WorldWideScience

Sample records for antineoplastic protocols

  1. Hypersensitivity and desensitization to antineoplastic agents: outcomes of 189 procedures with a new short protocol and novel diagnostic tools assessment.

    Science.gov (United States)

    Madrigal-Burgaleta, R; Berges-Gimeno, M P; Angel-Pereira, D; Ferreiro-Monteagudo, R; Guillen-Ponce, C; Pueyo, C; Gomez de Salazar, E; Alvarez-Cuesta, E

    2013-07-01

    Desensitization to antineoplastic agents is becoming a standard of care. Efforts to establish and improve these techniques are being made at many institutions. Our aims are to evaluate a new rapid desensitization protocol designed to be shorter (approximately 4 h) and safer (reducing hazardous drugs exposure risks) and to assess the oxaliplatin-specific immunoglobulin E (IgE) as a novel diagnostic tool. Prospective, observational, longitudinal study with patients who, for a 1-year period, suffered reactions to antineoplastic agents and were referred to the Desensitization Program at Ramon y Cajal University Hospital (RCUH). Patients were included or excluded as desensitization candidates after anamnesis, skin testing, risk assessment, and graded challenge. Specific IgE was determined in oxaliplatin-reactive patients. Candidate patients were desensitized using the new RCUH rapid desensitization protocol. Of 189 intravenous rapid desensitizations, 188 were successfully accomplished in the 23 patients who met inclusion criteria for desensitization (of 58 referred patients). No breakthrough reactions occurred in 94% of desensitizations, and most breakthrough reactions were mild. In 10 oxaliplatin-reactive patients, 38 desensitizations were successfully accomplished. Sensitivity for oxaliplatin-specific IgE was 38% (0.35UI/l cutoff point) and 54% (0.10UI/l cutoff point); specificity was 100% for both cutoff points. In the hands of a Desensitization Program, managed by drug desensitization experts, this new protocol has proven an effective therapeutic tool for hypersensitivity to several antineoplastic agents (oxaliplatin, carboplatin, paclitaxel, docetaxel, cyclophosphamide, and rituximab); moreover, it improves safety handling of hazardous drugs. We report the first large series of oxaliplatin desensitizations. Oxaliplatin-specific IgE determination could be helpful. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  2. A study protocol for the evaluation of occupational mutagenic/carcinogenic risks in subjects exposed to antineoplastic drugs: a multicentric project

    Directory of Open Access Journals (Sweden)

    Gelatti Umberto

    2011-03-01

    Full Text Available Abstract Background Some industrial hygiene studies have assessed occupational exposure to antineoplastic drugs; other epidemiological investigations have detected various toxicological effects in exposure groups labeled with the job title. In no research has the same population been studied both environmentally and epidemiologically. The protocol of the epidemiological study presented here uses an integrated environmental and biological monitoring approach. The aim is to assess in hospital nurses preparing and/or administering therapy to cancer patients the current level of occupational exposure to antineoplastic drugs, DNA and chromosome damage as cancer predictive effects, and the association between the two. Methods/Design About 80 healthy non-smoking female nurses, who job it is to prepare or handle antineoplastic drugs, and a reference group of about 80 healthy non-smoking female nurses not occupationally exposed to chemicals will be examined simultaneously in a cross-sectional study. All the workers will be recruited from five hospitals in northern and central Italy after their informed consent has been obtained. Evaluation of surface contamination and dermal exposure to antineoplastic drugs will be assessed by determining cyclophosphamide on selected surfaces (wipes and on the exposed nurses' clothes (pads. The concentration of unmetabolized cyclophosphamide as a biomarker of internal dose will be measured in end-shift urine samples from exposed nurses. Biomarkers of effect and susceptibility will be assessed in exposed and unexposed nurses: urinary concentration of 8-hydroxy-2-deoxyguanosine; DNA damage detected using the single-cell microgel electrophoresis (comet assay in peripheral white blood cells; micronuclei and chromosome aberrations in peripheral blood lymphocytes. Genetic polymorphisms for enzymes involved in metabolic detoxification (i.e. glutathione S-transferases will also be analysed. Using standardized questionnaires

  3. Antineoplastic Drugs

    Science.gov (United States)

    Sadée, Wolfgang; El Sayed, Yousry Mahmoud

    The limited scope of therapeutic drug-level monitoring in cancer chemotherapy results from the often complex biochemical mechanisms that contribute to antineoplastic activity and obscure the relationships among drug serum levels and therapeutic benefits. Moreover, new agents for cancer chemotherapy are being introduced at a more rapid rate than for the treatment of other diseases, although the successful application of therapeutic drug-level monitoring may require several years of intensive study of the significance of serum drug levels. However, drug level monitoring can be of considerable value during phase I clinical trials of new antineoplastic agents in order to assess drug metabolism, bioavailability, and intersubject variability; these are important parameters in the interpretation of clinical studies, but have no immediate benefit to the patient. High performance liquid chromatography (HPLC) probably represents the most versatile and easily adaptable analytical technique for drug metabolite screening (1). HPLC may therefore now be the method of choice during phase I clinical trials of antineoplastic drugs. For example, within a single week we developed an HPLC assay—using a C18 reverse-phase column, UV detection, and direct serum injection after protein precipitation—for the new radiosensitizer, misonidazole (2).

  4. Occupational rhinosinusitis due to etoposide, an antineoplastic agent

    DEFF Research Database (Denmark)

    Meyer, Harald W; Skov, Per Stahl

    2010-01-01

    This paper reports a rare case of an occupational hypersensitivity reaction to an antineoplastic agent.......This paper reports a rare case of an occupational hypersensitivity reaction to an antineoplastic agent....

  5. Exposure to antineoplastic drugs outside the hospital environment.

    Science.gov (United States)

    Meijster, T; Fransman, W; Veldhof, R; Kromhout, H

    2006-10-01

    The objectives were (i) to identify occupational populations outside hospitals working with antineoplastic drugs, (ii) to determine the size of the populations 'at risk', (iii) to identify major determinants and routes of exposure outside hospitals and (iv) to estimate exposure levels and frequencies relative to levels found in hospitals. The survey consisted of two phases; (i) identification of activities with potential exposure to antineoplastic drugs by literature review, interviews, questionnaires and workplace visits, (ii) exploratory measurements of exposure and surface contamination in selected sectors. Eight sectors were identified with potential exposure to antineoplastic drugs: pharmaceutical industry, pharmacies, universities, veterinary medicine, nursing homes, home care, laundry facilities, and waste treatment. Four sectors were of primary concern: veterinary medicine, home care, nursing homes and industrial laundries. The populations potentially exposed in these sectors vary considerably (from several tens to thousands of workers), as do their levels of exposure. Exposure measurements collected in the veterinary medicine sector showed that workers are indeed exposed to antineoplastic drugs and, in some cases (on gloves after administration), levels were 15 times higher than levels measured during administration in hospitals. Workers sorting contaminated hospital laundry in industrial laundry facilities were exposed to antineoplastic drugs through inhalation. For the home care and nursing homes sectors the highest exposure levels were found when cleaning toilets and washing treated patients. These two sectors are expected to have the largest exposed population (5,000-10,000 individuals). This study has resulted in a comprehensive overview of populations with potential exposure to antineoplastic drugs. Exposure levels can potentially be high compared with the hospital environment, because exposure routes are complex and awareness of the hazard (and

  6. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  7. Glycaemic adverse drug reactions from anti-neoplastics used in ...

    African Journals Online (AJOL)

    235625 records ... Glycaemic adverse drug reactions from anti-neoplastics used in treating pancreatic cancer. ... Based on the emphasized nine antineoplastic drugs with high hyperglycemic ADR incidence, we found: fluorouracil, sorafenib and pemetrexed with high ADR record of metabolism and nutrition disorders; ...

  8. Antineoplastic treatment of patients with renal insufficiency

    International Nuclear Information System (INIS)

    Rajec, J.; Mego, M.; Rajec, J.

    2011-01-01

    Kidneys are the main route of elimination for many antineoplastic drugs and their metabolites. The kidney dysfunction may lead to the drug cumulation in organism with the resulting increased systemic toxicity. A lot of used cytostatics requires a dose modification at different levels of renal insufficiency. Due to the lack of data from clinical trials, the limiting of systemic toxicity is difficult especially in patients with severe renal impairment or patients undergoing chronic hemodialysis. The following article is focused on the preventive strategies dealing with recommended dosing modification of various antineoplastic agents in patients with renal insufficiency. (author)

  9. Tumor targeting using liposomal antineoplastic drugs

    Directory of Open Access Journals (Sweden)

    Jörg Huwyler

    2008-03-01

    Full Text Available Jörg Huwyler1, Jürgen Drewe2, Stephan Krähenbühl21University of Applied Sciences Northwestern Switzerland, Institute of Pharma Technology, Muttenz, Switzerland; 2Department of Research and Division of Clinical Pharmacology, University Hospital Basel, Basel, SwitzerlandAbstract: During the last years, liposomes (microparticulate phospholipid vesicles have beenused with growing success as pharmaceutical carriers for antineoplastic drugs. Fields of application include lipid-based formulations to enhance the solubility of poorly soluble antitumordrugs, the use of pegylated liposomes for passive targeting of solid tumors as well as vector-conjugated liposomal carriers for active targeting of tumor tissue. Such formulation and drug targeting strategies enhance the effectiveness of anticancer chemotherapy and reduce at the same time the risk of toxic side-effects. The present article reviews the principles of different liposomal technologies and discusses current trends in this field of research.Keywords: tumor targeting, antineoplastic drugs, liposomes, pegylation, steric stabilization, immunoliposomes

  10. Antineoplastic drugs: Occupational exposure and health risks

    NARCIS (Netherlands)

    Fransman, W.

    2006-01-01

    Antineoplastic drugs are pharmaceuticals commonly used to treat cancer (and some non-neoplastic diseases), which are generally referred to as 'chemotherapy'. Oncology nurses are exposed to these drugs via the skin of hands during daily nursing activities, even when protective gloves are being used.

  11. Impact of Robotic Antineoplastic Preparation on Safety, Workflow, and Costs

    Science.gov (United States)

    Seger, Andrew C.; Churchill, William W.; Keohane, Carol A.; Belisle, Caryn D.; Wong, Stephanie T.; Sylvester, Katelyn W.; Chesnick, Megan A.; Burdick, Elisabeth; Wien, Matt F.; Cotugno, Michael C.; Bates, David W.; Rothschild, Jeffrey M.

    2012-01-01

    Purpose: Antineoplastic preparation presents unique safety concerns and consumes significant pharmacy staff time and costs. Robotic antineoplastic and adjuvant medication compounding may provide incremental safety and efficiency advantages compared with standard pharmacy practices. Methods: We conducted a direct observation trial in an academic medical center pharmacy to compare the effects of usual/manual antineoplastic and adjuvant drug preparation (baseline period) with robotic preparation (intervention period). The primary outcomes were serious medication errors and staff safety events with the potential for harm of patients and staff, respectively. Secondary outcomes included medication accuracy determined by gravimetric techniques, medication preparation time, and the costs of both ancillary materials used during drug preparation and personnel time. Results: Among 1,421 and 972 observed medication preparations, we found nine (0.7%) and seven (0.7%) serious medication errors (P = .8) and 73 (5.1%) and 28 (2.9%) staff safety events (P = .007) in the baseline and intervention periods, respectively. Drugs failed accuracy measurements in 12.5% (23 of 184) and 0.9% (one of 110) of preparations in the baseline and intervention periods, respectively (P < .001). Mean drug preparation time increased by 47% when using the robot (P = .009). Labor costs were similar in both study periods, although the ancillary material costs decreased by 56% in the intervention period (P < .001). Conclusion: Although robotically prepared antineoplastic and adjuvant medications did not reduce serious medication errors, both staff safety and accuracy of medication preparation were improved significantly. Future studies are necessary to address the overall cost effectiveness of these robotic implementations. PMID:23598843

  12. Mesenchymal Stromal Cells for Antineoplastic Drug Loading and Delivery.

    Science.gov (United States)

    Petrella, Francesco; Rimoldi, Isabella; Rizzo, Stefania; Spaggiari, Lorenzo

    2017-11-23

    Mesenchymal stromal cells are a population of undifferentiated multipotent adult cells possessing extensive self-renewal properties and the potential to differentiate into a variety of mesenchymal lineage cells. They express broad anti-inflammatory and immunomodulatory activity on the immune system and after transplantation can interact with the surrounding microenvironment, promoting tissue healing and regeneration. For this reason, mesenchymal stromal cells have been widely used in regenerative medicine, both in preclinical and clinical settings. Another clinical application of mesenchymal stromal cells is the targeted delivery of chemotherapeutic agents to neoplastic cells, maximizing the cytotoxic activity against cancer cells and minimizing collateral damage to non-neoplastic tissues. Mesenchymal stem cells are home to the stroma of several primary and metastatic neoplasms and hence can be used as vectors for targeted delivery of antineoplastic drugs to the tumour microenvironment, thereby reducing systemic toxicity and maximizing antitumour effects. Paclitaxel and gemcitabine are the chemotherapeutic drugs best loaded by mesenchymal stromal cells and delivered to neoplastic cells, whereas other agents, like pemetrexed, are not internalized by mesenchymal stromal cells and therefore are not suitable for advanced antineoplastic therapy. This review focuses on the state of the art of advanced antineoplastic cell therapy and its future perspectives, emphasizing in vitro and in vivo preclinical results and future clinical applications.

  13. Investigation of antineoplastic activity of chewing tablets based on dry oat extract and quercetin

    Directory of Open Access Journals (Sweden)

    Ярослав Ростиславович Андрійчук

    2015-07-01

    Full Text Available One of the main goals of domestic pharmaceutical science is development of new medicines. Thus, new tablet drug was created based on dry oat extract and quercetin. Investigation of antineoplastic activity was performed. Antineoplastic activity of investigational drug based on dry oat extract and quercetin was experimentally proved.

  14. 75 FR 57044 - NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2010

    Science.gov (United States)

    2010-09-17

    ... identified 24 drugs that fit the NIOSH definition of hazardous drugs. The second draft list also proposed... Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2010 AGENCY: National Institute for Occupational... publication of the following document entitled ``NIOSH List of Antineoplastic and Other Hazardous Drugs in...

  15. Delving into cornerstones of hypersensitivity to antineoplastic and biological agents: value of diagnostic tools prior to desensitization.

    Science.gov (United States)

    Alvarez-Cuesta, E; Madrigal-Burgaleta, R; Angel-Pereira, D; Ureña-Tavera, A; Zamora-Verduga, M; Lopez-Gonzalez, P; Berges-Gimeno, M P

    2015-07-01

    Evidence regarding drug provocation test (DPT) with antineoplastic and biological agents is scarce. Our aim was to assess the usefulness of including DPT as a paramount gold standard diagnostic tool (prior to desensitization). Prospective, observational, longitudinal study with patients who, during a 3-year period, were referred to the Desensitization Program at Ramon y Cajal University Hospital. Patients underwent a structured diagnostic protocol by means of anamnesis, skin tests (ST), risk assessment, and DPT. Oxaliplatin-specific IgE was determined in oxaliplatin-reactive patients (who underwent DPT regardless of oxaliplatin-specific IgE results). Univariate analysis and multivariate analysis were used to identify predictors of the final diagnosis among several variables. A total of 186 patients were assessed. A total of 104 (56%) patients underwent DPT. Sixty-four percent of all DPTs were negative (i.e., hypersensitivity was excluded). Sensitivity for oxaliplatin-specific IgE (0.35 UI/l cutoff point) was 34%, specificity 90.3%, negative predictive value 45.9%, positive predictive value 85%, negative likelihood ratio 0.7, and positive likelihood ratio 3.5. These are the first reported data based on more than 100 DPTs with antineoplastic and biological agents (paclitaxel, oxaliplatin, rituximab, infliximab, irinotecan, and other drugs). Implementation of DPT in diagnostic protocols helps exclude hypersensitivity (in 36% of all referred patients), and avoids unnecessary desensitizations in nonhypersensitive patients (30-56% of patients, depending on culprit-drug). Drug provocation test is vital to validate diagnostic tools; consequently, quality data are shown on oxaliplatin-specific IgE and oxaliplatin-ST in the largest series of oxaliplatin-reactive patients reported to date (74 oxaliplatin-reactive patients). Identifying phenotypes and predictors of a diagnosis of hypersensitivity may be helpful for tailored plans. © 2015 John Wiley & Sons A/S. Published by

  16. Does applying technology throughout the medication use process improve patient safety with antineoplastics?

    Science.gov (United States)

    Bubalo, Joseph; Warden, Bruce A; Wiegel, Joshua J; Nishida, Tess; Handel, Evelyn; Svoboda, Leanne M; Nguyen, Lam; Edillo, P Neil

    2014-12-01

    Medical errors, in particular medication errors, continue to be a troublesome factor in the delivery of safe and effective patient care. Antineoplastic agents represent a group of medications highly susceptible to medication errors due to their complex regimens and narrow therapeutic indices. As the majority of these medication errors are frequently associated with breakdowns in poorly defined systems, developing technologies and evolving workflows seem to be a logical approach to provide added safeguards against medication errors. This article will review both the pros and cons of today's technologies and their ability to simplify the medication use process, reduce medication errors, improve documentation, improve healthcare costs and increase provider efficiency as relates to the use of antineoplastic therapy throughout the medication use process. Several technologies, mainly computerized provider order entry (CPOE), barcode medication administration (BCMA), smart pumps, electronic medication administration record (eMAR), and telepharmacy, have been well described and proven to reduce medication errors, improve adherence to quality metrics, and/or improve healthcare costs in a broad scope of patients. The utilization of these technologies during antineoplastic therapy is weak at best and lacking for most. Specific to the antineoplastic medication use system, the only technology with data to adequately support a claim of reduced medication errors is CPOE. In addition to the benefits these technologies can provide, it is also important to recognize their potential to induce new types of errors and inefficiencies which can negatively impact patient care. The utilization of technology reduces but does not eliminate the potential for error. The evidence base to support technology in preventing medication errors is limited in general but even more deficient in the realm of antineoplastic therapy. Though CPOE has the best evidence to support its use in the

  17. 77 FR 38297 - Revised Document Posted: NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare...

    Science.gov (United States)

    2012-06-27

    ... removed 15 drugs from the 2012 list because they did not meet the NIOSH definition, were no longer... NIOSH-033-A] Revised Document Posted: NIOSH List of Antineoplastic and Other Hazardous Drugs in... of the following document entitled ``NIOSH List of Antineoplastic and Other Hazardous Drugs in...

  18. Association between occupational exposure levels of antineoplastic drugs and work environment in five hospitals in Japan.

