out of hospital cardiac arrest cases that occurred in 2011 (n=285), the survival rates were 16.8%. For adherence to protocol, only 89 (41.8%) of the cases adhered to the given protocol and 124 did not adhere to such protocol. The qualitative information provided insight about the issues related to out of hospital cardiac arrest in every aspect. All the relevant qualitative data were merged into few categories relating issues that could affect the management of out of hospital cardiac arrest performed by pre-hospital care team. One of the essential elements in the out of hospital cardiac arrest handling by pre-hospital care is to ensure increase of survival rates and excellent outcomes by adhering to given protocols based on international standard benchmarks. Measures are needed to strengthen the quick activation of the pre-hospital care service, prompt bystander cardiopulmonary resuscitation, early defibrillation and timely advanced cardiac life support and also to tackle all the issues highlighted in qualitative results.

Keywords: pre-hospital care, out of hospital cardiac arrest, incidence, protocol, mixed method research

Procedia PDF Downloads 390
1600 Familiarity with Nursing and Description of Nurses Duties

Authors: Narges Solaymani

Abstract:

medical training of patients. Nursing is a very important profession in the societies of the world. Although in the past, all caregivers of the sick and disabled were called nurses, nowadays, a nurse is a person who has a university education in this field. There are nurses in bachelor's, master's, and doctoral degrees in nursing. New courses have been launched in the master's degree based on duty-oriented nurses. A nurse cannot have an independent treatment center but is a member of the treatment team in established treatment centers such as hospitals, clinics, or offices. Nurses can establish counseling centers and provide nursing services at home. According to the standards, the number of nurses should be three times the number of doctors or twice the number of hospital beds, or there should be three nurses for every thousand people. Also, international standards show that in the internal and surgical department, every 4 to 6 patients should have a nurse.

Keywords: Nurse, Intensive Care, CPR, Bandage

Procedia PDF Downloads 37
1599 Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments

Authors: Ossama Al-Maliki

Abstract:

Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information.

Keywords: NFC, RFID, contactless card, authentication, location, EMV

Procedia PDF Downloads 218
1598 Investigation of Enhanced Recovery After Surgery Protocol Outcome on Post Colectomy Patients

Authors: Sharon Baoas, Toni Beninato, Michael Zenilman, Gokhan Ozuner

Abstract:

Background An enhanced recovery after surgery (ERAS) protocol was implemented to improve quality and cost effectiveness of surgical care in elective colorectal procedures. Results A total of 109 patients, 55 (pre-ERAS) and 54 (post-ERAS) are included in the final analysis. There were no differences in complications were recorded (p = 0.37) and 30-day readmissions (p = 0.785). The mean hospital stay was 5.89 ± 2.62 days in pre-ERAS and 4.94 ± 2.27 days in post-ERAS group which was statistically significant (p = 0.047). Conclusions An ERAS protocol for colorectal surgery harmonised perioperative care and decreased length of stay.

Keywords: 30-day readmission, lenght of stay, Enhanced Recovery after surgery, Surgical site infection

Procedia PDF Downloads 26
1597 Hierarchical Checkpoint Protocol in Data Grids

Authors: Rahma Souli-Jbali, Minyar Sassi Hidri, Rahma Ben Ayed

Abstract:

Grid of computing nodes has emerged as a representative means of connecting distributed computers or resources scattered all over the world for the purpose of computing and distributed storage. Since fault tolerance becomes complex due to the availability of resources in decentralized grid environment, it can be used in connection with replication in data grids. The objective of our work is to present fault tolerance in data grids with data replication-driven model based on clustering. The performance of the protocol is evaluated with Omnet++ simulator. The computational results show the efficiency of our protocol in terms of recovery time and the number of process in rollbacks.

Keywords: data grids, fault tolerance, clustering, chandy-lamport

Procedia PDF Downloads 304
1596 Students’ Perception of Guided Imagery Improving Anxiety before Examination: A Qualitative Study

Authors: Wong Ka Fai

Abstract:

