Objectives: During the COVID-19 pandemic, our mental health service experimented with working from home. The flexibility of this practice can enable improved efficiency, staff well-being and expanded operating hours in the longer term. This paper shares our experiences and makes recommendations for being a part of and leading distributed clinical teams. Conclusions: We saw a 3% increase in total appointment bookings and a 7% reduction in cancellations/non-attendance compared to the same period in 2019. Based on our experience and the literature, effective distributed teams have leaders that connect via video at least weekly; focus on transparency and output over micromanagement; prioritise staff relationships and err towards overcommunication.
Mobile Ad Hoc Networks are wireless networks which comprise of mobile nodes that communicate over wireless media. Frequent link failures may occur in these networks due to mobility, energy depletion of node, transmission interference. Link failure leads to disconnectivity among nodes in the network and hinders ongoing data transmission. Traditional routing protocols provide best effort service in transporting data from source to destination. They are not designed to handle link failures that may arise sporadically. This paper proposes a node-disjoint routing technique NDj-AODV that discovers multiple nodedisjoint routes to the destination. The proposed technique can be used for load balancing, QoS based routing, and more specifically for performing energy aware routing. We overhaul AODV route discovery and maintenance procedures to find multiple nodedisjoint routes to destination. Our protocol does not use the path accumulation feature employed by most node-disjoint routing techniques rather it exploits the concept of overhearing in wireless medium to distinguish between two paths as node-disjoint. Simulation results obtained using ns-2.34 simulator show efficiency of our technique in terms of finding several node disjoint routes with a minimal routing overhead and high percentage of data packet delivery ratios and reduced average end-to-end delays.
Mobile ad hoc networks are wireless networks with no fixed infrastructure. They contain mobile nodes that communicate over multi-hop wireless links. However, nodes in MANETs are powered by limited supply of battery energy. Therefore, efficient energy conservation is of prime importance for the overall functioning of an ad hoc network. Many energy-aware routing protocols have been developed, which aim at achieving energy efficiency via routing procedures. Various mechanisms have been developed, which maximize the lifetime of nodes and in overall the network lifetime. In this paper, we study recent mechanisms and protocols proposed which provide energy conservation in mobile ad hoc networks.
Cloud computing has emerged as a new promising field in the internet. It can be thought as a new architecture for the next generation of IT enterprises. It allows the user to access virtualized resources over the internet which can be dynamically scaled. Here, the owner's data is stored at a distributed data centre, which are responsible for its security constraints such as access control and data transmission to user. As the owner does not have physical access on their own data, the data centres are not trustworthy, this resulted in the cloud data security demand. Today, many cloud service providers (CSPs) are using the asymmetric and public key cryptography (PKG) for authenticating and data security purposes using the digital identity of the user. To this end, this article focuses on cloud data storage and its delivery to authorized user. For this purpose, a hierarchal identity-based cryptography method is used for data security and checking the data integrity, in order to make sure that there is no alteration or modification done by a malicious attacker or CSP for its own benefit.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.