    Science.gov (United States)

    Yoshida, Jin; Koda, Shigeki; Nishida, Shozo; Yoshida, Toshiaki; Miyajima, Keiko; Kumagai, Shinji

    2011-03-01

    The aim of the present study was to evaluate the measurement of contamination by antineoplastic drugs for safer handling of such drugs by medical workers. We investigated the relationship between the contamination level of antineoplastic drugs and the conditions of their handling. Air samples and wipe samples were collected from equipment in the preparation rooms of five hospitals (hospitals A-E). These samples were subjected to measurement of the amounts of cyclophosphamide (CPA), fluorouracil (5FU), gemcitabine (GEM), and platinum-containing drugs (Pt). Twenty-four-hour urine samples were collected from the pharmacists who handled or audited, the antineoplastic drugs were analyzed for CPA and Pt. Pt was detected from air samples inside BSC in hospital B. Antineoplastic drugs were detected from wipe samples of the BSC in hospitals A, B, D, and E and of other equipment in the preparation rooms in hospitals A, B, C, and D. Cyclophosphamide and 5FU were detected from wipe samples of the air-conditioner filter in hospital A, and CPA was detected from that in hospital D. Cyclophosphamide was detected from urine samples of workers in hospitals B, D, and E. The contamination level of antineoplastic drugs was suggested to be related with the amount of drugs handled, cleaning methods of the equipment, and the skill level of the technique of maintaining negative pressure inside a vial. In order to reduce the contamination and exposure to antineoplastic drugs in the hospital work environment very close to zero, comprehensive safety precautions, including adequate mixing and cleaning methods was required in addition to BSC and closed system device.

  19. Antineoplastic drugs: Occupational exposure and health risks

    OpenAIRE

    Fransman, W.

    2006-01-01

    Antineoplastic drugs are pharmaceuticals commonly used to treat cancer (and some non-neoplastic diseases), which are generally referred to as 'chemotherapy'. Oncology nurses are exposed to these drugs via the skin of hands during daily nursing activities, even when protective gloves are being used. Results of tests on bulk and surface contamination samples confirmed that patients intravenously treated with cyclophosphamide excrete the unmetabolized drug. The introduction of new guidelines and...

  20. Body Composition and Anti-Neoplastic Treatment in Adult and Older Subjects - A Systematic Review.

    Science.gov (United States)

    Gérard, S; Bréchemier, D; Lefort, A; Lozano, S; Abellan Van Kan, G; Filleron, T; Mourey, L; Bernard-Marty, C; Rougé-Bugat, M E; Soler, V; Vellas, B; Cesari, M; Rolland, Y; Balardy, L

    2016-01-01

    The estimation of the risk of poor tolerance and overdose of antineoplastic agents protocols represents a major challenge in oncology, particularly in older patients. We hypothesize that age-related modifications of body composition (i.e. increased fat mass and decreased lean mass) may significantly affect tolerance to chemotherapy. We conducted a systematic review for the last 25 years (between 1990 and 2015), using US National library of Medicine Medline electronic bibliographic database and Embase database of cohorts or clinical trials exploring (i) the interactions of body composition (assessed by Dual X-ray Absorptiometry, Bioelectrical Impedance Analyses, or Computerized Tomography) with pharmacokinetics parameters, (ii) the tolerance to chemotherapy, and (iii) the consequences of chemotherapies or targeted therapies on body composition. Our search identified 1504 articles. After a selection (using pre-established criteria) on titles and abstract, 24 original articles were selected with 3 domains of interest: impact of body composition on pharmacokinetics (7 articles), relationship between body composition and chemotoxicity (14 articles), and effect of anti-cancer chemotherapy on body composition (11 articles). The selected studies suggested that pharmacokinetic was influenced by lean mass, that lower lean mass could be correlated with toxicity, and that sarcopenic patients experienced more toxicities that non-sarcopenic patients. Regarding fat mass, results were less conclusive. No studies specifically explored the topic of body composition in older cancer patients. Plausible pathophysiological pathways linking body composition, toxicity, and pharmacokinetics are sustained by the actual review. However, despite the growing number of older cancer patients, our review highlighted the lack of specific studies in the field of anti-neoplastic agents toxicity regarding body composition conducted in elderly.

  1. Reproductive Health Risks Associated with Occupational Exposures to Antineoplastic Drugs in Health Care Settings: A Review of the Evidence

    Science.gov (United States)

    Connor, Thomas H.; Lawson, Christina C.; Polovich, Martha; McDiarmid, Melissa A.

    2015-01-01

    Objectives Antineoplastic drugs are known reproductive and developmental toxicants. Our objective was to review the existing literature of reproductive health risks to workers who handle antineoplastic drugs. Methods A structured literature review of 18 peer-reviewed, English language publications of occupational exposure and reproductive outcomes was performed. Results While effect sizes varied with study size and population, occupational exposure to antineoplastic drugs appears to raise the risk of both congenital malformations and miscarriage. Studies of infertility and time-to-pregnancy also suggested an increased risk for sub-fertility. Conclusions Antineoplastic drugs are highly toxic in patients receiving treatment and adverse reproductive effects have been well documented in these patients. Healthcare workers with chronic, low level occupational exposure to these drugs also appear to have an increased risk of adverse reproductive outcomes. Additional precautions to prevent exposure should be considered. PMID:25153300

  2. Flavonoids from Heliotropium subulatum exudate and their evaluation for antioxidant, antineoplastic and cytotoxic activities II.

    Science.gov (United States)

    Singh, Bharat; Sahu, Pooran M; Sharma, Ram A

    2017-02-01

    The flavonoids are the largest group of phenolic compounds isolated from a wide range of higher plants. These compounds work as antimicrobials, anti-insect agents and protect plants from other types of biotic and abiotic stresses. Various researchers have suggested that flavonoids possessed antioxidant, antineoplastic and cytotoxic activities. The main objective of this study was to test dichloromethane fraction of resinous exudate of Heliotropium subulatum for their antioxidant, antineoplastic and cytotoxic activities, as well as to search new antioxidant and antineoplastic agents for pharmaceutical formulations. Five flavonoids were isolated from resinous exudate of this plant species and screened for their in vitro and in vivo antioxidant models (DPPH radical scavenging, reducing power, superoxide anion scavenging, metal chelating scavenging systems, catalase and lipid peroxidation), antineoplastic (Sarcoma 180), and cytotoxic (Chinese hamster V79 cells) activities. Tricetin demonstrated maximum antioxidant activity against both in vitro and in vivo experimental systems while galangin exhibited maximum inhibition (78.35%) at a dose of 10 µg/kg/day against Sarcoma 180. Similarly, it was found that galangin also showed highest activity (21.1 ± 0.15%) at a concentration of 70 µg/ml to Chinese hamster V79 cells. The observed results suggest that tricetin has a potential to scavenge free radicals in both in vitro and in vivo models while the galangin could be considered as antitumor and cytotoxic agent.

  3. Examining factors that influence the effectiveness of cleaning antineoplastic drugs from drug preparation surfaces: a pilot study.

    Science.gov (United States)

    Hon, Chun-Yip; Chua, Prescillia Ps; Danyluk, Quinn; Astrakianakis, George

    2014-06-01

    Occupational exposure to antineoplastic drugs has been documented to result in various adverse health effects. Despite the implementation of control measures to minimize exposure, detectable levels of drug residual are still found on hospital work surfaces. Cleaning these surfaces is considered as one means to minimize the exposure potential. However, there are no consistent guiding principles related to cleaning of contaminated surfaces resulting in hospitals to adopt varying practices. As such, this pilot study sought to evaluate current cleaning protocols and identify those factors that were most effective in reducing contamination on drug preparation surfaces. Three cleaning variables were examined: (1) type of cleaning agent (CaviCide®, Phenokil II™, bleach and chlorhexidine), (2) application method of cleaning agent (directly onto surface or indirectly onto a wipe) and (3) use of isopropyl alcohol after cleaning agent application. Known concentrations of antineoplastic drugs (either methotrexate or cyclophosphamide) were placed on a stainless steel swatch and then, systematically, each of the three cleaning variables was tested. Surface wipes were collected and quantified using high-performance liquid chromatography-tandem mass spectrometry to determine the percent residual of drug remaining (with 100% being complete elimination of the drug). No one single cleaning agent proved to be effective in completely eliminating all drug contamination. The method of application had minimal effect on the amount of drug residual. In general, application of isopropyl alcohol after the use of cleaning agent further reduced the level of drug contamination although measureable levels of drug were still found in some cases.

  4. Dental root agenesis following radiation and antineoplastic therapy: A Case Report

    Directory of Open Access Journals (Sweden)

    Abdul Hafiz

    2016-01-01

    Full Text Available The survival rates of patients suffering from various childhood neoplasms have improved dramatically with the advent of chemo-radiation therapy. The harmful effects of chemo-radiation therapy in the oro-facial region such as root agenesis, short roots, impaired amelogenesis, dentinogenesis, radiation caries, and other soft tissue pathologies are well recognized. In spite of these documented risks, the antineoplastic treatment modalities continue to serve the patient for overall improvement in survival and quality of life. However, a thorough understanding of the growth and development process and its relation with the complex antineoplastic treatment is very important for all clinicians. Such awareness could significantly improve the status of patients in the posttreatment period with the implementation of proper preventive and interceptive measures. This article intends to document a case of root agenesis that developed secondary to chemo-radiation therapy in a 12-year-old girl.

  5. Toxicity classification and evaluation of four pharmaceuticals classes: antibiotics, antineoplastics, cardiovascular, and sex hormones

    International Nuclear Information System (INIS)

    Sanderson, Hans; Brain, Richard A.; Johnson, David J.; Wilson, Christian J.; Solomon, Keith R.

    2004-01-01

    Four different classes of environmental concern are quantitatively and qualitatively assessed for environmental hazards; antibiotics (n = 226), antineoplastics (n = 81), cardiovascular (n = 272), and sex hormones (n 92). These along with an ECOSAR scan of all pharmaceuticals (n = 2848) were then classified according to the OECD aquatic toxicity classification system. The predicted species susceptibility is: daphnid > fish > algae, and the predicted rank order of relative toxicity: sex hormones > cardiovascular antibiotics > antineoplastics (Table 1). Generally, a relatively large proportion (1/3) of all pharmaceuticals are potentially very toxic to aquatic organisms (Table 2). The qualitative risk assessment ranking relative to probability and potential severity for human and environmental health effects is: antibiotics > sex hormones > cardiovascular > antineoplastics. (Q)SARs and pharmacodynamic information should be used to prioritize and steer experimental risk assessments of pharmaceuticals, and potentially, also be used in new drug discovery optimizing efficacy and in minimising environmental hazards of new products. Nuclear receptors are relatively well conserved in evolution. Currently, antibacterial resistance represents the most significant human health hazard, and potentially the largest non-target organism hazard is sex hormones acting as endocrine modulators in wildlife. Data for the individual compounds are accessible via http://www.uoguelph.ca/~hsander/

  6. Prophylaxis and management of antineoplastic drug induced nausea and vomiting in children with cancer

    Directory of Open Access Journals (Sweden)

    Sidharth Totadri

    2016-10-01

    Full Text Available Antineoplastic drug induced nausea and vomiting (AINV is a major adverse event which deeply impacts the quality of life of children with cancer. It additionally causes distress to parents and negatively impacts compliance to therapy. A robust AINV prophylaxis regimen is essential to achieve complete control; and prevent anticipatory, breakthrough and refractory AINV. With a wide array of available anti-emetics, standard guidelines for their use are crucial to ensure uniform and optimum prophylaxis. Chemotherapeutic agents are classified as having high, moderate, low or minimal emetic risk based on their potential to cause emesis in the absence of prophylaxis. Three drug regimen with aprepitant, ondansetron/granisetron and dexamethasone is recommended for protocols with high emetic risk. Although approved in children ≥12 years, there is mounting evidence for the use of aprepitant in younger children too. In protocols with moderate and low emetic risk, combination of ondansetron/granisetron and dexamethasone; and single agent ondansetron/granisetron are recommended, respectively. Metoclopramide is an alternative when steroids are contraindicated. Olanzapine and lorazepam are useful drugs for breakthrough AINV and anticipatory AINV. Knowledge of pediatric dosage, salient adverse events, drug interactions as well as cost of drugs is essential to prescribe anti-emetics accurately and safely in resource constrained settings. Non pharmacological interventions such as hypnosis, acupressure and psychological interventions can benefit a sub-group of patients without significant risk of adverse events.

  7. Clinical effect of Cystenosine on leukocytopenia at the time of therapy with radiation and antineoplastic agents

    International Nuclear Information System (INIS)

    Sato, Kazuhide; Usui, Ryu; Inoue, Hiroshi; Mihashi, Norio; Niibe, Hideo.

    1977-01-01

    Out of 62 cases, 25 cases received only radiotherapy, 11 cases received both radiotherapy and antineoplastic agents, and 26 cases received only antineoplastic agents. Total dose of x-ray ranges from 3000 to 6200 rad in 18 of 36 cases of the former two groups, and 2600 to 6260 rad of 60 Co dose were irradiated to 18 cases of the rest. This agent was administered 9 tablets per a day (one tablet contains 200 mg of inosine and 20 mg of cystine) for 19 to 142 days. Its effects on leukocytopenia showed marked effectiveness in 9 out of 25 cases treated with only radiation, effectiveness in 8 cases, and ineffectiveness in 3 cases. Its effective rate was 72.8%. The effective rate was 65.4% in the cases treated with only antineoplastic agents, and was 67.7% in all cases. A certain relationship between dose and the effective rate was not recognized. Radiation sickness, such as loss of appetite general fatigue and mausea, decreased gradually by using this agent. Side effect was not recognized particularly. (Kanao. N.)

  8. Effects of organizational safety practices and perceived safety climate on PPE usage, engineering controls, and adverse events involving liquid antineoplastic drugs among nurses.

    Science.gov (United States)

    DeJoy, David M; Smith, Todd D; Woldu, Henok; Dyal, Mari-Amanda; Steege, Andrea L; Boiano, James M

    2017-07-01

    Antineoplastic drugs pose risks to the healthcare workers who handle them. This fact notwithstanding, adherence to safe handling guidelines remains inconsistent and often poor. This study examined the effects of pertinent organizational safety practices and perceived safety climate on the use of personal protective equipment, engineering controls, and adverse events (spill/leak or skin contact) involving liquid antineoplastic drugs. Data for this study came from the 2011 National Institute for Occupational Safety and Health (NIOSH) Health and Safety Practices Survey of Healthcare Workers which included a sample of approximately 1,800 nurses who had administered liquid antineoplastic drugs during the past seven days. Regression modeling was used to examine predictors of personal protective equipment use, engineering controls, and adverse events involving antineoplastic drugs. Approximately 14% of nurses reported experiencing an adverse event while administering antineoplastic drugs during the previous week. Usage of recommended engineering controls and personal protective equipment was quite variable. Usage of both was better in non-profit and government settings, when workers were more familiar with safe handling guidelines, and when perceived management commitment to safety was higher. Usage was poorer in the absence of specific safety handling procedures. The odds of adverse events increased with number of antineoplastic drugs treatments and when antineoplastic drugs were administered more days of the week. The odds of such events were significantly lower when the use of engineering controls and personal protective equipment was greater and when more precautionary measures were in place. Greater levels of management commitment to safety and perceived risk were also related to lower odds of adverse events. These results point to the value of implementing a comprehensive health and safety program that utilizes available hazard controls and effectively communicates

  9. Changes in the chemical composition of mineralised teeth in children after antineoplastic treatment.

    Science.gov (United States)

    Krasuska-Sławińska, Ewa; Dembowska-Bagińska, Bożenna; Brożyna, Agnieszka; Olczak-Kowalczyk, Dorota; Czarnowska, Elżbieta; Sowińska, Agnieszka

    2018-01-01

    Chemotherapy, neoplasms, and their complications linked to malabsorption, malnutrition, and metabolic disorders may lead to improper tooth development and frequent severe caries in patients during/after antineoplastic treatment and to a more frequent improper tooth development in patients undergoing chemotherapy during odontogenesis. However, the causes of these abnormalities remain unknown; there are no studies on the impact of antineoplastic treatment and its complications on the chemical composition of mineralised teeth. To compare the chemical composition of mineralised teeth extracted due to complicated caries in children after chemotherapy, and of teeth extracted due to orthodontic treatment in generally healthy children. The treatment group included five teeth extracted due to complicated caries in children after antineoplastic treatment. The control group included five teeth extracted due to orthodontic treatment in generally healthy children. The chemical composition of enamel, dentine, cementum, interior of the canal, and enamel abnormalities in teeth extracted from patients after chemotherapy and in generally healthy patients were assessed with energy-dispersive X-ray spectroscopy. Results were analysed statistically. The magnesium (Mg) and zinc (Zn) mass contents in the enamel of patients after chemotherapy increased and so did the calcium (Ca) to phosphorus (P) ratio when compared to controls. Areas with abnormal enamel in patients after chemotherapy had lower concentrations of Ca and P, and higher concentrations of trace elements (Mg, Cl, and Na). The levels of the assessed elements in dentine, cementum, and inside the canal were similar in both groups of teeth.

  10. Multicenter evaluation of a new closed system drug-transfer device in reducing surface contamination by antineoplastic hazardous drugs.