Introduction: Many students are worried before an examination; that is a common picture worldwide. Health problems from stress before examination were insomnia, tiredness, isolation, stomach upset, and anxiety. Nursing students experienced high stress from the examination. Guided imagery is a healing process of applying imagination to help the body heal, survive, or live well. It can bring about significant physiological and biochemical changes, which can trigger the recovery process. A study of nursing students improving their anxiety before examination with guided imagery was proposed. Aim: The aim of this study was to explore the outcome of guided imagery on nursing students’ anxiety before examination in Hong Kong. Method: The qualitative study method was used. 16 first-year students studying nursing programme were invited to practice guided imagery to improve their anxiety before the examination period. One week before the examination, the semi-structured interviews with these students were carried out by the researcher. Result: From the content analysis of interview data, these nursing students showed considerable similarities in their anxiety perception. Nursing students’ perceived improved anxiety was evidenced by a reduction of stressful feelings, improved physical health, satisfaction with daily activities, and enhanced skills for solving problems and upcoming situations. Conclusion: This study indicated that guided imagery can be used as an alternative measure to improve students’ anxiety and psychological problems.

Keywords: nursing students, perception, anxiety, guided imagery

Procedia PDF Downloads 47
1595 Adaptive Routing Protocol for Dynamic Wireless Sensor Networks

Authors: Fayez Mostafa Alhamoui, Adnan Hadi Mahdi Al- Helali

Abstract:

The main issue in designing a wireless sensor network (WSN) is the finding of a proper routing protocol that complies with the several requirements of high reliability, short latency, scalability, low power consumption, and many others. This paper proposes a novel routing algorithm that complies with these design requirements. The new routing protocol divides the WSN into several sub-networks and each sub-network is divided into several clusters. This division is designed to reduce the number of radio transmission and hence decreases the power consumption. The network division may be changed dynamically to adapt with the network changes and allows the realization of the design requirements.

Keywords: wireless sensor networks, routing protocols, AD HOC topology, cluster, sub-network, WSN design requirements

Procedia PDF Downloads 507
1594 The Impact of E-Learning on Medication Administration of Nursing Students

Authors: Z. Karakus, Z. Ozer

Abstract:

Nurses are responsible for the care and treatment of individuals, as well as health maintenance and education. Medication administration is an important part of health promotion. The administration of a medicine is a common but important clinical procedure for nurses because of its complex structure. Therefore, medication errors are inevitable for nurses or nursing students. Medication errors can cause ineffective treatment, patient’s prolonged hospital stay, disablement, or death. Additionally, medication errors affect the global economy adversely by increasing health costs. Hence, preventing or decreasing of medication errors is a critical and essential issue in nursing. Nurse educators are in pursuit of new teaching methods to teach students significance of medication application. In the light of technological developments of this age, e-learning has started to be accepted as an important teaching method. E-learning is the use of electronic media and information and communication technologies in education. It has advantages such as flexibility of time and place, lower costs, faster delivery, and lower environmental impact. Students can make their own schedule and decide the learning method. This study is conducted to determine the impact of e-learning on medication administration of nursing students.

Keywords: e-learning, medication administration, nursing, nursing students

Procedia PDF Downloads 228
1593 Simple Modified Method for DNA Isolation from Lyophilised Cassava Storage Roots (Manihot esculenta Crantz.)

Authors: P. K. Telengech, K. Monjero, J. Maling’a, A. Nyende, S. Gichuki

Abstract:

There is need to identify an efficient protocol for use in extraction of high quality DNA for purposes of molecular work. Cassava roots are known for their high starch content, polyphenols and other secondary metabolites which interfere with the quality of the DNA. These factors have negative interference on the various methodologies for DNA extraction. There is need to develop a simple, fast and inexpensive protocol that yields high quality DNA. In this improved Dellaporta method, the storage roots are lyophilized to reduce the water content; the extraction buffer is modified to eliminate the high polyphenols, starch and wax. This simple protocol was compared to other protocols intended for plants with similar secondary metabolites. The method gave high yield (300-950ng) and pure DNA for use in PCR analysis. This improved Dellaporta protocol allows isolation of pure DNA from starchy cassava storage roots.

Keywords: cassava storage roots, dellaporta, DNA extraction, lyophilisation, polyphenols secondary metabolites

Procedia PDF Downloads 313
1592 Experimental Evaluation of UDP in Wireless LAN

Authors: Omar Imhemed Alramli

Abstract:

As Transmission Control Protocol (TCP), User Datagram Protocol (UDP) is transfer protocol in the transportation layer in Open Systems Interconnection model (OSI model) or in TCP/IP model of networks. The UDP aspects evaluation were not recognized by using the pcattcp tool on the windows operating system platform like TCP. The study has been carried out to find a tool which supports UDP aspects evolution. After the information collection about different tools, iperf tool was chosen and implemented on Cygwin tool which is installed on both Windows XP platform and also on Windows XP on virtual box machine on one computer only. Iperf is used to make experimental evaluation of UDP and to see what will happen during the sending the packets between the Host and Guest in wired and wireless networks. Many test scenarios have been done and the major UDP aspects such as jitter, packet losses, and throughput are evaluated.

