8,587 research outputs found

    Using the Theory of Fundamental Causes to Show the Potential Effects of Socioeconomic Status on Surgical Outcomes

    Full text link
    Surgical procedures are both costly and common. There are large differences in surgical outcomes both within and between hospitals based on patient characteristics such as measures of income. In both 2000 and 2009, patients residing in low-income communities had worse morbidity and mortality rates, across a wide range of quality indicators. In this review, the author will explicate the Theory of Fundamental Causes as it relates to surgical care, review key empirical findings and address potential limitations of the theory. This review will provide a platform for researchers to discuss current research in surgical disparities using the Theory of Fundamental Causes and help guide an agenda for future research

    A new sinkhole attack detection algorithm for RPL in wireless sensor networks (WSN)

    Get PDF
    With the continuous improvement of science and technology, wireless sensor network technology has gradually been widely used, and provides great convenience for people's living, but with the continuous improvement of the degree of application, wireless sensor network security issues also enter people's field of vision. Sensor nodes can be used for continuous sensing, event recognition and event identification. 6LoWPAN plays an important role in this convergence of heterogeneous technologies, which allows sensors to transmit information using IPv6 stack. Sensors perform critical tasks and become targets of attacks. Sinkhole attack is one of the most common attacks to sensor networks, threatening the network availability by dropping data or disturbing routing paths. RPL is a standard routing protocol commonly used in sensor networks. Therefore, this research presents the works in designing and developing Secured-RPL using the eave-listening concept (overhearing) to treating sinkhole attack. The suggested mechanism method could determine transmitted packages then overhear to the received packet, meaning that the node can overhearing to the neighbor node. Furthermore, three different simulation scenarios were applied, which are the scenario without attacker nodes, scenario with attacker nodes and the scenario with attacker and security by using Cooja simulator to Measurement and analysis performance of RPL in terms of packet delivery ratio (PDR) and power consumption over different packet transmission rate. The experimental results show that the proposed recognition method can identify sinkholes attack effectively and with less storage cost under various wireless sensor networks. Where the optimization ratio of the PDR in scenario with attacker node with the security was close to the scenario with a normal node

    Proceedings of CGAMES’2006

    Get PDF
    In this paper we present our work towards the development of an online learning and adaptation architecture for non-player characters (NPCs) (agents) in first person shooter (FPS) computer games. We will outline the development of our case storage and retrieval method, which uses an adaptive k-d tree based approach and discuss the issues related to employing this technique for online storage and retrieval of cases. We conclude by evaluating the performance of the developed data structures and discussing results
    • …
    corecore