    Science.gov (United States)

    Bartel, Sylvia B; Tyler, Timothy G; Power, Luci A

    2018-02-15

    Results of a study to evaluate the effectiveness of a recently introduced closed system drug-transfer device (CSTD) in reducing surface contamination during compounding and simulated administration of antineoplastic hazardous drugs (AHDs) are reported. Wipe samples were collected from 6 predetermined surfaces in compounding and infusion areas of 13 U.S. cancer centers to establish preexisting levels of surface contamination by 2 marker AHDs (cyclophosphamide and fluorouracil). Stainless steel templates were placed over the 6 previously sampled surfaces, and the marker drugs were compounded and infused per a specific protocol using all components of the CSTD. Wipe samples were collected from the templates after completion of tasks and analyzed for both marker AHDs. Aggregated results of wipe sampling to detect preexisting contamination at the 13 study sites showed that overall, 66.7% of samples (104 of 156) had detectable levels of at least 1 marker AHD; subsequent testing after CSTD use per protocol found a sample contamination rate of 5.8% (9 of 156 samples). In the administration areas alone, the rate of preexisting contamination was 78% (61 of 78 samples); with use of the CSTD protocol, the contamination rate was 2.6%. Twenty-six participants rated the CSTD for ease of use, with 100% indicating that they were satisfied or extremely satisfied. A study involving a rigorous protocol and 13 cancer centers across the United States demonstrated that the CSTD reduced surface contamination by cyclophosphamide and fluorouracil during compounding and simulated administration. Participants reported that the CSTD was easy to use. Copyright © 2018 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  11. Cardiotoxicity of copper-based antineoplastic drugs casiopeinas is related to inhibition of energy metabolism

    International Nuclear Information System (INIS)

    Hernandez-Esquivel, Luz; Marin-Hernandez, Alvaro; Pavon, Natalia; Carvajal, Karla; Moreno-Sanchez, Rafael

    2006-01-01

    Isolated rat hearts were perfused with glucose, octanoate or glucose + octanoate and different concentrations of the copper-based antineoplastic drugs casiopeina II-gly (CSII) or casiopeina III-i-a (CSIII). In isolated perfused hearts with glucose + octanoate, both casiopeinas induced diminution in cardiac work and O 2 consumption with half-maximal inhibitory concentrations (IC 5 ) of 4 (CSII) and 4.6 (CSIII) μM, after 1 h of perfusion. Strong inhibition of the pyruvate and 2-oxoglutarate dehydrogenases as well as total creatine kinase by casiopeinas suggested that ATP generation by oxidative phosphorylation and its transfer towards myofibrils were targets for these drugs. In consequence, the cellular contents of ATP and phosphocreatine were also lowered by casiopeinas. Remarkably, casiopeinas were less toxic than adriamycin (IC 5 = 2.6 μM), a well-known potent cardiotoxic and antineoplastic drug, which has a wide clinical use. In an open-chest animal, which is a more physiological model than the isolated heart, femoral administration of 1 μM drug revealed that CSII was innocuous very likely due to strong binding to serum albumin, whereas adriamycin induced again a potent cardiotoxic effect (diminution in heart rate and severe depression of systolic blood pressure). Thus, it seems that casiopeinas are a group of new antineoplastic drugs with milder secondary toxic effects than proven drugs such as adriamycin

  12. Lack of genotoxicity in medical oncology nurses handling antineoplastic drugs: effect of work environment and protective equipment.

    Science.gov (United States)

    Gulten, Tuna; Evke, Elif; Ercan, Ilker; Evrensel, Turkkan; Kurt, Ender; Manavoglu, Osman

    2011-01-01

    In this study we aimed to investigate the genotoxic effects of antineoplastic agents in occupationally exposed oncology nurses. Genotoxic effects mean the disruptive effects in the integrity of DNA and they are associated with cancer development. Biomonitoring of health care workers handling antineoplastic agents is helpful for the evaluation of exposure to cytostatics. The study included an exposed and two control groups. The exposed group (n=9) was comprised of oncology nurses. The first (n=9) and second (n=10) control groups were comprised of subjects who did not come into contact with antineoplastic drugs working respectively in the same department with oncology nurses and in different departments. Genotoxicity evaluation was performed using SCE analysis. After applying culture, harvest and chromosome staining procedures, a total of 25 metaphases were analyzed per person. Kruskal Wallis test was used to perform statistical analysis. A statistically significant difference of sister chromatid exchange frequencies was not observed between the exposed and control groups. Lack of genotoxicity in medical oncology nurses might be due to good working conditions with high standards of technical equipment and improved personal protection.

  13. Infiltrative Lung Diseases: Complications of Novel Antineoplastic Agents in Patients with Hematological Malignancies

    Directory of Open Access Journals (Sweden)

    Bobbak Vahid

    2008-01-01

    Full Text Available Infiltrative lung disease is a well-known complication of antineoplastic agents in patients with hematological malignancies. Novel agents are constantly being added to available treatments. The present review discusses different pulmonary syndromes, pathogenesis and management of these novel agents.

  14. Cost-benefit analysis of prophylactic granulocyte colony-stimulating factor during CHOP antineoplastic therapy for non-Hodgkin's lymphoma.

    Science.gov (United States)

    Dranitsaris, G; Altmayer, C; Quirt, I

    1997-06-01

    Several randomised comparative trials have shown that granulocyte colony-stimulating factor (G-CSF) reduces the duration of neutropenia, hospitalisation and intravenous antibacterial use in patients with cancer who are receiving high-dosage antineoplastic therapy. However, one area that has received less attention is the role of G-CSF in standard-dosage antineoplastic regimens. One such treatment that is considered to have a low potential for inducing fever and neutropenia is the CHOP regimen (cyclophosphamide, doxorubicin, vincristine and prednisone) for non-Hodgkin's lymphoma. We conducted a cost-benefit analysis from a societal perspective in order to estimate the net cost or benefit of prophylactic G-CSF in this patient population. This included direct costs for hospitalisation with antibacterial support, as well as indirect societal costs, such as time off work and antineoplastic therapy delays secondary to neutropenia. The findings were then tested by a comprehensive sensitivity analysis. The administration of G-CSF at a dosage of 5 micrograms/kg/day for 11 doses following CHOP resulted in an overall net cost of $Can1257. In the sensitivity analysis, lowering the G-CSF dosage to 2 micrograms/kg/day generated a net benefit of $Can6564, indicating a situation that was cost saving to society. The results of the current study suggest that the use of G-CSF in patients receiving CHOP antineoplastic therapy produces a situation that is close to achieving cost neutrality. However, low-dosage (2 micrograms/kg/day) G-CSF is an economically attractive treatment strategy because it may result in overall savings to society.

  15. Applying ligands profiling using multiple extended electron distribution based field templates and feature trees similarity searching in the discovery of new generation of urea-based antineoplastic kinase inhibitors.

    Directory of Open Access Journals (Sweden)

    Eman M Dokla

    Full Text Available This study provides a comprehensive computational procedure for the discovery of novel urea-based antineoplastic kinase inhibitors while focusing on diversification of both chemotype and selectivity pattern. It presents a systematic structural analysis of the different binding motifs of urea-based kinase inhibitors and the corresponding configurations of the kinase enzymes. The computational model depends on simultaneous application of two protocols. The first protocol applies multiple consecutive validated virtual screening filters including SMARTS, support vector-machine model (ROC = 0.98, Bayesian model (ROC = 0.86 and structure-based pharmacophore filters based on urea-based kinase inhibitors complexes retrieved from literature. This is followed by hits profiling against different extended electron distribution (XED based field templates representing different kinase targets. The second protocol enables cancericidal activity verification by using the algorithm of feature trees (Ftrees similarity searching against NCI database. Being a proof-of-concept study, this combined procedure was experimentally validated by its utilization in developing a novel series of urea-based derivatives of strong anticancer activity. This new series is based on 3-benzylbenzo[d]thiazol-2(3H-one scaffold which has interesting chemical feasibility and wide diversification capability. Antineoplastic activity of this series was assayed in vitro against NCI 60 tumor-cell lines showing very strong inhibition of GI(50 as low as 0.9 uM. Additionally, its mechanism was unleashed using KINEX™ protein kinase microarray-based small molecule inhibitor profiling platform and cell cycle analysis showing a peculiar selectivity pattern against Zap70, c-src, Mink1, csk and MeKK2 kinases. Interestingly, it showed activity on syk kinase confirming the recent studies finding of the high activity of diphenyl urea containing compounds against this kinase. Allover, the new series

  16. [Implementation of a robot for the preparation of antineoplastic drugs in the Pharmacy Service].

    Science.gov (United States)

    Pacheco Ramos, María de la Paz; Arenaza Peña, Ainhoa Elisa; Santiago Pérez, Alejandro; Bilbao Gómez-Martino, Cristina; Zamora Barrios, María Dolores; Arias Fernández, María Lourdes

    2015-05-01

    To describe the implementation of a robot for the preparation of antineoplastic drugs in the Pharmacy Service and to be able to analyze the added value to pharmacotherapy. The implementation was carried out in June 2012 at a tertiary level Hospital, taking place in two periods: 1- test period with the installation of the robot, with technical configuration of the equipment and validation of 29 active ingredients and the integration of electronic prescribing software with the robot application (9 months). 2- Usage period (22 months). On the other hand, training was given to pharmacists and nurses. The robot uses image recognition, barcode identification and gravimetric controls for proper operation. These checks provide information about the error ratio in the preparation, with a margin of ± 10%, which after a pilot study was restricted to a range of ±4%. The robot was programmed to recognize bags, infusion pumps, syringes and vials. The added value was assessed for 31 months by identifying preparation's errors. 11,865 preparations were made by the robot, which meant approximately 40% of all antineoplastic prepared from 29 different active ingredients. 1.12% (n=133) of the errors were identified by the robot and therefore didn't reach the patient (negative desviation - 4%). These errors were corrected manually. The implementation of a robot in the preparation of antineoplastic drugs allows to identify errors therefore preventing them to arrive to the patient. This promotes safety and quality of the process, reducing the exposure to cytotoxic drugs from the manipulator. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  17. Implementation of a robot for the preparation of antineoplastic drugs in the Pharmacy Service

    Directory of Open Access Journals (Sweden)

    María de la Paz Pacheco Ramos

    2015-01-01

    Full Text Available Objective: To describe the implementation of a robot for the preparation of antineoplastic drugs in the Pharmacy Service and to be able to analyze the added value to pharmacotherapy. Methods: The implementation was carried out in June 2012 at a tertiary level Hospital, taking place in two periods: 1- test period with the installation of the robot, with technical configuration of the equipment and validation of 29 active ingredients and the integration of electronic prescribing software with the robot application (9 months. 2- Usage period (22 months. On the other hand, training was given to pharmacists and nurses. The robot uses image recognition, barcode identification and gravimetric controls for proper operation. These checks provide information about the error ratio in the preparation, with a margin of ± 10%, which after a pilot study was restricted to a range of ±4%. The robot was programmed to recognize bags, infusion pumps, syringes and vials. The added value was assessed for 31 months by identifying preparation´s errors. Results: 11,865 preparations were made by the robot, which meant approximately 40% of all antineoplastic prepared from 29 different active ingredients. 1.12% (n=133 of the errors were identified by the robot and therefore didn´t reach the patient (negative desviation - 4%. These errors were corrected manually. Conclusion: The implementation of a robot in the preparation of antineoplastic drugs allows to identify errors therefore preventing them to arrive to the patient. This promotes safety and quality of the process, reducing the exposure to cytotoxic drugs from the manipulator

  18. Medicinal electronomics bricolage design of hypoxia-targeting antineoplastic drugs and invention of boron tracedrugs as innovative future-architectural drugs.

    Science.gov (United States)

    Hori, Hitoshi; Uto, Yoshihiro; Nakata, Eiji

    2010-09-01

    We describe herein for the first time our medicinal electronomics bricolage design of hypoxia-targeting antineoplastic drugs and boron tracedrugs as newly emerging drug classes. A new area of antineoplastic drugs and treatments has recently focused on neoplastic cells of the tumor environment/microenvironment involving accessory cells. This tumor hypoxic environment is now considered as a major factor that influences not only the response to antineoplastic therapies but also the potential for malignant progression and metastasis. We review our medicinal electronomics bricolage design of hypoxia-targeting drugs, antiangiogenic hypoxic cell radiosensitizers, sugar-hybrid hypoxic cell radiosensitizers, and hypoxia-targeting 10B delivery agents, in which we design drug candidates based on their electronic structures obtained by molecular orbital calculations, not based solely on pharmacophore development. These drugs include an antiangiogenic hypoxic cell radiosensitizer TX-2036, a sugar-hybrid hypoxic cell radiosensitizer TX-2244, new hypoxia-targeting indoleamine 2,3-dioxygenase (IDO) inhibitors, and a hypoxia-targeting BNCT agent, BSH (sodium borocaptate-10B)-hypoxic cytotoxin tirapazamine (TPZ) hybrid drug TX-2100. We then discuss the concept of boron tracedrugs as a new drug class having broad potential in many areas.

  19. Evaluation of real-time data obtained from gravimetric preparation of antineoplastic agents shows medication errors with possible critical therapeutic impact: Results of a large-scale, multicentre, multinational, retrospective study.

    Science.gov (United States)

    Terkola, R; Czejka, M; Bérubé, J

    2017-08-01

    Medication errors are a significant cause of morbidity and mortality especially with antineoplastic drugs, owing to their narrow therapeutic index. Gravimetric workflow software systems have the potential to reduce volumetric errors during intravenous antineoplastic drug preparation which may occur when verification is reliant on visual inspection. Our aim was to detect medication errors with possible critical therapeutic impact as determined by the rate of prevented medication errors in chemotherapy compounding after implementation of gravimetric measurement. A large-scale, retrospective analysis of data was carried out, related to medication errors identified during preparation of antineoplastic drugs in 10 pharmacy services ("centres") in five European countries following the introduction of an intravenous workflow software gravimetric system. Errors were defined as errors in dose volumes outside tolerance levels, identified during weighing stages of preparation of chemotherapy solutions which would not otherwise have been detected by conventional visual inspection. The gravimetric system detected that 7.89% of the 759 060 doses of antineoplastic drugs prepared at participating centres between July 2011 and October 2015 had error levels outside the accepted tolerance range set by individual centres, and prevented these doses from reaching patients. The proportion of antineoplastic preparations with deviations >10% ranged from 0.49% to 5.04% across sites, with a mean of 2.25%. The proportion of preparations with deviations >20% ranged from 0.21% to 1.27% across sites, with a mean of 0.71%. There was considerable variation in error levels for different antineoplastic agents. Introduction of a gravimetric preparation system for antineoplastic agents detected and prevented dosing errors which would not have been recognized with traditional methods and could have resulted in toxicity or suboptimal therapeutic outcomes for patients undergoing anticancer treatment.

  20. [Applying dose banding to the production of antineoplastic drugs: a narrative review of the literature].

    Science.gov (United States)

    Pérez Huertas, Pablo; Cueto Sola, Margarita; Escobar Cava, Paloma; Borrell García, Carmela; Albert Marí, Asunción; López Briz, Eduardo; Poveda Andrés, José Luis

    2015-07-01

    The dosage of antineoplastic drugs has historically been based on individualized prescription and preparation according to body surface area or patient´s weight. Lack of resources and increased assistance workload in the areas where chemotherapy is made, are leading to the development of new systems to optimize the processing without reducing safety. One of the strategies that has been proposed is the elaboration by dose banding. This new approach standardizes the antineoplastic agents doses by making ranges or bands accepting a percentage of maximum variation. It aims to reduce processing time with the consequent reduction in waiting time for patients; to reduce errors in the manufacturing process and to promote the rational drug use. In conclusion, dose banding is a suitable method for optimizing the development of anticancer drugs, obtaining reductions in oncologic patients waiting time but without actually causing a favorable impact on direct or indirect costs. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  1. Applying dose banding to the production of antineoplastic drugs: a narrative review of the literature

    Directory of Open Access Journals (Sweden)

    Pablo Pérez Huertas

    2015-07-01

    Full Text Available The dosage of antineoplastic drugs has historically been based on individualized prescription and preparation according to body surface area or patient´s weight. Lack of resources and increased assistance workload in the areas where chemotherapy is made, are leading to the development of new systems to optimize the processing without reducing safety. One of the strategies that has been proposed is the elaboration by dose banding. This new approach standardizes the antineoplastic agents doses by making ranges or bands accepting a percentage of maximum variation. It aims to reduce processing time with the consequent reduction in waiting time for patients; to reduce errors in the manufacturing process and to promote the rational drug use. In conclusion, dose banding is a suitable method for optimizing the development of anticancer drugs, obtaining reductions in oncologic patients waiting time but without actually causing a favorable impact on direct or indirect costs.

  2. Stereocomplex micelle from nonlinear enantiomeric copolymers efficiently transports antineoplastic drug

    Science.gov (United States)

    Wang, Jixue; Shen, Kexin; Xu, Weiguo; Ding, Jianxun; Wang, Xiaoqing; Liu, Tongjun; Wang, Chunxi; Chen, Xuesi

    2015-05-01

    Nanoscale polymeric micelles have attracted more and more attention as a promising nanocarrier for controlled delivery of antineoplastic drugs. Herein, the doxorubicin (DOX)-loaded poly(D-lactide)-based micelle (PDM/DOX), poly(L-lactide)-based micelle (PLM/DOX), and stereocomplex micelle (SCM/DOX) from the equimolar mixture of the enantiomeric four-armed poly(ethylene glycol)-polylactide (PEG-PLA) copolymers were successfully fabricated. In phosphate-buffered saline (PBS) at pH 7.4, SCM/DOX exhibited the smallest hydrodynamic diameter ( D h) of 90 ± 4.2 nm and the slowest DOX release compared with PDM/DOX and PLM/DOX. Moreover, PDM/DOX, PLM/DOX, and SCM/DOX exhibited almost stable D hs of around 115, 105, and 90 nm at above normal physiological condition, respectively, which endowed them with great potential in controlled drug delivery. The intracellular DOX fluorescence intensity after the incubation with the laden micelles was different degrees weaker than that incubated with free DOX · HCl within 12 h, probably due to the slow DOX release from micelles. As the incubation time reached to 24 h, all the cells incubated with the laden micelles, especially SCM/DOX, demonstrated a stronger intracellular DOX fluorescence intensity than free DOX · HCl-cultured ones. More importantly, all the DOX-loaded micelles, especially SCM/DOX, exhibited potent antineoplastic efficacy in vitro, excellent serum albumin-tolerance stability, and satisfactory hemocompatibility. These encouraging data indicated that the loading micelles from nonlinear enantiomeric copolymers, especially SCM/DOX, might be promising in clinical systemic chemotherapy through intravenous injection.

  3. New approaches to wipe sampling methods for antineoplastic and other hazardous drugs in healthcare settings.

    Science.gov (United States)

    Connor, Thomas H; Smith, Jerome P

    2016-09-01

    At the present time, the method of choice to determine surface contamination of the workplace with antineoplastic and other hazardous drugs is surface wipe sampling and subsequent sample analysis with a variety of analytical techniques. The purpose of this article is to review current methodology for determining the level of surface contamination with hazardous drugs in healthcare settings and to discuss recent advances in this area. In addition it will provide some guidance for conducting surface wipe sampling and sample analysis for these drugs in healthcare settings. Published studies on the use of wipe sampling to measure hazardous drugs on surfaces in healthcare settings drugs were reviewed. These studies include the use of well-documented chromatographic techniques for sample analysis in addition to newly evolving technology that provides rapid analysis of specific antineoplastic. Methodology for the analysis of surface wipe samples for hazardous drugs are reviewed, including the purposes, technical factors, sampling strategy, materials required, and limitations. The use of lateral flow immunoassay (LFIA) and fluorescence covalent microbead immunosorbent assay (FCMIA) for surface wipe sample evaluation is also discussed. Current recommendations are that all healthc a re settings where antineoplastic and other hazardous drugs are handled include surface wipe sampling as part of a comprehensive hazardous drug-safe handling program. Surface wipe sampling may be used as a method to characterize potential occupational dermal exposure risk and to evaluate the effectiveness of implemented controls and the overall safety program. New technology, although currently limited in scope, may make wipe sampling for hazardous drugs more routine, less costly, and provide a shorter response time than classical analytical techniques now in use.