Keywords: TCP, UDP, IPERF, wireless LAN

Procedia PDF Downloads 324
1591 Nurses' and Patients’ Perception about Care: A Comparative Study

Authors: Evangelia Kotrotsiou, Mairy Gouva, Theodosios Paralikas, Maria Fiaka, Styliani Kotrotsiou, Maria Malliarou

Abstract:

The purpose of this research is to investigate the way nurses perceive the care provided in comparison to the way patients perceive it, taking into account existing literature. As far as the sample of research is concerned, it has come from the population of nurses working in the General Hospital of Thessaloniki, St. Paul and the patients of its surgical clinic. In the present study, the sample consists of 100 nurses and 88 patients. The questionnaire used was the Caring Nurse-Patient Interactions Scale: 23-Item Version, created by Cossette et al. (2006). In the case of both patients and nurses, a high score was observed in relational care in the case of the frequency of nursing care in daily practice, as well as the satisfaction of providing nursing care. Overall, patients rated higher clinical care in the case of the frequency of nursing care in daily practice, as well as the satisfaction of the clinical care they were given. On the other hand, nurses rated higher comfort care in the case of the frequency of nursing care in everyday practice, as well as relational care in the area of the importance of nursing care in everyday practice.

Keywords: nursing care, patient needs, patient satisfaction, care giving

Procedia PDF Downloads 359
1590 Robotic Assistance in Nursing Care: Survey on Challenges and Scenarios

Authors: Pascal Gliesche, Kathrin Seibert, Christian Kowalski, Dominik Domhoff, Max Pfingsthorn, Karin Wolf-Ostermann, Andreas Hein

Abstract:

Robotic assistance in nursing care is an increasingly important area of research and development. Facing a shortage of labor and an increasing number of people in need of care, the German Nursing Care Innovation Center (Pflegeinnovationszentrum, PIZ) aims to address these challenges from the side of technology. Little is known about nurses experiences with existing robotic assistance systems. Especially nurses perspectives on starting points for the development of robotic solutions, that target recurring burdensome tasks in everyday nursing care, are of interest. This paper presents findings focusing on robotics resulting from an explanatory mixed-methods study on nurses experiences with and their expectations for innovative technologies in nursing care in stationary and ambulant care facilities and hospitals in Germany. Based on the findings, eight scenarios for robotic assistance are identified based on the real needs of practitioners. An initial system addressing a single use-case is described to show perspectives for the use of robots in nursing care.

Keywords: robotics and automation, engineering management, engineering in medicine and biology, medical services, public health-care

Procedia PDF Downloads 126
1589 The Effectiveness of Self-Compassion Training: A Field Trial Study

Authors: Esmaeil Sarikhani

Abstract:

Objectives: Considering the importance of introducing new methods of improving self-compassion and compassion to the others in nursing students, this study intends to evaluate the effect of self-compassion training on nursing students. Methods: This is a field trial study in which 52 nursing interns from Isfahan University of Medical Sciences were selected using convenience sampling method and divided in two experimental and control groups. The sampling was done during two phases: before and after the intervention. The intervention consisted of eight sessions over eight weeks of self-compassion training. The data were collected using the self-compassion standard questionnaire with 26 questions before and after the intervention. Data were then analyzed by the SPSS18 software and independent and paired T-tests, and also Chi-square and Mann-Whitney tests. Results: The results obtained from the independent t-test showed that the mean score of self-compassion and its components in the experimental group was significantly increased compared to the control group (p < 0.001). Comparing the groups, the mean overall score difference of self-compassion and its components had also a statistically significant change after the intervention (p < 0.001). Conclusion: Self-compassion training program, leads to improving nursing students' self-compassion. As it seems, this method can be used as an important training course in order to improve compassion of nursing students to themselves and the others.