  4. Comet assay as a human biomonitoring tool: application in occupational exposure to antineoplastic drugs

    Directory of Open Access Journals (Sweden)

    Carina Ladeira

    2015-05-01

    Occupational exposure to antineoplastic drugs is associated with genotoxic effects, although comet assay analyzed parameters were higher in exposed comparing with controls, were not significant. Also the study of the susceptibility biomarkers did not show statistical significant differences, the small size of our sample hampered the finding of a possible association, let alone a causality relationship.

  5. 77 FR 41190 - Revised Document Posted: NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare...

    Science.gov (United States)

    2012-07-12

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention [Docket Number NIOSH-190] Revised Document Posted: NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2012, Correction AGENCY: National Institute for Occupational Safety and Health (NIOSH) of the...

  6. Chromosomal damage among medical staff occupationally exposed to volatile anesthetics, antineoplastic drugs, and formaldehyde

    Czech Academy of Sciences Publication Activity Database

    Mušák, L.; Šmerhovský, Z.; Halásová, E.; Osina, O.; Letková, L.; Vodičková, Ludmila; Poláková, Veronika; Buchancová, J.; Hemminki, K.; Vodička, Pavel

    2013-01-01

    Roč. 39, č. 6 (2013), s. 618-630 ISSN 0355-3140 Grant - others:MŠVV(SK) 26220220111; UK(SK) 1/0576/10 VEGA; MZd(SK) 2007/48-UK-13; GA MŠMT(CZ) Prvouk-P27/LF1/1 Institutional support: RVO:68378041 Keywords : anesthesiologist * antineoplastic drug * chromosomal aberration Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 3.095, year: 2013

  7. Molecular biomonitoring of a population of nurses handling antineoplastic drugs

    Energy Technology Data Exchange (ETDEWEB)

    Cornetta, Tommaso [Department of Biology, ' Roma Tre' University, Viale Guglielmo Marconi, 446-00146 Rome (Italy); ' Don Carlo Gnocchi' Foundation, Rome (Italy); Padua, Luca [' Don Carlo Gnocchi' Foundation, Rome (Italy); Department of Neuroscience, Neurology Institute, Catholic University, Rome (Italy); Testa, Antonella; Ievoli, Elena [Toxicology and Biomedical Sciences Section, ENEA Research Center, Casaccia (Rome) (Italy); Festa, Fabiola [Department of Biology, ' Roma Tre' University, Viale Guglielmo Marconi, 446-00146 Rome (Italy); Tranfo, Giovanna [Department of Occupational Hygiene, Italian Institute for Occupational Prevention and Safety, Monteporzio Catone (Rome) (Italy); Baccelliere, Luigi [S. Martino Hospital, Genova (Italy); Cozzi, Renata [Department of Biology, ' Roma Tre' University, Viale Guglielmo Marconi, 446-00146 Rome (Italy)], E-mail: cozzi@bio.uniroma3.it

    2008-02-01

    Many antineoplastic drugs have been found to have carcinogenic, mutagenic and teratogenic activity and so hospital personnel handling these substances are potentially exposed to health risk. Understanding this risk derived from protracted occupational exposure has great relevance even if the workers normally adopt individual and environmental protective measures. To address this question we have studied the presence of DNA and chromosome damage in a population of nurses employed in Italian oncology units and in matched controls. We used the comet assay to evidence the presence of DNA strand breaks, due to both acute and chronic exposure, and the micronucleus (MN) test, which is a measure of clastogenic and aneugenic events. Furthermore, since the individual response to the exogenous insults may be genetically determined, we studied the possible influence of single nucleotide polymorphism in XRCC1 and XRCC3 DNA repair genes on induced genetic damage. We also considered the effects of confounding factors like smoking, age and gender. The results indicated that the exposed subjects had significantly high levels of genetic damage. Age and gender were associated with increased values in MN, both in control and in exposed groups; the smoking habit affects MN frequency in controls, but not in workers. Furthermore we found that exposed subjects bearing at least one XRCC1 variant allele (399Gln) show higher values of MN. The present data provide the evidence to show that occupational exposure to antineoplastic drugs, even if in safety controlled conditions, represents a serious health risk. Furthermore we have shown that the presence of XRCC1 genetic polymorphism could contribute to increase the genetic damage in susceptible individuals who are occupationally exposed to dangerous substances.

  8. Molecular biomonitoring of a population of nurses handling antineoplastic drugs

    International Nuclear Information System (INIS)

    Cornetta, Tommaso; Padua, Luca; Testa, Antonella; Ievoli, Elena; Festa, Fabiola; Tranfo, Giovanna; Baccelliere, Luigi; Cozzi, Renata

    2008-01-01

    Many antineoplastic drugs have been found to have carcinogenic, mutagenic and teratogenic activity and so hospital personnel handling these substances are potentially exposed to health risk. Understanding this risk derived from protracted occupational exposure has great relevance even if the workers normally adopt individual and environmental protective measures. To address this question we have studied the presence of DNA and chromosome damage in a population of nurses employed in Italian oncology units and in matched controls. We used the comet assay to evidence the presence of DNA strand breaks, due to both acute and chronic exposure, and the micronucleus (MN) test, which is a measure of clastogenic and aneugenic events. Furthermore, since the individual response to the exogenous insults may be genetically determined, we studied the possible influence of single nucleotide polymorphism in XRCC1 and XRCC3 DNA repair genes on induced genetic damage. We also considered the effects of confounding factors like smoking, age and gender. The results indicated that the exposed subjects had significantly high levels of genetic damage. Age and gender were associated with increased values in MN, both in control and in exposed groups; the smoking habit affects MN frequency in controls, but not in workers. Furthermore we found that exposed subjects bearing at least one XRCC1 variant allele (399Gln) show higher values of MN. The present data provide the evidence to show that occupational exposure to antineoplastic drugs, even if in safety controlled conditions, represents a serious health risk. Furthermore we have shown that the presence of XRCC1 genetic polymorphism could contribute to increase the genetic damage in susceptible individuals who are occupationally exposed to dangerous substances

  9. Enhanced Topical and Transdermal Delivery of Antineoplastic and Antiviral Acyclic Nucleoside Phosphonate cPr-PMEDAP

    Czech Academy of Sciences Publication Activity Database

    Vávrová, K.; Kovaříková, P.; Školová, B.; Líbalová, M.; Roh, J.; Čáp, R.; Holý, Antonín; Hrabálek, A.

    2011-01-01

    Roč. 28, č. 12 (2011), s. 3105-3115 ISSN 0724-8741 R&D Projects: GA MŠk 1M0508 Grant - others:GA ČR(CZ) GAP207/11/0365 Institutional research plan: CEZ:AV0Z40550506 Keywords : acyclic nucleoside phosphonates * antivirals * antineoplastics * permeation enhancer * topical skin application * transdermal delivery Subject RIV: CC - Organic Chemistry Impact factor: 4.093, year: 2011

  10. French Health Technology Assessment of Antineoplastic Drugs Indicated in the Treatment of Solid Tumours: Perspective for Future Trends.

    Science.gov (United States)

    Chouaid, Christos; Borget, Isabelle; Braun, Eric; Bazil, Marie-Laure; Schaetz, Dominique; Rémuzat, Cécile; Toumi, Mondher

    2016-08-01

    France is one of the European countries that spend the most on oncology drugs. To keep pharmaceutical expenditure under control, Health Authorities highly scrutinize market access of costly medicines. To assess current and future trends in French health technology assessment (HTA) of antineoplastic drugs indicated in the treatment of solid tumours. A review of the SMR and ASMR drivers of the Transparency Committee (CT) opinions issued for antineoplastic drugs indicated in the treatment of solid tumours and approved between 2009 and 2014 was performed to assess current trends in French health technology assessment (HTA), complemented by an expert board consultation to capture the critical issues on the future of antineoplastic drugs HTA. Thirty-one drugs indicated for the treatment of solid tumours were identified (77 % targeted therapies). Initial CT assessments were available for 26 drugs. Four key items in the CT assessment were identified: 1) Clinical trial methodology; 2) Acceptance of progression-free survival (PFS) as a valuable endpoint; 3) Transferability of clinical trials in clinical practice; 4) Unpredictability of CT decisions. Experts raised the important development of personalised medicines in oncology and key challenges for oncology products to generate information expected from HTA perspective. The French system remains committed to its values and philosophy (access of all innovations for everybody) which are threatened by the increasing launch of innovative therapies and budget constraint. Both HTA decision framework evolution and revision of the current pricing process should be considered in France to cope with these new challenges.

  11. The Hepatoprotection Provided by Taurine and Glycine against Antineoplastic Drugs Induced Liver Injury in an Ex Vivo Model of Normothermic Recirculating Isolated Perfused Rat Liver

    Directory of Open Access Journals (Sweden)

    Reza Heidari

    2016-03-01

    Full Text Available Taurine (2-aminoethane sulfonic acid is a non-protein amino acid found in high concentration in different tissues. Glycine (Amino acetic acid is the simplest amino acid incorporated in the structure of proteins. Several investigations indicate the hepatoprotective properties of these amino acids. On the other hand, antineoplastic agents-induced serum transaminase elevation and liver injury is a clinical complication. The current investigation was designed to screen the possible hepatoprotective properties of taurine and glycine against antineoplastic drugs-induced hepatic injury in an ex vivo model of isolated perfused rat liver. Rat liver was perfused with different concentration (10 μM, 100 μM and 1000 μM of antineoplastic drugs (Mitoxantrone, Cyclophosphamide, Cisplatin, 5 Fluorouracil, Doxorubicin and Dacarbazine via portal vein. Taurine and glycine were administered to drug-treated livers and liver perfusate samples were collected for biochemical measurements (ALT, LDH, AST, and K+. Markers of oxidative stress (reactive oxygen species formation, lipid peroxidation, total antioxidant capacity and glutathione were also assessed in liver tissue. Antineoplastic drugs caused significant pathological changes in perfusate biochemistry. Furthermore, markers of oxidative stress were significantly elevated in drug treated livers. It was found that taurine (5 and 10 mM and glycine (5 and 10 mM administration significantly mitigated the biomarkers of liver injury and attenuated drug induced oxidative stress. Our data indicate that taurine and glycine supplementation might help as potential therapeutic options to encounter anticancer drugs-induced liver injury.

  12. Antineoplastic drugs and radiation: comparison of the phenomena determining the effectiveness of fractionated treatments

    International Nuclear Information System (INIS)

    Mauro, F.; Briganti, G.; Nervi, C.

    1983-01-01

    In the last ten years the criteria for effective radiotherapy regimens have been rediscussed by analyzing the dependence of radiation response upon the radiobiological phenomena affecting the results of fractionated treatments. In the original definition of H.R. Withers, these phenomena have been referred to as the four R's of radiotherapy, and today we suspect that their number may be higher than that. By analogy, and in spite of the fact that chemical cytotoxic agents are seldom radiomimetic in the strict sense of the word, a similar general analysis could be used to discuss the effectiveness of fractionated administrations of anti-neoplastic drugs. However, information is only available for the cell-cycle age-dependence of lethal and kinetic effects and the repair from potentially lethal damage induced by these agents. In the present work, an attempt is made to discuss some of the neglected R's of chemotherapy, with the aim of establishing (not exclusively empirical) criteria for drug scheduling and of clarifying some of the observations on interaction between agents. In particular, with regard to antineoplastic drugs, published and unpublished information is available not only for the well-known phenomenon of reassortment, but also for the shape of the survival curve, recovery (or potentiation) between dose fraction, and recruitment. Some advantages (and pitfalls) can be evidenced when applying this kind of radiobiological approach to chemotherapy

  13. Evidence for tankyrases as antineoplastic targets in lung cancer

    International Nuclear Information System (INIS)

    Busch, Alexander M; Johnson, Kevin C; Stan, Radu V; Sanglikar, Aarti; Ahmed, Yashi; Dmitrovsky, Ethan; Freemantle, Sarah J

    2013-01-01

    New pharmacologic targets are urgently needed to treat or prevent lung cancer, the most common cause of cancer death for men and women. This study identified one such target. This is the canonical Wnt signaling pathway, which is deregulated in cancers, including those lacking adenomatous polyposis coli or β-catenin mutations. Two poly-ADP-ribose polymerase (PARP) enzymes regulate canonical Wnt activity: tankyrase (TNKS) 1 and TNKS2. These enzymes poly-ADP-ribosylate (PARsylate) and destabilize axin, a key component of the β-catenin phosphorylation complex. This study used comprehensive gene profiles to uncover deregulation of the Wnt pathway in murine transgenic and human lung cancers, relative to normal lung. Antineoplastic consequences of genetic and pharmacologic targeting of TNKS in murine and human lung cancer cell lines were explored, and validated in vivo in mice by implantation of murine transgenic lung cancer cells engineered with reduced TNKS expression relative to controls. Microarray analyses comparing Wnt pathway members in malignant versus normal tissues of a murine transgenic cyclin E lung cancer model revealed deregulation of Wnt pathway components, including TNKS1 and TNKS2. Real-time PCR assays independently confirmed these results in paired normal-malignant murine and human lung tissues. Individual treatments of a panel of human and murine lung cancer cell lines with the TNKS inhibitors XAV939 and IWR-1 dose-dependently repressed cell growth and increased cellular axin 1 and tankyrase levels. These inhibitors also repressed expression of a Wnt-responsive luciferase construct, implicating the Wnt pathway in conferring these antineoplastic effects. Individual or combined knockdown of TNKS1 and TNKS2 with siRNAs or shRNAs reduced lung cancer cell growth, stabilized axin, and repressed tumor formation in murine xenograft and syngeneic lung cancer models. Findings reported here uncovered deregulation of specific components of the Wnt pathway in both

  14. Dental anomalies in children submitted to antineoplastic therapy.

    Science.gov (United States)

    Carrillo, Camila Merida; Corrêa, Fernanda Nahás Pires; Lopes, Nilza Nelly Fontana; Fava, Marcelo; Odone Filho, Vicente

    2014-06-01

    Cancer is the third most frequent cause of death in children in Brazil. Early diagnosis and medical advances have significantly improved treatment outcomes, which has resulted in higher survival rates and the management of late side effects has become increasingly important in caring for these patients. Dental abnormalities are commonly observed as late effects of antineoplastic therapy in the oral cavity. The incidence and severity of the dental abnormalities depend on the child's age at diagnosis and the type of chemotherapeutic agent used, as well as the irradiation dose and area. The treatment duration and aggressivity should also be considered. Disturbances in dental development are characterized by changes in shape, number and root development. Enamel anomalies, such as discoloration, opacities and hypoplasia are also observed in these patients. When severe, these abnormalities can cause functional and esthetic sequelae that have an impact on the children's and adolescents' quality of life. General dentists and pediatric dentists should understand these dental abnormalities and how to identify them aiming for early diagnosis and appropriate treatment.

  15. Dental anomalies in children submitted to antineoplastic therapy

    Directory of Open Access Journals (Sweden)

    Camila Merida Carrillo

    2014-06-01

    Full Text Available Cancer is the third most frequent cause of death in children in Brazil. Early diagnosis and medical advances have significantly improved treatment outcomes, which has resulted in higher survival rates and the management of late side effects has become increasingly important in caring for these patients. Dental abnormalities are commonly observed as late effects of antineoplastic therapy in the oral cavity. The incidence and severity of the dental abnormalities depend on the child's age at diagnosis and the type of chemotherapeutic agent used, as well as the irradiation dose and area. The treatment duration and aggressivity should also be considered. Disturbances in dental development are characterized by changes in shape, number and root development. Enamel anomalies, such as discoloration, opacities and hypoplasia are also observed in these patients. When severe, these abnormalities can cause functional and esthetic sequelae that have an impact on the children's and adolescents' quality of life. General dentists and pediatric dentists should understand these dental abnormalities and how to identify them aiming for early diagnosis and appropriate treatment.

  16. Accelerator mass spectrometry analysis of 14C-oxaliplatin concentrations in biological samples and 14C contents in biological samples and antineoplastic agents

    Science.gov (United States)

    Toyoguchi, Teiko; Kobayashi, Takeshi; Konno, Noboru; Shiraishi, Tadashi; Kato, Kazuhiro; Tokanai, Fuyuki

    2015-10-01

    Accelerator mass spectrometry (AMS) is expected to play an important role in microdose trials. In this study, we measured the 14C concentration in 14C-oxaliplatin-spiked serum, urine and supernatant of fecal homogenate samples in our Yamagata University (YU) - AMS system. The calibration curves of 14C concentration in serum, urine and supernatant of fecal homogenate were linear (the correlation coefficients were ⩾0.9893), and the precision and accuracy was within the acceptance criteria. To examine a 14C content of water in three vacuum blood collection tubes and a syringe were measured. 14C was not detected from water in these devices. The mean 14C content in urine samples of 6 healthy Japanese volunteers was 0.144 dpm/mL, and the intra-day fluctuation of 14C content in urine from a volunteer was little. The antineoplastic agents are administered to the patients in combination. Then, 14C contents of the antineoplastic agents were quantitated. 14C contents were different among 10 antineoplastic agents; 14C contents of paclitaxel injection and docetaxel hydrate injection were higher than those of the other injections. These results indicate that our quantitation method using YU-AMS system is suited for microdosing studies and that measurement of baseline and co-administered drugs might be necessary for the studies in low concentrations.

  17. Preliminary screening of some traditional Zulu medicinal plants for antineoplastic activities versus the HepG2 cell line.

    Science.gov (United States)

    Opoku, A R; Geheeb-Keller, M; Lin, J; Terblanche, S E; Hutchings, A; Chuturgoon, A; Pillay, D

    2000-11-01

    Aqueous and methanol extracts of nine traditional Zulu medicinal plants, Cissus quandrangularis L., Cyphostemma flaviflorum (Sprague) Descoings, Cyphostemma lanigerum (Harv.) Descoings ex Wild & Drum, Cyphostemma natalitium (Szyszyl.) J. v. d. Merwe, Cyphostemma sp., Rhoicissus digitata (L. F.) Gilg & Brandt, Rhoicissus rhomboidea (E. Mey. Ex harv.) Planch, Rhoicissus tomentosa (Lam.) Wild & Drum, R. tridentata (L. F.) Wild & Drum and Rhoicissus tridentata (L. F.) Wild & Drum subsp. cuneifolia (Eckl. & Zeyh.) N. R. Urton, all belonging to the Vitaceae family, were evaluated to determine their therapeutic potentials as antineoplastic agents. The antiproliferative activity in vitro against HepG2 cells was determined. Twenty-two of the twenty-seven crude plant extracts showed activities ranging from 25% to 97% inhibition of proliferation when compared with the control which showed no inhibitory activity. Higher degrees of growth inhibition were found in aqueous root extracts in comparison with the methanol extracts of the same plant parts. The results show potential antineoplastic activity, indicating some scientific validation for traditional usage. Copyright 2000 John Wiley & Sons, Ltd.

  18. Applicability of the comet assay in evaluation of DNA damage in healthcare providers' working with antineoplastic drugs: a systematic review and meta-analysis.

    Science.gov (United States)

    Zare Sakhvidi, Mohammad Javad; Hajaghazadeh, Mohammad; Mostaghaci, Mehrdad; Mehrparvar, Amir Houshang; Zare Sakhvidi, Fariba; Naghshineh, Elham

    2016-01-01

    Unintended occupational exposure to antineoplastic drugs (ANDs) may occur in medical personnel. Some ANDs are known human carcinogens and exposure can be monitored by genotoxic biomarkers. To evaluate the obstacles to obtaining conclusive results from a comet assay test to determine DNA damage among AND exposed healthcare workers. We systematically reviewed studies that used alkaline comet assay to determine the magnitude and significance of DNA damage among health care workers with potential AND exposure. Fifteen studies were eligible for review and 14 studies were used in the meta-analysis. Under random effect assumption, the estimated standardized mean difference (SMD) in the DNA damage of health care workers was 1.93 (95% CI: 1.15-2.71, p comet moment, I2 test results, as a measure of heterogeneity, dropped to zero. Heterogeneity analysis showed that date of study publication was a possible source of heterogeneity (B = -0.14; p comet assay methodological variables, and exposure characteristics may be responsible for heterogenic data from comet assay studies and interfere with obtaining conclusive results. Lack of quantitative environmental exposure measures and variation in comet assay protocols across studies are important obstacles in generalization of results.

  19. Spatially explicit prioritization of human antibiotics and antineoplastics in Europe.

    Science.gov (United States)

    Oldenkamp, Rik; Huijbregts, Mark A J; Hollander, Anne; Versporten, Ann; Goossens, Herman; Ragas, Ad M J

    2013-01-01

    This paper presents a screening tool for the location-specific prioritization of human pharmaceutical emissions in Europe, based on risk quotients for the aquatic environment and human health. The tool provides direction towards either monitoring activities or additional research. Its application is illustrated for a set of 11 human antibiotics and 7 antineoplastics. Risk quotients for the aquatic environment were highest for levofloxacin, doxycycline and ciprofloxacin, located in Northern Italy (Milan region; particularly levofloxacin) and other densely populated areas in Europe (e.g. London, Krakow and the Ruhr area). Risk quotients for human health not only depend on pharmaceutical and location, but also on behavioral characteristics, such as consumption patterns. Infants in eastern Spain that consume locally produced food and conventionally treated drinking water were predicted to run the highest risks. A limited comparison with measured concentrations in surface water showed that predicted and measured concentrations are approximately within one order of magnitude. Copyright © 2012 Elsevier Ltd. All rights reserved.

  20. Bringing Radiotracing to Titanium-Based Antineoplastics: Solid Phase Radiosynthesis, PET and ex Vivo Evaluation of Antitumor Agent [45Ti](salan)Ti(dipic)

    DEFF Research Database (Denmark)

    Severin, Gregory; Nielsen, Carsten H.; Jensen, Andreas Tue Ingemann

    2015-01-01

    We present a novel solid-phase based 45Ti radiolabeling methodology and the implementation of 45Ti-PET in titanium-based antineoplastics using the showcase compound [45Ti](salan)Ti(dipic). This development is intended to allow elucidation of the biodistribution and pharmacokinetics of promising new...

  1. Accelerator mass spectrometry analysis of "1"4C-oxaliplatin concentrations in biological samples and "1"4C contents in biological samples and antineoplastic agents

    International Nuclear Information System (INIS)

    Toyoguchi, Teiko; Kobayashi, Takeshi; Konno, Noboru; Shiraishi, Tadashi; Kato, Kazuhiro; Tokanai, Fuyuki

    2015-01-01

    Accelerator mass spectrometry (AMS) is expected to play an important role in microdose trials. In this study, we measured the "1"4C concentration in "1"4C-oxaliplatin-spiked serum, urine and supernatant of fecal homogenate samples in our Yamagata University (YU) – AMS system. The calibration curves of "1"4C concentration in serum, urine and supernatant of fecal homogenate were linear (the correlation coefficients were ⩾0.9893), and the precision and accuracy was within the acceptance criteria. To examine a "1"4C content of water in three vacuum blood collection tubes and a syringe were measured. "1"4C was not detected from water in these devices. The mean "1"4C content in urine samples of 6 healthy Japanese volunteers was 0.144 dpm/mL, and the intra-day fluctuation of "1"4C content in urine from a volunteer was little. The antineoplastic agents are administered to the patients in combination. Then, "1"4C contents of the antineoplastic agents were quantitated. "1"4C contents were different among 10 antineoplastic agents; "1"4C contents of paclitaxel injection and docetaxel hydrate injection were higher than those of the other injections. These results indicate that our quantitation method using YU-AMS system is suited for microdosing studies and that measurement of baseline and co-administered drugs might be necessary for the studies in low concentrations.

  2. Accelerator mass spectrometry analysis of {sup 14}C-oxaliplatin concentrations in biological samples and {sup 14}C contents in biological samples and antineoplastic agents

    Energy Technology Data Exchange (ETDEWEB)

    Toyoguchi, Teiko, E-mail: tteiko@med.id.yamagata-u.ac.jp [Department of Pharmacy, Yamagata University Hospital, 2-2-2 Iida-Nishi, Yamagata-shi, Yamagata 990-9585 (Japan); Kobayashi, Takeshi; Konno, Noboru; Shiraishi, Tadashi [Department of Pharmacy, Yamagata University Hospital, 2-2-2 Iida-Nishi, Yamagata-shi, Yamagata 990-9585 (Japan); Kato, Kazuhiro; Tokanai, Fuyuki [Department of Physics, Faculty of Science, Yamagata University, 1-4-12 Kojirakawa-machi, Yamagata-shi, Yamagata 990-8560 (Japan)

    2015-10-15

    Accelerator mass spectrometry (AMS) is expected to play an important role in microdose trials. In this study, we measured the {sup 14}C concentration in {sup 14}C-oxaliplatin-spiked serum, urine and supernatant of fecal homogenate samples in our Yamagata University (YU) – AMS system. The calibration curves of {sup 14}C concentration in serum, urine and supernatant of fecal homogenate were linear (the correlation coefficients were ⩾0.9893), and the precision and accuracy was within the acceptance criteria. To examine a {sup 14}C content of water in three vacuum blood collection tubes and a syringe were measured. {sup 14}C was not detected from water in these devices. The mean {sup 14}C content in urine samples of 6 healthy Japanese volunteers was 0.144 dpm/mL, and the intra-day fluctuation of {sup 14}C content in urine from a volunteer was little. The antineoplastic agents are administered to the patients in combination. Then, {sup 14}C contents of the antineoplastic agents were quantitated. {sup 14}C contents were different among 10 antineoplastic agents; {sup 14}C contents of paclitaxel injection and docetaxel hydrate injection were higher than those of the other injections. These results indicate that our quantitation method using YU-AMS system is suited for microdosing studies and that measurement of baseline and co-administered drugs might be necessary for the studies in low concentrations.

  3. Improvements in Clinical Trials Information Will Improve the Reproductive Health and Fertility of Cancer Patients.

    Science.gov (United States)

    Dauti, Angela; Gerstl, Brigitte; Chong, Serena; Chisholm, Orin; Anazodo, Antoinette

    2017-06-01

    There are a number of barriers that result in cancer patients not being referred for oncofertility care, which include knowledge about reproductive risks of antineoplastic agents. Without this information, clinicians do not always make recommendations for oncofertility care. The objective of this study was to describe the level of reproductive information and recommendations that clinicians have available in clinical trial protocols regarding oncofertility management and follow-up, and the information that patients may receive in clinical trials patient information sheets or consent forms. A literature review of the 71 antineoplastic drugs included in the 68 clinical trial protocols showed that 68% of the antineoplastic drugs had gonadotoxic animal data, 32% had gonadotoxic human data, 83% had teratogenic animal data, and 32% had teratogenic human data. When the clinical trial protocols were reviewed, only 22% of the protocols reported the teratogenic risks and 32% of the protocols reported the gonadotoxic risk. Only 56% of phase 3 protocols had gonadotoxic information and 13% of phase 3 protocols had teratogenic information. Nine percent of the protocols provided fertility preservation recommendations and 4% provided reproductive information in the follow-up and survivorship period. Twenty-six percent had a section in the clinical trials protocol, which identified oncofertility information easily. When gonadotoxic and teratogenic effects of treatment were known, they were not consistently included in the clinical trial protocols and the lack of data for new drugs was not reported. Very few protocols gave recommendations for oncofertility management and follow-up following the completion of cancer treatment. The research team proposes a number of recommendations that should be required for clinicians and pharmaceutical companies developing new trials.

  4. Applicability of the comet assay in evaluation of DNA damage in healthcare providers’ working with antineoplastic drugs: a systematic review and meta-analysis

    Science.gov (United States)

    Zare Sakhvidi, Mohammad Javad; Hajaghazadeh, Mohammad; Mostaghaci, Mehrdad; Mehrparvar, Amir houshang; Zare Sakhvidi, Fariba; Naghshineh, Elham

    2016-01-01

    Background Unintended occupational exposure to antineoplastic drugs (ANDs) may occur in medical personnel. Some ANDs are known human carcinogens and exposure can be monitored by genotoxic biomarkers. Objective To evaluate the obstacles to obtaining conclusive results from a comet assay test to determine DNA damage among AND exposed healthcare workers. Methods We systematically reviewed studies that used alkaline comet assay to determine the magnitude and significance of DNA damage among health care workers with potential AND exposure. Fifteen studies were eligible for review and 14 studies were used in the meta-analysis. Results Under random effect assumption, the estimated standardized mean difference (SMD) in the DNA damage of health care workers was 1.93 (95% CI: 1.15–2.71, p comet moment, I2 test results, as a measure of heterogeneity, dropped to zero. Heterogeneity analysis showed that date of study publication was a possible source of heterogeneity (B = −0.14; p comet assay methodological variables, and exposure characteristics may be responsible for heterogenic data from comet assay studies and interfere with obtaining conclusive results. Lack of quantitative environmental exposure measures and variation in comet assay protocols across studies are important obstacles in generalization of results. PMID:27110842

  5. QSPR modeling of octanol/water partition coefficient of antineoplastic agents by balance of correlations.

    Science.gov (United States)

    Toropov, Andrey A; Toropova, Alla P; Raska, Ivan; Benfenati, Emilio

    2010-04-01

    Three different splits into the subtraining set (n = 22), the set of calibration (n = 21), and the test set (n = 12) of 55 antineoplastic agents have been examined. By the correlation balance of SMILES-based optimal descriptors quite satisfactory models for the octanol/water partition coefficient have been obtained on all three splits. The correlation balance is the optimization of a one-variable model with a target function that provides both the maximal values of the correlation coefficient for the subtraining and calibration set and the minimum of the difference between the above-mentioned correlation coefficients. Thus, the calibration set is a preliminary test set. Copyright (c) 2009 Elsevier Masson SAS. All rights reserved.

  6. New solid state forms of antineoplastic 5-fluorouracil with anthelmintic piperazine

    Science.gov (United States)

    Moisescu-Goia, C.; Muresan-Pop, M.; Simon, V.

    2017-12-01

    The aim of the present study was to asses the formation of solid forms between the 5-fluorouracil chemotherapy drug and the anthelmintic piperazine. Two new solid forms of antineoplastic agent 5-fluorouracil with anthelmintic piperazine were obtained by liquid assisted ball milling and slurry crystallization methods. The Nsbnd H hydrogen bonding donors and C = O hydrogen bonding acceptors of 5-fluorouracil allow to form co-crystals with other drugs delivering improved properties for medical applications, as proved for other compounds of pharmaceutical interest. Both new solid forms were investigated using X-ray powder diffraction (XRD), differential thermal analysis (DTA) and Fourier transform infrared (FTIR) spectroscopy. The XRD results show that by both methods were successfully synthesized new solid forms of 5-fluorouracil with piperazine. According to FTIR results the form prepared by lichid assisted grinding process was obtained as co-crystal and the other one, prepared by slurry method, resulted as a salt.

  7. Postulating a dermal pathway for exposure to anti-neoplastic drugs among hospital workers. Applying a conceptual model to the results of three workplace surveys

    NARCIS (Netherlands)

    Kromhout, H.; Hoek, F.; Uitterhoeve, R.; Huijbers, R.; Overmars, R.F.; Anzion, R.; Vermeulen, R.

    2000-01-01

    Dermal exposure to anti-neoplastic drugs has been suggested as a potentially important route of exposure of hospital workers. Three small-scale workplace surveys were carried out in several hospitals focusing on contamination by leakage from IV infusion systems; contamination by spilled urine of

  8. Injectable-antineoplastic-drug practices in Michigan hospitals.

    Science.gov (United States)

    Cohen, I A; Newland, S J; Kirking, D M

    1987-05-01

    Practices related to parenteral (injectable) antineoplastic drugs (PADs) in Michigan hospitals were surveyed. All hospitals in Michigan were surveyed to assess compliance with American Society of Hospital Pharmacists (ASHP) and Occupational Safety and Health Administration (OSHA) recommendations related to PADs. Other PAD-related practice issues not covered within those guidelines were also studied. Surveys were mailed to the pharmacy directors of the state's 192 acute-care hospitals. Included were questions concerning policies and procedures for ordering, storing, preparing, handling, labeling, transporting, administering, and disposing of PADs. Questions concerning staff education, spill cleanup, and personnel issues were also included. A total of 169 questionnaires were returned, yielding a response rate of 88%. Of those respondents, 132 indicated that they prepare PAD doses for inpatients. Adherence rates were high for several of the PAD-preparation recommendations, including handwashing (97%) and gloving (98.5%). Rates for gowning (71.2%), labeling of PAD doses as biohazards (chemical hazards) (73.5%), and use of Class II biological-safety cabinets (71.2%) were less favorable. Practice areas with relatively poor adherence rates included use of plastic-backed absorbent pads under PAD preparation areas (53.8%), storing PADs separately from other drugs (48.5%), informing prospective employees of potential risks of handling PADs (36.4%), availability of spill kits (36.4%), and attaching and priming i.v. tubing before adding PADs to i.v. containers (5.4%). Many pharmacy departments in Michigan hospitals can substantially improve their adherence to ASHP and OSHA recommendations related to PADs.

  9. Peroxisome Proliferator-Activated Receptors (PPARs as Potential Inducers of Antineoplastic Effects in CNS Tumors

    Directory of Open Access Journals (Sweden)

    Lars Tatenhorst

    2008-01-01

    Full Text Available The peroxisome proliferator-activated receptors (PPARs are ligand-inducible transcription factors which belong to the superfamily of nuclear hormone receptors. In recent years it turned out that natural as well as synthetic PPAR agonists exhibit profound antineoplastic as well as redifferentiation effects in tumors of the central nervous system (CNS. The molecular understanding of the underlying mechanisms is still emerging, with partially controverse findings reported by a number of studies dealing with the influence of PPARs on treatment of tumor cells in vitro. Remarkably, studies examining the effects of these drugs in vivo are just beginning to emerge. However, the agonists of PPARs, in particular the thiazolidinediones, seem to be promising candidates for new approaches in human CNS tumor therapy.

  10. Synthesis and Anchoring of Antineoplastic Ferrocene and Phthalocyanine Derivatives on Water-Soluble Polymeric Drug Carriers Derived from Lysine and Aspartic Acid

    OpenAIRE

    Maree, M. David; Neuse, Eberhard W.; Erasmus, Elizabeth; Swarts, Jannie C.

    2007-01-01

    The general synthetic strategy towards water-soluble biodegradable drug carriers and the properties that they must have are discussed. The syntheses of water-soluble biodegradable copolymers of lysine and aspartic acid as potential drug-delivering devices, having amine-functionalised side chains are then described. Covalent anchoring of carboxylic acid derivatives of the antineoplastic ferrocene and photodynamically active phthalocyanine moieties to the amine-containing drug carrier copolymer...

  11. To Take or Not to Take With Meals? Unraveling Issues Related to Food Effects Labeling for Oral Antineoplastic Drugs.

    Science.gov (United States)

    Deng, Jiexin; Brar, Satjit S; Lesko, Lawrence J

    2017-12-02

    There has been controversy regarding whether bioavailability of certain oral oncology drugs should be maximized by taking these medications with food, irrespective of label instructions in the dosing and administration section. To provide insight into this controversy, we conducted an in-depth analysis for oral antineoplastic drugs approved by the Food and Drug Administration in 2000-2016 and identified important issues influencing food labeling decisions. Furthermore, a case study involving sonidegib, a drug approved for locally advanced basal cell carcinoma with a significant food effect on exposure, was used to demonstrate the consequences of failure to adhere to food label recommendations using drug-specific population pharmacokinetic and exposure-toxicity models. In 2000-2009, 80% (4 out of 5) of all approved oral antineoplastics with increased bioavailability in the fed state were labeled as "take on empty stomach." In contrast, we found that in 2010-2016 there is a greater diversity in food recommendations for drugs with increased bioavailability in the fed state. Currently, many oral oncology drugs are given with food to maximize their bioavailability; however, as seen from our case study of sonidegib, failure to fully adhere to label recommendations to either take with food or not could lead to adverse consequences in terms of safety and efficacy. © 2017, The American College of Clinical Pharmacology.

  12. Near-infrared fluorescence imaging and photodynamic therapy with indocyanine green lactosome has antineoplastic effects for hepatocellular carcinoma.