Keywords: self-compassion, student, nursing students, field trial

Procedia PDF Downloads 261
1588 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 267
1587 Disaster Nursing Competency of Nurses in Surattani Province, Thailand: A Factor Analysis

Authors: Rungnapa Chantra

Abstract:

As health care rapidly changes, the nursing profession is also evolving to improve quality of care while maintaining competency in their practice. The purpose of this study was to investigate the factors of disaster nurse competencies and investigate the predictable variables in disaster nurse competencies in Suratthani Province, Thailand. The sample consisted of 305 nurses who were recruited by simple random sampling. The development questionnaires from ICN Framework and research contains Pre/Mitigation, Preparedness, Response and Recovery/Rehabilitation Competencies (α=0.87). The data were analyzed using Principle Components Extraction and Orthogonal Rotation with Varimax Method. The findings were as follows; four significant factors of disaster nurse competencies in Suratthani Province, Thailand were identified. These factors were described by 62 variables that accounted for 50.01% of the total variance. The results of this study could be for agencies that are responsible for the development of nursing competencies and should be aware of the development of knowledge and skills in disaster management.

Keywords: disaster nursing competency of nurses, nursing informatics, health science, medical

Procedia PDF Downloads 330
1586 Factors Associated with Skin Injuries Due to the Use of N95 Masks among Brazilian Nursing Professionals

Authors: Elucir Gir, Laelson Rochelle Milanês Sousa, Renata Karina Reis, Soraia Assad Nasbine Rabeh, Mayra Gonçalves Menegueti, Ana Cristina de Oliveira e Silva, Sheila Araújo Teles

Abstract:

Context and significance: Nursing team professionals faced challenges in combating the COVID-19 pandemic around the world. They were subjected to exhausting workloads and prolonged use of Personal Protective Equipment. Using N95 masks for long periods of time can cause skin changes. In this context, health professionals who worked on the front lines of fighting the pandemic were more exposed to possible physical and psychological changes. Objective: The aim of the study was to analyze the factors associated with skin lesions resulting from the use of N95 masks among nursing team professionals. Method: The study was carried out in all regions of Brazil from October to December 2020, with professionals from the nursing team who worked in health care during the COVID-19 pandemic. Participants were recruited via social media, and information was collected electronically and stored on the Survey Monkey platform. Descriptive statistics were used to characterize the sample, association tests (Chi-square), with a statistical significance level of p < 0.05. Factors associated with skin lesions resulting from the use of an N95 mask were determined by Binary Logistic Regression, with a significance level of 5% (α = 0.05). Results: 8,405 nursing professionals participated in the study, 5,492 nurses (65.3%), 2,747 nursing technicians (32.7%), and 7,084 females (84.3%). Female nursing team professionals were 1.4 times more likely to develop skin lesions due to the use of N95 masks when compared to males (OR 1.4 [CI95% 1.22 – 1.59] p < 0.001). The following protective factors were identified: nursing technician (ORA 0.608 [CI95% 0.43 – 0.86] p = 0.005) and not having provided assistance in field hospitals for COVID-19 (0.73 [CI95% 0.65-0.81] p<0.000). Conclusion: It was concluded that female nursing team professionals were more likely to have skin changes related to the use of N95 masks. The need for intervention studies is emphasized in order to explore measures to prevent these types of injuries. Descritores: Nursing professionals; COVID-19; SARS-CoV-2; Brazil.

Keywords: nursing professionals, COVID-19, SARS-CoV-2, Brazil

Procedia PDF Downloads 43
1585 Data Rate Based Grouping Scheme for Cooperative Communications in Wireless LANs

Authors: Sunmyeng Kim

Abstract:

IEEE 802.11a/b/g standards provide multiple transmission rates, which can be changed dynamically according to the channel condition.Cooperative communications we reintroduced to improve the overallperformance of wireless LANs with the help of relay nodes with higher transmission rates. The cooperative communications are based on the fact that the transmission is much faster when sending data packets to a destination node through a relay node with higher transmission rate, rather than sending data directly to the destination node at low transmission rate. To apply the cooperative communications in wireless LAN, several MAC protocols have been proposed. Some of them can result in collisions among relay nodes in a dense network. In order to solve this problem, we propose a new protocol. Relay nodes are grouped based on their transmission rates. And then, relay nodes only in the highest group try to get channel access. Performance evaluation is conducted using simulation, and shows that the proposed protocol significantly outperforms the previous protocol in terms of throughput and collision probability.

Keywords: cooperative communications, MAC protocol, relay node, WLAN

Procedia PDF Downloads 444
1584 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 259