    Directory of Open Access Journals (Sweden)

    Takumi Tsuda

    Full Text Available Anticancer agents and operating procedures have been developed for hepatocellular carcinoma (HCC patients, but their prognosis remains poor. It is necessary to develop novel diagnostic and therapeutic strategies for HCC to improve its prognosis. Lactosome is a core-shell-type polymeric micelle, and enclosing labeling or anticancer agents into this micelle enables drug delivery. In this study, we investigated the diagnostic and therapeutic efficacies of indocyanine green (ICG-loaded lactosome for near-infrared fluorescence (NIF imaging and photodynamic therapy (PDT for HCC.The human HCC cell line HuH-7 was treated with ICG or ICG-lactosome, followed by PDT, and the cell viabilities were measured (in vitro PDT efficiency. For NIF imaging, HuH-7 cells were subcutaneously transplanted into BALB/c nude mice, followed by intravenous administration of ICG or ICG-lactosome. The transplanted animals were treated with PDT, and the antineoplastic effects were analyzed (in vivo PDT efficiency.PDT had toxic effects on HuH-7 cells treated with ICG-lactosome, but not ICG alone. NIF imaging revealed that the fluorescence of tumor areas in ICG-lactosome-treated animals was higher than that of contralateral regions at 24 h after injection and thereafter. PDT exerted immediate and continuous phototoxic effects in the transplanted mice treated with ICG-lactosome.Our results demonstrate that ICG-lactosome accumulated in xenograft tumors, and that PDT had antineoplastic effects on these malignant implants. NIF imaging and PDT with ICG-lactosome could be useful diagnostic and/or therapeutic strategies for HCC.

  13. Effect of corticosteroids on phlebitis induced by intravenous infusion of antineoplastic agents in rabbits.

    Science.gov (United States)

    Kohno, Emiko; Murase, Saori; Matsuyama, Kenji; Okamura, Noboru

    2009-08-06

    Phlebitis caused by intravenous infusion of antineoplastic agents is one of the critical problems when anticancer therapy is prolonged. We have already reported that both rapid infusion and dilution of the injection solution were effective methods for reducing phlebitis caused by vinorelbine (VNR) in rabbits. The aim of this study was to explore other practical methods for preventing phlebitis caused by VNR and doxorubicin (DXR) in a rabbit model. VNR is often used with cisplatin, and dexamethasone (DEX) has been co-administered for prevention of cisplatin-induced nausea. DXR is used with prednisolone (PSL) in the CHOP regimen for the treatment of non-Hodgkin's lymphoma. Therefore, the present study investigated the prevention of phlebitis due to VNR with DEX and that due to DXR with PSL. VNR and DXR were diluted with normal saline to prepare test solutions at concentrations of 0.6 mg/mL and 1.4 mg/mL, respectively. Each test solution was infused into the auricular veins of rabbits. Two days after VNR infusion and three days after DXR infusion, the veins were evaluated histopathologically. The effect of DEX on VNR-induced phlebitis was evaluated by infusion of DEX before or after VNR. The effect of PSL on DXR-induced phlebitis was similarly evaluated by co-infusion of PSL. The histopathological features of phlebitis caused by the antineoplastic agents differed between VNR and DXR: VNR did not cause the loss of venous endothelial cells, but caused inflammatory cell infiltration, edema, and epidermal degeneration. In contrast, DXR caused the loss of venous endothelial cells and chrondrocyte necrosis. Pre-treatment and post-treatment with DEX significantly decreased VNR-induced phlebitis compared with the control group and pre-treatment was particularly effective. Co-infusion of PSL also significantly decreased phlebitis caused by DXR, but its effect was less marked. The present findings suggested that pre-treatment with DEX may be a useful method for preventing

  14. Antineoplastic Effect of Decoy Oligonucleotide Derived from MGMT Enhancer

    Science.gov (United States)

    Refael, Miri; Zrihan, Daniel; Siegal, Tali; Lavon, Iris

    2014-01-01

    Silencing of O(6)-methylguanine-DNA-methyltransferase (MGMT) in tumors, mainly through promoter methylation, correlates with a better therapeutic response and with increased survival. Therefore, it is conceivable to consider MGMT as a potential therapeutic target for the treatment of cancers. Our previous results demonstrated the pivotal role of NF-kappaB in MGMT expression, mediated mainly through p65/NF-kappaB homodimers. Here we show that the non-canonical NF-KappaB motif (MGMT-kappaB1) within MGMT enhancer is probably the major inducer of MGMT expression following NF-kappaB activation. Thus, in an attempt to attenuate the transcription activity of MGMT in tumors we designed locked nucleic acids (LNA) modified decoy oligonucleotides corresponding to the specific sequence of MGMT-kappaB1 (MGMT-kB1-LODN). Following confirmation of the ability of MGMT-kB1-LODN to interfere with the binding of p65/NF-kappaB to the NF-KappaB motif within MGMT enhancer, the efficacy of the decoy was studied in-vitro and in-vivo. The results of these experiments show that the decoy MGMT-kB1-LODN have a substantial antineoplastic effect when used either in combination with temozolomide or as monotherapy. Our results suggest that MGMT-kB1-LODN may provide a novel strategy for cancer therapy. PMID:25460932

  15. Antineoplastic effect of decoy oligonucleotide derived from MGMT enhancer.

    Directory of Open Access Journals (Sweden)

    Tamar Canello

    Full Text Available Silencing of O(6-methylguanine-DNA-methyltransferase (MGMT in tumors, mainly through promoter methylation, correlates with a better therapeutic response and with increased survival. Therefore, it is conceivable to consider MGMT as a potential therapeutic target for the treatment of cancers. Our previous results demonstrated the pivotal role of NF-kappaB in MGMT expression, mediated mainly through p65/NF-kappaB homodimers. Here we show that the non-canonical NF-KappaB motif (MGMT-kappaB1 within MGMT enhancer is probably the major inducer of MGMT expression following NF-kappaB activation. Thus, in an attempt to attenuate the transcription activity of MGMT in tumors we designed locked nucleic acids (LNA modified decoy oligonucleotides corresponding to the specific sequence of MGMT-kappaB1 (MGMT-kB1-LODN. Following confirmation of the ability of MGMT-kB1-LODN to interfere with the binding of p65/NF-kappaB to the NF-KappaB motif within MGMT enhancer, the efficacy of the decoy was studied in-vitro and in-vivo. The results of these experiments show that the decoy MGMT-kB1-LODN have a substantial antineoplastic effect when used either in combination with temozolomide or as monotherapy. Our results suggest that MGMT-kB1-LODN may provide a novel strategy for cancer therapy.

  16. [Blending powdered antineoplastic medicine in disposable ointment container].

    Science.gov (United States)

    Miyazaki, Yasunori; Uchino, Tomonobu; Kagawa, Yoshiyuki

    2014-01-01

    On dispensing powdered antineoplastic medicines, it is important to prevent cross-contamination and environmental exposure. Recently, we developed a method for blending powdered medicine in a disposable ointment container using a planetary centrifugal mixer. The disposable container prevents cross-contamination. In addition, environmental exposure associated with washing the apparatus does not arise because no blending blade is used. In this study, we aimed to confirm the uniformity of the mixture and weight loss of medicine in the blending procedure. We blended colored lactose powder with Leukerin(®) or Mablin(®) powders using the new method and the ordinary pestle and mortar method. Then, the blending state was monitored using image analysis. Blending variables, such as the blending ratio (1:9-9:1), container size (35-125 mL), and charging rate (20-50%) in the container were also investigated under the operational conditions of 500 rpm and 50 s. At a 20% charging rate in a 35 mL container, the blending precision of the mixtures was not influenced by the blending ratio, and was less than 6.08%, indicating homogeneity. With an increase in the charging rate, however, the blending precision decreased. The possible amount of both mixtures rose to about 17 g with a 20% charging rate in a 125 mL container. Furthermore, weight loss of medicines with this method was smaller than that with the pestle and mortar method, suggesting that this method is safer for pharmacists. In conclusion, we have established a precise and safe method for blending powdered medicines in pharmacies.

  17. Vitamin E succinate is a potent novel antineoplastic agent with high selectivity and cooperativity with tumor necrosis factor-related apoptosis-inducing ligand (Apo2 ligand) in vivo

    Czech Academy of Sciences Publication Activity Database

    Weber, T.; Lu, M.; Anděra, Ladislav; Lahm, H.; Gellert, N.; Fariss, M. W.; Kořínek, Vladimír; Sattler, W.; Ucker, D. S.; Terman, A.; Schroder, A.; Erl, W.; Brunk, U. T.; Coffey, R. J.; Weber, C.; Neuzil, J.

    2002-01-01

    Roč. 8, - (2002), s. 863-869 ISSN 1078-0432 R&D Projects: GA ČR GA312/99/0348 Institutional research plan: CEZ:AV0Z5052915 Keywords : Vitamin E, Antineoplastic Agent, Tumor Necrosis Factor Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 5.991, year: 2002

  18. The anti-neoplastic activity of Vandetanib against high-risk medulloblastoma variants is profoundly enhanced by additional PI3K inhibition.

    Science.gov (United States)

    Craveiro, Rogerio B; Ehrhardt, Michael; Velz, Julia; Olschewski, Martin; Goetz, Barbara; Pietsch, Torsten; Dilloo, Dagmar

    2017-07-18

    Medulloblastoma is comprised of at least four molecular subgroups with distinct clinical outcome (WHO classification 2016). SHH-TP53-mutated as well as MYC-amplified Non-WNT/Non-SHH medulloblastoma show the worst prognosis.Here we present evidence that single application of the multi-kinase inhibitor Vandetanib displays anti-neoplastic efficacy against cell lines derived from high-risk SHH-TP53-mutated and MYC-amplified Non-WNT/Non-SHH medulloblastoma. The narrow target spectrum of Vandetanib along with a favourable toxicity profile renders this drug ideal for multimodal treatment approaches. In this context our investigation documents that Vandetanib in combination with the clinically available PI3K inhibitor GDC-0941 leads to enhanced cytotoxicity against MYC-amplified and SHH-TP53-mutated medulloblastoma. In line with these findings we show for MYC-amplified medulloblastoma a profound reduction in activity of the oncogenes STAT3 and AKT. Furthermore, we document that Vandetanib and the standard chemotherapeutic Etoposide display additive anti-neoplastic efficacy in the investigated medulloblastoma cell lines that could be further enhanced by PI3K inhibition. Of note, the combination of Vandetanib, GDC-0941 and Etoposide results in MYC-amplified and SHH-TP53-mutated cell lines in complete loss of cell viability. Our findings therefore provide a rational to further evaluate Vandetanib in combination with PI3K inhibitors as well as standard chemotherapeutics in vivo for the treatment of most aggressive medulloblastoma variants.

  19. Antineoplastic Activities of MT81 and Its Structural Analogue in Ehrlich Ascites Carcinoma-Bearing Swiss Albino Mice

    Directory of Open Access Journals (Sweden)

    Sujata Maiti Choudhury

    2010-01-01

    Full Text Available Many fungal toxins exhibit in vitro and in vivo antineoplastic effects on various cancer cell types. Luteoskyrin, a hydroxyanthraquinone has been proved to be a potent inhibitor against Ehrlich ascites tumor cells. The comparative antitumor activity and antioxidant status of MT81 and its structural analogue [Acetic acid-MT81 (Aa-MT81] having polyhydroxyanthraquinone structure were assessed against Ehrlich ascites carcinoma (EAC tumor in mice. The in vitro cytotoxicity was measured by the viability of EAC cells after direct treatment of the said compounds. In in vivo study, MT81 and its structural analogue were administered (i.p. at the two different doses (5, 7 mg MT81; 8.93, 11.48 mg Aa-MT81/kg body weight for 7 days after 24 hrs. of tumor inoculation. The activities were assessed using mean survival time (MST, increased life span (ILS, tumor volume, viable tumor cell count, peritoneal cell count, protein percentage and hematological parameters. Antioxidant status was determined by malondialdehyde (MDA and reduced glutathione (GSH content, and by the activity of superoxide dismutase (SOD and catalase (CA T. MT81 and its structural analogues increased the mean survival time, normal peritoneal cell count. They decreased the tumor volume, viable tumor cell count, hemoglobin percentage and packed cell volume. Differential counts of WBC, total counts of RBC & WBC that altered by EAC inoculation, were restored in a dose-dependent manner. Increased MDA and decreased GSH content and reduced activity of SOD, and catalase in EAC bearing mice were returned towards normal after the treatment of MT81 and its structural analogue. Being less toxic than parent toxin MT81, the structural analogue showed more prominent antineoplastic activities against EAC cells compared to MT81. At the same time, both compounds exhibit to some extent antioxidant potential for the EAC-bearing mice.

  20. The Antineoplastic Effect of Nitric Oxide-Donating Acetylsalicylic Acid (NO-ASA) in Chronic Lymphocytic Leukemia (CLL) Cells is Highly Dependent on its Positional Isomerism.

    Science.gov (United States)

    Gehrke, Iris; Razavi, Regina; Poll-Wolbeck, Simon Jonas; Berkessel, Albrecht; Hallek, Michael; Kreuzer, Karl-Anton

    2011-10-01

    Chronic Lymphocytic Leukemia (CLL) is not curable in patients that are not eligible for allogeneic stem cell transplantation. Therefore, new treatment options are highly desirable. Chemically modified nonsteroidal anti-inflammatory drugs (NSAIDs), such as nitric-oxide-donating acetylsalicylic acid (NO-ASA), have been described to possess antineoplastic capacity. Recently, we could demonstrate a potent apoptosis induction in primary CLL cells in vitro and tumor growth inhibition by para-NO-ASA in a xenograft mouse model. However, little is known about the impact of positional isomerism of NO-ASA on its antineoplastic capacity in CLL. Primary CLL cells were treated with the meta-or para-isomer of NO-ASA at varying concentrations and durations. Viability was assessed flow cytometrically by annexin V-FITC/PI staining and by CellTiter-Glo luminescence cell viability assay. Caspase and PARP cleavage as well as involvement of β-catenin/Lef-1 signaling was determined by immunoblotting. For caspase inhibition, BD™ ApoBlock was used. Nude mice were xenografted with JVM3 cells and treated with meta-NO-ASA, para-NO-ASA or vehicle control. The meta-isomer was entirely ineffective in inducing CLL cell apoptosis in concentrations up to 100 μM, while para-NO-ASA acted in the low micromolar range. meta-NO-ASA, in contrast to para-NO-ASA, did not alter caspase activity. While para-NO-ASA action involved inhibition of β-catenin/Lef-1 signaling, meta-NO-ASA did not show any impact on this signaling pathway. Further, meta-NO-ASA did not significantly reduce tumor growth in a CLL xenograft mouse model, while para-NO-ASA was highly potent. We conclude that positional isomerism is crucial for the antineoplastic effect of NO-ASA in CLL. It can be suggested that the para-isomer, but not the meta-isomer, generates a chemical structure which is essential for the neoplastic effect of NO-ASA.

  1. Study of antineoplastic action of novel isomeric derivatives of 4-thiazolidinone

    Directory of Open Access Journals (Sweden)

    М. R. Fil

    2014-12-01

    Full Text Available Pyrazole- and aryl-substituted derivatives of 4-thiazolidinone belong to a perspective group of compounds with potential antitumor action. Earlier, we have demonstrated high toxicity in vitro of several 4-thiazolidinones derivatives towards tumor cell lines. To further enhance the antitumor activity of novel 4-thiazolidinones, their chemical scaffold was optimized, and new pyrazole-thiazolidinones were synthesized. That allowed us to combine in one molecule the potential pharmacophore centres of previously tested compounds. As a result, “hybrid” 4-thiazolidinones exhibit higher toxicity in vitro toward tumor cells of various origin. The molecular mechanisms of antineoplastic activity of these compounds and intensity of induction of apoptosis strongly depended on the position of the substituent in the thiazolidinone cycle. In particular, Les-3661 compound, containing pyrazoline fragment in the 4th position of thiazolidinone core, exhibits 14 times higher cytotoxic activity towards tumor cells (LC50 = 3 µM in comparison to its 2-substituted isomer Les-3713 (LC50 = 42 µM. It is demonstrated that in terms of underlying molecular mechanisms for cytotoxic effect the Les-3661 compound induced caspase-8 and caspase-9 dependent mixed-type of apoptosis, while Les-3713 induced apoptosis mediated only by the caspase-8.

  2. A Novel Insight into the Cardiotoxicity of Antineoplastic Drug Doxorubicin

    Directory of Open Access Journals (Sweden)

    Zbynek Heger

    2013-10-01

    Full Text Available Doxorubicin is a commonly used antineoplastic agent in the treatment of many types of cancer. Little is known about the interactions of doxorubicin with cardiac biomolecules. Serious cardiotoxicity including dilated cardiomyopathy often resulting in a fatal congestive heart failure may occur as a consequence of chemotherapy with doxorubicin. The purpose of this study was to determine the effect of exposure to doxorubicin on the changes in major amino acids in tissue of cardiac muscle (proline, taurine, glutamic acid, arginine, aspartic acid, leucine, glycine, valine, alanine, isoleucine, threonine, lysine and serine. An in vitro interaction study was performed as a comparison of amino acid profiles in heart tissue before and after application of doxorubicin. We found that doxorubicin directly influences myocardial amino acid representation even at low concentrations. In addition, we performed an interaction study that resulted in the determination of breaking points for each of analyzed amino acids. Lysine, arginine, β-alanine, valine and serine were determined as the most sensitive amino acids. Additionally we compared amino acid profiles of myocardium before and after exposure to doxorubicin. The amount of amino acids after interaction with doxorubicin was significantly reduced (p = 0.05. This fact points at an ability of doxorubicin to induce changes in quantitative composition of amino acids in myocardium. Moreover, this confirms that the interactions between doxorubicin and amino acids may act as another factor most likely responsible for adverse effects of doxorubicin on myocardium.

  3. Relevance of the OCT1 transporter to the antineoplastic effect of biguanides

    International Nuclear Information System (INIS)

    Segal, Eric D.; Yasmeen, Amber; Beauchamp, Marie-Claude; Rosenblatt, Joshua; Pollak, Michael; Gotlieb, Walter H.

    2011-01-01

    Highlights: ► siRNA knockdown of OCT1 reduced sensitivity of EOC cells to metformin, but not to another biguanide, phenformin. ► Suppression of OCT1 also affects the activation of AMP kinase in response to metformin, but not to phenformin. ► Direct actions of metformin may be limited by low OCT1 expression in EOC tumors. ► Phenformin could be used as an alternative biguanide. -- Abstract: Epidemiologic and laboratory data suggesting that metformin has antineoplastic activity have led to ongoing clinical trials. However, pharmacokinetic issues that may influence metformin activity have not been studied in detail. The organic cation transporter 1 (OCT1) is known to play an important role in cellular uptake of metformin in the liver. We show that siRNA knockdown of OCT1 reduced sensitivity of epithelial ovarian cancer cells to metformin, but interestingly not to another biguanide, phenformin, with respect to both activation of AMP kinase and inhibition of proliferation. We observed that there is heterogeneity between primary human tumors with respect to OCT1 expression. These results suggest that there may be settings where drug uptake limits direct action of metformin on neoplastic cells, raising the possibility that metformin may not be the optimal biguanide for clinical investigation.

  4. Uncaria tomentosa exerts extensive anti-neoplastic effects against the Walker-256 tumour by modulating oxidative stress and not by alkaloid activity.

    Directory of Open Access Journals (Sweden)

    Arturo Alejandro Dreifuss

    Full Text Available This study aimed to compare the anti-neoplastic effects of an Uncaria tomentosa (UT brute hydroethanolic (BHE extract with those of two fractions derived from it. These fractions are choroformic (CHCl3 and n-butanolic (BuOH, rich in pentacyclic oxindole alkaloids (POA and antioxidant substances, respectively. The cancer model was the subcutaneous inoculation of Walker-256 tumour cells in the pelvic limb of male Wistar rat. Subsequently to the inoculation, gavage with BHE extract (50 mg.kg(-1 or its fractions (as per the yield of the fractioning process or vehicle (Control was performed during 14 days. Baseline values, corresponding to individuals without tumour or treatment with UT, were also included. After treatment, tumour volume and mass, plasma biochemistry, oxidative stress in liver and tumour, TNF-α level in liver and tumour homogenates, and survival rates were analysed. Both the BHE extract and its BuOH fraction successfully reduced tumour weight and volume, and modulated anti-oxidant systems. The hepatic TNF-α level indicated a greater effect from the BHE extract as compared to its BuOH fraction. Importantly, both the BHE extract and its BuOH fraction increased the survival time of the tumour-bearing animals. Inversely, the CHCl3 fraction was ineffective. These data represent an in vivo demonstration of the importance of the modulation of oxidative stress as part of the anti-neoplastic activity of UT, as well as constitute evidence of the lack of activity of isolated POAs in the primary tumour of this tumour lineage. These effects are possibly resulting from a synergic combination of substances, most of them with antioxidant properties.

  5. Concanavalin A: A potential anti-neoplastic agent targeting apoptosis, autophagy and anti-angiogenesis for cancer therapeutics

    International Nuclear Information System (INIS)

    Li, Wen-wen; Yu, Jia-ying; Xu, Huai-long; Bao, Jin-ku

    2011-01-01

    Highlights: → ConA induces cancer cell death targeting apoptosis and autophagy. → ConA inhibits cancer cell angiogenesis. → ConA is utilized in pre-clinical and clinical trials. -- Abstract: Concanavalin A (ConA), a Ca 2+ /Mn 2+ -dependent and mannose/glucose-binding legume lectin, has drawn a rising attention for its remarkable anti-proliferative and anti-tumor activities to a variety of cancer cells. ConA induces programmed cell death via mitochondria-mediated, P73-Foxo1a-Bim apoptosis and BNIP3-mediated mitochondrial autophagy. Through IKK-NF-κB-COX-2, SHP-2-MEK-1-ERK, and SHP-2-Ras-ERK anti-angiogenic pathways, ConA would inhibit cancer cell survival. In addition, ConA stimulates cell immunity and generates an immune memory, resisting to the same genotypic tumor. These biological findings shed light on new perspectives of ConA as a potential anti-neoplastic agent targeting apoptosis, autophagy and anti-angiogenesis in pre-clinical or clinical trials for cancer therapeutics.

  6. Relevance of the OCT1 transporter to the antineoplastic effect of biguanides

    Energy Technology Data Exchange (ETDEWEB)

    Segal, Eric D.; Yasmeen, Amber; Beauchamp, Marie-Claude; Rosenblatt, Joshua [Division of Gynecologic Oncology, Jewish General Hospital, McGill University, Montreal, Quebec (Canada); Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Pollak, Michael [Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Department of Oncology, McGill University, Montreal, Quebec (Canada); Gotlieb, Walter H., E-mail: walter.gotlieb@mcgill.ca [Division of Gynecologic Oncology, Jewish General Hospital, McGill University, Montreal, Quebec (Canada); Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Department of Oncology, McGill University, Montreal, Quebec (Canada)

    2011-11-04

    Highlights: Black-Right-Pointing-Pointer siRNA knockdown of OCT1 reduced sensitivity of EOC cells to metformin, but not to another biguanide, phenformin. Black-Right-Pointing-Pointer Suppression of OCT1 also affects the activation of AMP kinase in response to metformin, but not to phenformin. Black-Right-Pointing-Pointer Direct actions of metformin may be limited by low OCT1 expression in EOC tumors. Black-Right-Pointing-Pointer Phenformin could be used as an alternative biguanide. -- Abstract: Epidemiologic and laboratory data suggesting that metformin has antineoplastic activity have led to ongoing clinical trials. However, pharmacokinetic issues that may influence metformin activity have not been studied in detail. The organic cation transporter 1 (OCT1) is known to play an important role in cellular uptake of metformin in the liver. We show that siRNA knockdown of OCT1 reduced sensitivity of epithelial ovarian cancer cells to metformin, but interestingly not to another biguanide, phenformin, with respect to both activation of AMP kinase and inhibition of proliferation. We observed that there is heterogeneity between primary human tumors with respect to OCT1 expression. These results suggest that there may be settings where drug uptake limits direct action of metformin on neoplastic cells, raising the possibility that metformin may not be the optimal biguanide for clinical investigation.

  7. Important exposure controls for protection against antineoplastic agents: Highlights for oncology health care workers.

    Science.gov (United States)

    Alehashem, Maryam; Baniasadi, Shadi

    2018-01-01

    A great number of antineoplastic drugs (ANPDs) are used globally in cancer treatment. Due to their adverse health effects, occupational exposure to ANPDs is considered a potential health risk to health care workers. The current study aimed to evaluate safe-handling practices of ANPDs, exposure controls, and adverse health implications for health care providers exposed to ANDPs. Prevention measures, including engineering, administrative, and work practice controls, as well as personal protective equipment (PPE), were recorded daily through a questionnaire for six weeks. Acute adverse health effects experienced by health care workers were also documented. The implemented exposure controls for preparation, administration, cleaning, and waste disposal were not in accordance with the safe handling guidelines. Central nervous system disorders (26.33%) were the most frequent acute adverse effects reported by health care workers. A significant correlation was found between the number of experienced adverse effects and handling characteristics, including the number of preparations (r = 0.38, p health care workers were in danger of exposure to ANPDs and experienced acute adverse health effects. Implementation of appropriate exposure controls is required to prevent occupational exposure to ANPDs.

  8. Sesquiterpene lactones: Mechanism of antineoplastic activity; relationship of cellular glutathione to cytotoxicity; and disposition

    International Nuclear Information System (INIS)

    Grippo, A.A.

    1987-01-01

    Helenalin, a sesquiterpene lactone, inhibited the growth of P388 lymphocytic and L1210 lymphoid leukemia, and Ehrlich ascites and KB carcinoma cells. The L1210 leukemia cells were most sensitive to the cytotoxic effects of helenalin. Helenalin's antineoplastic effects were due to inhibition of DNA synthesis by suppressing the activities of enzymes involved in this biosynthetic pathway; i.e., IMP dehydrogenase, ribonucleoside diphosphate reductase, thioredoxin complex, GSH disulfide oxidoreductase and DNA polymerase α activities. The relationship of reduced glutathione (GSH) to the cytotoxic effects of helanalin was evaluated. L1210 cells, which were more sensitive to helenalin's toxicity, contained lower basal concentrations of GSH. Helenalin decreased the concentration of reduced glutathione in both L1210 and P388 leukemia cells. Concurrent administration of helanalin with agents reported to raise GSH concentrations did not substantially effect GSH levels, nor were survival times of tumor-bearing mice enhanced. Following intraperitoneal administration of 3 H-plenolin, no radioactive drug and/or metabolite was sequestered in the organs of BDF 1 mice. Approximately 50% of 3 H-plenolin and/or its metabolites were eliminated via urine while lesser amounts of radioactive drug and/or metabolites were eliminated in the feces

  9. Measurement of surface contamination by certain antineoplastic drugs using high-performance liquid chromatography: applications in occupational hygiene investigations in hospital environments.

    Science.gov (United States)

    Rubino, F M; Floridia, L; Pietropaolo, A M; Tavazzani, M; Colombi, A

    1999-01-01

    Within the context of continuing interest in occupational hygiene of hospitals as workplaces, the authors report the results of a preliminary study on surface contamination by certain antineoplastic drugs (ANDs), recently performed in eight cancer departments of two large general hospitals in Milan, Italy. Since reliable quantitative information on the exposure levels to individual drugs is mandatory to establish a strong interpretative framework for correctly assessing the health risks associated with manipulation of ANDs and rationally advise intervention priorities for exposure abatement, two automated analytical methods were set up using reverse-phase high-performance liquid chromatography for the measurement of contamination by 1) methotrexate (MTX) and 2) the three most important nucleoside analogue antineoplastic drugs (5-fluorouracil 5FU, Cytarabin CYA, Gemcytabin GCA) on surfaces such as those of preparation hoods and work-benches in the pharmacies of cancer wards. The methods are characterized by short analysis time (7 min) under isocratic conditions, by the use of a mobile phase with a minimal content of organic solvent and by high sensitivity, adequate to detect surface contamination in the 5-10 micrograms/m2 range. To exemplify the performance of the analytical methods in the assessment of contamination levels from the target analyte ANDs, data are reported on the contamination levels measured on various surfaces (such as on handles, floor surfaces and window panes, even far from the preparation hood). Analyte concentrations corresponding to 0.8-1.5 micrograms of 5FU were measured on telephones, 0.85-28 micrograms/m2 of CYA were measured on tables, 1.2-1150 micrograms/m2 of GCA on furniture and floors. Spillage fractions between 1-5% of the used ANDs (daily use 5FU 7-13 g; CYA 0.1-7.1 g; GCA 0.2-5 g) were measured on the disposable polythene-backed paper cover sheet of the preparation hood.

  10. Biological activity of some novel synthesized 2-(4-methylbenzenesulphonamidopentanedioic acid bis amide derivatives: In vitro and in vivo antineoplastic activity

    Directory of Open Access Journals (Sweden)

    Satyajit Dutta

    2014-12-01

    Full Text Available In the present work few novel 2-(4-methylbenzenesulphonamidopentanedioic acid bis amide derivatives and the basic compound 2-(4-methylphenylsulfonamidopentanedioic acid have been synthesized, characterized and screened for their possible antineoplastic activity both in vitro and in vivo. The in vitro activity was performed against five human cell lines like human breast cancer (MCF-7, leukemia (K-562, ovarian cancer (OVACAR-3, human colon adenocarcinoma (HT-29 and Human kidney carcinoma (A-498. The in vivo activity was performed in female swiss albino mice against Ehrlich ascites carcinoma (EAC. Among the synthesized compounds, ureide, anilide, p-nitoanilide and o-bromoanilide derivatives of 2-(4-methyl benzene sulphonyl-pentanedioic acid bis amides showed encouraging activity in both the in vitro and in vivo compared to other compounds.

  11. The FDA approved PI3K inhibitor GDC-0941 enhances in vitro the anti-neoplastic efficacy of Axitinib against c-myc-amplified high-risk medulloblastoma.

    Science.gov (United States)

    Ehrhardt, Michael; Craveiro, Rogerio B; Velz, Julia; Olschewski, Martin; Casati, Anna; Schönberger, Stefan; Pietsch, Torsten; Dilloo, Dagmar

    2018-04-01

    Aberrant receptor kinase signalling and tumour neovascularization are hallmarks of medulloblastoma development and are both considered valuable therapeutic targets. In addition to VEGFR1/2, expression of PDGFR α/β in particular has been documented as characteristic of metastatic disease correlating with poor prognosis. Therefore, we have been suggested that the clinically approved multi-kinase angiogenesis inhibitor Axitinib, which specifically targets these kinases, might constitute a promising option for medulloblastoma treatment. Indeed, our results delineate anti-neoplastic activity of Axitinib in medulloblastoma cell lines modelling the most aggressive c-myc-amplified Non-WNT/Non-SHH and SHH-TP53-mutated tumours. Exposure of medulloblastoma cell lines to Axitinib results in marked inhibition of proliferation and profound induction of cell death. The differential efficacy of Axitinib is in line with target expression of medulloblastoma cells identifying VEGFR 1/2, PDGFR α/β and c-kit as potential markers for drug application. The high specificity of Axitinib and the consequential low impact on the haematopoietic and immune system render this drug ideal multi-modal treatment approaches. In this context, we demonstrate that the clinically available PI3K inhibitor GDC-0941 enhances the anti-neoplastic efficacy of Axitinib against c-myc-amplified medulloblastoma. Our findings provide a rational to further evaluate Axitinib alone and in combination with other therapeutic agents for the treatment of most aggressive medulloblastoma subtypes. © 2018 The Authors. Journal of Cellular and Molecular Medicine published by John Wiley & Sons Ltd and Foundation for Cellular and Molecular Medicine.

  12. The emerging role of antineoplastic agents in the treatment of keloids and hypertrophic scars: a review.

    Science.gov (United States)

    Shridharani, Sachin M; Magarakis, Michael; Manson, Paul N; Singh, Navin K; Basdag, Basak; Rosson, Gedge D

    2010-03-01

    The management of keloids and hypertrophic scars continues to challenge health-care providers. Though both forms of pathologic scarring are distinct entities at the macro and microscopic level, their etiologies and treatment are often similar. Potential treatment approaches are progressing, and combinations of treatment options have been proposed in the literature with promising outcomes. The treatment evolution has reached a level where molecular therapeutic modalities are being investigated. Currently, no gold standard treatment exists. Overall success rates and patient satisfaction seem to be slowly climbing, but additional investigational studies must continue to be performed. Several studies have investigated antineoplastic agents, and there seems to be a marked improvement in rates of recurrence, patient satisfaction, and overall quality of scar when these agents are used. Intralesional injection and/or wound irrigation with interferon-a2b, interferon-g, mitomycin-C, bleomycin, or 5-fluorouracil seems to have a positive effect on the reduction of pathologic scars. There is mounting evidence that these drugs used alone or in combination therapy, have the potential to be an integral part of the treatment paradigm for hypertrophic scars and keloids.

  13. BEL β-trefoil: a novel lectin with antineoplastic properties in king bolete (Boletus edulis) mushrooms.

    Science.gov (United States)

    Bovi, Michele; Cenci, Lucia; Perduca, Massimiliano; Capaldi, Stefano; Carrizo, Maria E; Civiero, Laura; Chiarelli, Laurent R; Galliano, Monica; Monaco, Hugo L

    2013-05-01

    A novel lectin was purified from the fruiting bodies of king bolete mushrooms (Boletus edulis, also called porcino, cep or penny bun). The lectin was structurally characterized i.e its amino acid sequence and three-dimensional structure were determined. The new protein is a homodimer and each protomer folds as β-trefoil domain and therefore we propose the name Boletus edulis lectin (BEL) β-trefoil to distinguish it from the other lectin that has been described in these mushrooms. The lectin has potent anti-proliferative effects on human cancer cells, which confers to it an interesting therapeutic potential as an antineoplastic agent. Several crystal forms of the apoprotein and of complexes with different carbohydrates were studied by X-ray diffraction. The structure of the apoprotein was solved at 1.12 Å resolution. The interaction of the lectin with lactose, galactose, N-acetylgalactosamine and T-antigen disaccharide, Galβ1-3GalNAc, was examined in detail. All the three potential binding sites present in the β-trefoil fold are occupied in at least one crystal form and are described in detail in this paper. No important conformational changes are observed in the lectin when comparing its co-crystals with carbohydrates with those of the ligand-free protein.

  14. Histological vis-a-vis biochemical assessment on the toxic level and antineoplastic efficacy of a synthetic drug Pt-ATP on experimental animal models.

    Science.gov (United States)

    Pal, Shipra; Sadhu, Arpita Sengupta; Patra, Swarup; Mukherjea, Kalyan K

    2008-11-12

    Cisplatin, a platinum based anticancer drug has played a vital role in the treatment of cancers by chemical agents, but in view of the serious toxicity including nephrotoxicity of cisplatin, various other platinum based drugs have been synthesized and screened to overcome its toxicity. A Pt-ATP compound was prepared in our laboratory hoping to have reduced or no toxicity along with the potentiality of reducing neoplasm growth. A Pt-ATP compound was prepared. It was first screened for its antineoplastic efficacy. Confirming that, subsequent experiments were carried on to test its toxicity on animals, viz. Albino Swiss mice. The animals were randomly divided into four sets--Set I: Erhlich Ascites Carcinoma (EAC) challenged mice; Set II: Normal mice; Set III: Drug treated mice, Set IVA Cisplatin (CDDP) treated mice, Set IV B EAC challenged Cisplatin treated mice. Set I was used to test antineoplasticity of the drug, Set II and Set III for studying drug toxicity and Set IV was treated with CDDP. Set II was used as a control. Animals were sacrificed after 5 days, 10 days 15 days and 20 days of drug administration on the 6th, 11th, 16th and 21st days respectively for Set I, II and III. Set IVA was sacrificed only on the 16th day and Set IV B on 6th and 11th days. For Set I only tumor cell count and packed cell volume (PCV) of tumor cells were recorded. For Set II and III, aspartate aminotransferase (AST), alanine aminotransferase (ALT) assays were done using serum while blood creatinine and creatine were assayed from blood filtrate. For cytotoxicity assessment liver, spleen and kidney tissues were collected and subjected to scanning electron microscopy (SEM) after extensive treatment. Set IV A was only studied for the biochemical parameters viz. aspartate aminotransferase (AST), alanine aminotransferase (ALT) assays were done using serum while blood creatinine and creatine were assayed from blood filtrate. Set IV B was studied for tumor cell count after treatment with

  15. Psidium guajava L. anti-neoplastic effects: induction of apoptosis and cell differentiation.

    Science.gov (United States)

    Bontempo, P; Doto, A; Miceli, M; Mita, L; Benedetti, R; Nebbioso, A; Veglione, M; Rigano, D; Cioffi, M; Sica, V; Molinari, A M; Altucci, L

    2012-02-01

    Curative properties of medicinal plants such as Psidium guajava L. (Myrtaceae) have often been indicated by epidemiological studies on populations in which these fruits are consumed daily. However, complete characterization of the active principles responsible for this ability has never been performed. Here, we have characterized P. guajava's anti-cancer potential and identified the parts of the fruit involved in its anti-neoplastic action. We studied morphology of our cells, cell cycle characteristics and apoptosis and performed immunostaining, differentiation and western blot analyses. We report that the P. guajava extract exerted anti-cancer control on both haematological and solid neoplasias. P. guajava extract's anti-tumour properties were found to be tightly bound to induction of apoptosis and differentiation. Use of ex vivo myeloid leukaemia blasts corroborated that P. guajava was able to induce cell death but did not exhibit anti-cancer effects on all malignant cells investigated, indicating selective activity against certain types of tumour. Analyses of P. guajava pulp, peel and seeds identified the pulp as being the most relevant component for causing cell cycle arrest and apoptosis, whereas peel was responsible for causing cell differentiation. P. guajava itself and its pulp-derived extract were found to induce apoptosis accompanied by caspase activation and p16, p21, Fas ligand (FASL TNF super-family, member 6), Bcl-2-associated agonist of cell death (BAD) and tumour necrosis factor receptor super-family, member 10b (DR5), overexpression. Our findings showed that P. guajava L. extract was able to exert anti-cancer activity on cultures in vitro and ex vivo, supporting the hypothesis of its anti malignant pro-apoptotic modulation. © 2011 Blackwell Publishing Ltd.

  16. The DOMUS study protocol

    DEFF Research Database (Denmark)

    Nordly, Mie; Benthien, Kirstine Skov; Von Der Maase, Hans

    2014-01-01

    be a powerful tool to improve patients' quality of life and support family/caregivers during the disease trajectory. The present study offers a model for achieving optimal delivery of palliative care in the patient's preferred place of care and attempt to clarify challenges. TRIAL REGISTRATION: Clinicaltrials......BACKGROUND: The focus of Specialized Palliative Care (SPC) is to improve care for patients with incurable diseases and their families, which includes the opportunity to make their own choice of place of care and ultimately place of death. The Danish Palliative Care Trial (DOMUS) aims to investigate...... psychological intervention for patients and caregivers at home or b) standard care alone. Inclusion criteria are incurable cancer with no or limited antineoplastic treatment options. DISCUSSION: Programs that facilitate transition from hospital treatment to SPC at home for patients with incurable cancer can...

  17. Influence of Alternative Tubulin Inhibitors on the Potency of a Epirubicin-Immunochemotherapeutic Synthesized with an Ultra Violet Light-Activated Intermediate: Influence of incorporating an internal/integral disulfide bond structure and Alternative Tubulin/Microtubule Inhibitors on the Cytotoxic Anti-Neoplastic Potency of Epirubicin-(C3-amide)-Anti-HER2/neu Synthesized Utilizing a UV-Photoactivated Anthracycline Intermediate.

    Science.gov (United States)

    Coyne, C P; Jones, Toni; Bear, Ryan

    2012-11-01

    Immunochemotherapeutics, epirubicin-(C 3 - amide )-SS-[anti-HER2/ neu ] with an internal disulfide bond, and epirubicin-(C 3 - amide )-[anti-HER2/ neu ] were synthesized utilizing succinimidyl 2-[(4,4'-azipentanamido) ethyl]-1,3'-dithioproprionate or succinimidyl 4,4-azipentanoate respectively. Western blot analysis was used to determine the presence of any immunoglobulin fragmentation or IgG-IgG polymerization. Retained HER2/ neu binding characteristics of epirubicin-(C 3 - amide )-[anti-HER2/ neu ] and epirubicin-(C 3 - amide )-SS-[anti-HER2/ neu ] were validated by cell-ELISA using a mammary adenocarcinoma (SKBr-3) population that highly over-expresses trophic HER2/ neu receptor complexes. Cytotoxic anti-neoplastic potency of epirubicin-(C 3 - amide )-[anti-HER2/ neu ] and epirubicin-(C 3 - amide )-SS-[anti-HER2/ neu ] between epirubicin-equivalent concentrations of 10 -10 M and 10 -6 M was determined by measuring the vitality/proliferation of chemotherapeutic-resistant mammary adenocarcinoma (SKBr-3 cell type). Cytotoxic anti-neoplastic potency of benzimidazoles (albendazole, flubendazole, membendazole) and griseofulvin were assessed between 0-to-2 μg/ml and 0-to-100 μg/ml respectively while mebendazole and griseofulvin were analyzed at fixed concentrations of 0.35 μg/ml and 35 g/ml respectively in dual combination with gradient concentrations of epirubicin-(C 3 - amide )-[anti-HER2/ neu ] and epirubicin-(C 3 - amide )-SS-[anti-HER2/ neu ]. Cytotoxic anti-neoplastic potency for epirubicin-(C 3 - amide )-[anti-HER2/ neu ] and epirubicin-(C 3 - amide )-SS-[anti-HER2/ neu ] against chemotherapeutic-resistant mammary adenocarcinoma (SKBr-3) was nearly identical at epirubicin-equivalent concentrations of 10 -10 M and 10 -6 M. The benzimadazoles also possessed cytotoxic anti-neoplastic activity with flubendazole and albendazole being the most and least potent respectively. Similarly, griseofulvin had cytotoxic anti-neoplastic activity and was more potent than

  18. Dexamethasone-(C21-phosphoramide)-[anti-EGFR]: molecular design, synthetic organic chemistry reactions, and antineoplastic cytotoxic potency against pulmonary adenocarcinoma (A549).

    Science.gov (United States)

    Coyne, Cody P; Narayanan, Lakshmi

    2016-01-01

    Corticosteroids are effective in the management of a variety of disease states, such as several forms of neoplasia (leukemia and lymphoma), autoimmune conditions, and severe inflammatory responses. Molecular strategies that selectively "target" delivery of corticosteroids minimize or prevents large amounts of the pharmaceutical moiety from passively diffusing into normal healthy cell populations residing within tissues and organ systems. The covalent immunopharmaceutical, dexamethasone-(C21-phosphoramide)-[anti-EGFR] was synthesized by reacting dexamethasone-21-monophosphate with a carbodiimide reagent to form a dexamethasone phosphate carbodiimide ester that was subsequently reacted with imidazole to create an amine-reactive dexamethasone-(C21-phosphorylimidazolide) intermediate. Monoclonal anti-EGFR immunoglobulin was combined with the amine-reactive dexamethasone-(C21-phosphorylimidazolide) intermediate, resulting in the synthesis of the covalent immunopharmaceutical, dexamethasone-(C21-phosphoramide)-[anti-EGFR]. Following spectrophotometric analysis and validation of retained epidermal growth factor receptor type 1 (EGFR)-binding avidity by cell-ELISA, the selective anti-neoplasic cytotoxic potency of dexamethasone-(C21-phosphoramide)-[anti-EGFR] was established by MTT-based vitality stain methodology using adherent monolayer populations of human pulmonary adenocarcinoma (A549) known to overexpress the tropic membrane receptors EGFR and insulin-like growth factor receptor type 1. The dexamethasone:IgG molar-incorporation-index for dexamethasone-(C21-phosphoramide)-[anti-EGFR] was 6.95:1 following exhaustive serial microfiltration. Cytotoxicity analysis: covalent bonding of dexamethasone to monoclonal anti-EGFR immunoglobulin did not significantly modify the ex vivo antineoplastic cytotoxicity of dexamethasone against pulmonary adenocarcinoma at and between the standardized dexamethasone equivalent concentrations of 10(-9) M and 10(-5) M. Rapid increases in

  19. Kinetics of micronucleus induction and cytotoxicity caused by distinct antineoplastics and alkylating agents in vivo.

    Science.gov (United States)

    Morales-Ramírez, Pedro; Vallarino-Kelly, Teresita; Cruz-Vallejo, Virginia

    2014-01-30

    This mini-review aims to compare the differences in the kinetics of the induction of micronucleated polychromatic erythrocytes (MN-PCE) and cytotoxicity by distinct antineoplastic and genotoxic agents in murine peripheral blood in vivo and to correlate these kinetics with the underlying processes. Comparisons were carried out using our previously obtained data with nominal doses causing similar levels of cytotoxicity, as measured in terms reduction of PCE. The aneuploidogens caused the most rapid induction of MN-PCEs and had the highest rates of cytotoxicity and genotoxicity. The promutagens cyclophosphamide and dimethylnitrosamine showed the most delayed responses and had the lowest genotoxic and cytotoxic efficiencies. DNA crosslinking agents had a similar delay of 4-5 h, greater than those of aneuploidogens, but differed in their cytotoxic and genotoxic efficiencies. Methylnitrosourea and 5-aza-cytidine caused greater delays than crosslinking agents. These delays can be due to the methylnitrosourea-mediated induction of formation of mono alkyl adducts which are interpreted as mismatches during DNA duplication, whereas 5-aza-cytidine requires incorporation into the DNA to induce breakage. This review allows us to conclude that the requirement for metabolic activation and the mechanisms of DNA breakage and of micronucleus induction are the main factors that affect the time of maximal MN-PCE induction. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  20. Characterizing interspecies uncertainty using data from studies of anti-neoplastic agents in animals and humans

    International Nuclear Information System (INIS)

    Price, Paul S.; Keenan, Russell E.; Swartout, Jeffrey C.

    2008-01-01

    For most chemicals, the Reference Dose (RfD) is based on data from animal testing. The uncertainty introduced by the use of animal models has been termed interspecies uncertainty. The magnitude of the differences between the toxicity of a chemical in humans and test animals and its uncertainty can be investigated by evaluating the inter-chemical variation in the ratios of the doses associated with similar toxicological endpoints in test animals and humans. This study performs such an evaluation on a data set of 64 anti-neoplastic drugs. The data set provides matched responses in humans and four species of test animals: mice, rats, monkeys, and dogs. While the data have a number of limitations, the data show that when the drugs are evaluated on a body weight basis: 1) toxicity generally increases with a species' body weight; however, humans are not always more sensitive than test animals; 2) the animal to human dose ratios were less than 10 for most, but not all, drugs; 3) the current practice of using data from multiple species when setting RfDs lowers the probability of having a large value for the ratio. These findings provide insight into inter-chemical variation in animal to human extrapolations and suggest the need for additional collection and analysis of matched toxicity data in humans and test animals

  1. Antineoplastic treatment effect on bone mineral density in Mexican breast cancer patients

    International Nuclear Information System (INIS)

    Monroy-Cisneros, Karina; Esparza-Romero, Julián; Valencia, Mauro E.; Guevara-Torres, Alfonso G.; Méndez-Estrada, Rosa O.; Anduro-Corona, Iván; Astiazarán-García, Humberto

    2016-01-01

    Breast cancer is the most deadly malignancy in Mexican women. Although treatment has improved, it may significantly affect bone mineral status in those who receive it. The aim of this study was to assess the impact of cancer treatment on bone mineral density (BMD) and bone mineral content (BMC), in patients with breast cancer and explore the interaction of menopausal status and clinical stage with cancer treatment on such changes. A quasi-experimental design was applied with measurements before and after a chemotherapy treatment in 40 patients with primary diagnosis of invasive breast cancer. BMD and body composition measurements were taken by dual X-ray absorptiometry (DXA) and changes in these variables due to therapy were analyzed using mixed regression for repeated measurements. Significant loss was found in femoral neck and L2-L4 BMD (p < 0.001). Patients diagnosed with osteopenia or osteoporosis received calcium + vitamin D supplementation (600 mg/200 IU day). It showed a protective effect in the decrease of femoral neck BMD and total BMC. BMD loss in both femoral neck and L2-L4 BMD was higher in premenopausal women: 0.023 g/cm 2 in femoral neck and 0.063 g/cm 2 in L2-L4 (p < 0.001), while in postmenopausal women BMD loss was 0.015 g/cm 2 in femoral neck and 0.035 g/cm 2 in L2-L4 (p = 0.021 and p = 0.001 respectively). Change in lumbar spine BMD was prominent in premenopausal women with advanced clinical stage (IIB, IIIA, IIIB): 0.066 g/cm 2 (p = 0.003). The antineoplastic breast cancer treatment with chemotherapy had a negative impact on BMD, in premenopausal women overall, although a differential effect was found according to clinical stage and calcium supplementation status

  2. The impact of religiosity and individual prayer activities on advanced cancer patients' health: is there any difference in function of whether or not receiving palliative anti-neoplastic therapy?

    Science.gov (United States)

    Paiva, Carlos Eduardo; Paiva, Bianca Sakamoto Ribeiro; Yennurajalingam, Sriram; Hui, David

    2014-12-01

    Consecutive patients (n = 221) presenting for initial consultation at a palliative care outpatient clinic were prospectively interviewed and then followed until death. Individual prayer activity (IPA) and global religion scores were associated with quality of life, symptoms, inflammatory markers, and survival. Analyses were adjusted for whether patients were still receiving anti-neoplastic therapies (ANTs) or not. Higher religion scores were associated with lower levels of inflammation in advanced cancer patients still undergoing ANTs. Additionally, higher IPA was an independent good prognostic factor in patients on active ANTs. Further studies are necessary to confirm these findings and to investigate possible biological mechanisms involved.

  3. Use of oral antineoplastic in special situations in a third level hospital: real life results

    Directory of Open Access Journals (Sweden)

    José Miguel Ferrari-Piquero

    2018-01-01

    Full Text Available Objective: To analyse the effectiveness and safety of oral antineoplastic drugs (ANEOs that are authorized in special situations in a third-level hospital and to compare the results obtained with the clinical evidence used for this authorization. Method: Descriptive observational and retrospective study. We included all adult patients who started treatment with ANEO in special situations during the year 2016. We collected demographic, treatment-related and clinical variables (overall survival (OS, progression-free survival (PFS. Adverse reactions and detected interactions were collected. An unadjusted comparison was made between the results of the available evidence and those of the study patients. Results: 34 patients were treated, 50% were men, the median age was 58 years (38-80 and they presented ECOG 1 in 64.7%. Most of the treated patients were diagnosed with advanced colorectal cancer, treated with trifluridine-tipiracil, followed by palbociclib in breast cancer, obtaining results similar to those of the evidence. The median PFS was 2.8 months (95% CI 0.8- 4.8 and the 8-month SG (95% CI 3.4-12.5 for all patients. 26% of patients required dose reduction because of treatment toxicity. We found 13 interactions, which affected 15 patients, only two of category X. Conclusions: The effectiveness of ANEO in special situations in our center is similar to that of available evidence. The impact on survival is low and adverse effects are common.

  4. Antineoplastic activity of the DNA methyltransferase inhibitor 5-aza-2′-deoxycytidine in anaplastic large cell lymphoma

    Science.gov (United States)

    Hassler, Melanie R.; Klisaroska, Aleksandra; Kollmann, Karoline; Steiner, Irene; Bilban, Martin; Schiefer, Ana-Iris; Sexl, Veronika; Egger, Gerda

    2012-01-01

    DNA methylation is an epigenetic mechanism establishing long-term gene silencing during development and cell commitment, which is maintained in subsequent cell generations. Aberrant DNA methylation is found at gene promoters in most cancers and can lead to silencing of tumor suppressor genes. The DNA methyltransferase inhibitor 5-aza-2′-deoxycytidine (5-aza-CdR) is able to reactivate genes silenced by DNA methylation and has been shown to be a very potent epigenetic drug in several hematological malignancies. In this report, we demonstrate that 5-aza-CdR exhibits high antineoplastic activity against anaplastic large cell lymphoma (ALCL), a rare CD30 positive non-Hodgkin lymphoma of T-cell origin. Low dose treatment of ALCL cell lines and xenografted tumors causes apoptosis and cell cycle arrest in vitro and in vivo. This is also reflected in genome-wide expression analyses, where genes related to apoptosis and cell death are amongst the most affected targets of 5-aza-CdR. Furthermore, we observed demethylation and re-expression of p16INK4A after drug administration and senescence associated β-galactosidase activity. Thus, our data provide evidence that 5-aza-CdR is highly efficient against ALCL and warrants further clinical evaluation for future therapeutic use. PMID:22687603

  5. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  6. Necroptosis mediates the antineoplastic effects of the soluble fraction of polysaccharide from red wine in Walker-256 tumor-bearing rats.

    Science.gov (United States)

    Stipp, Maria Carolina; Bezerra, Iglesias de Lacerda; Corso, Claudia Rita; Dos Reis Livero, Francislaine A; Lomba, Luiz Alexandre; Caillot, Adriana Rute Cordeiro; Zampronio, Aleksander Roberto; Queiroz-Telles, José Ederaldo; Klassen, Giseli; Ramos, Edneia A S; Sassaki, Guilherme Lanzi; Acco, Alexandra

    2017-03-15

    Polysaccharides are substances that modify the biological response to several stressors. The present study investigated the antitumor activity of the soluble fraction of polysaccharides (SFP), extracted from cabernet franc red wine, in Walker-256 tumor-bearing rats. The monosaccharide composition had a complex mixture, suggesting the presence of arabinoglactans, mannans, and pectins. Treatment with SFP (30 and 60mg/kg, oral) for 14days significantly reduced the tumor weight and volume compared with controls. Treatment with 60mg/kg SFP reduced blood monocytes and neutrophils, reduced the tumor activity of N-acetylglucosaminidase, myeloperoxidase, and nitric oxide, increased blood lymphocytes, and increased the levels of tumor necrosis factor α (TNF-α) in tumor tissue. Treatment with SFP also induced the expression of the cell necroptosis-related genes Rip1 and Rip3. The antineoplastic effect of SFP appears to be attributable to its action on the immune system by controlling the tumor microenvironment and stimulating TNF-α production, which may trigger the necroptosis pathway. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Active vitamin D potentiates the anti-neoplastic effects of calcium in the colon: A cross talk through the calcium-sensing receptor.

    Science.gov (United States)

    Aggarwal, Abhishek; Höbaus, Julia; Tennakoon, Samawansha; Prinz-Wohlgenannt, Maximilian; Graça, João; Price, Sally A; Heffeter, Petra; Berger, Walter; Baumgartner-Parzer, Sabina; Kállay, Enikö

    2016-01-01

    Epidemiological studies suggest an inverse correlation between dietary calcium (Ca(2+)) and vitamin D intake and the risk of colorectal cancer (CRC). It has been shown in vitro that the active vitamin D metabolite, 1,25-dihydroxyvitamin D3 (1,25-D3) can upregulate expression of the calcium-sensing receptor (CaSR). In the colon, CaSR has been suggested to regulate proliferation of colonocytes. However, during tumorigenesis colonic CaSR expression is downregulated and we hypothesized that the loss of CaSR could influence the anti-tumorigenic effects of Ca(2+) and vitamin D. Our aim was to assess the impact of CaSR expression and function on the anti-neoplastic effects of 1,25-D3 in colon cancer cell lines. We demonstrated that in the healthy colon of mice, high vitamin D diet (2500 IU/kg diet) increased expression of differentiation and apoptosis markers, decreased expression of proliferation markers and significantly upregulated CaSR mRNA expression, compared with low vitamin D diet (100 IU/kg diet). To determine the role of CaSR in this process, we transfected Caco2-15 and HT29 CRC cells with wild type CaSR (CaSR-WT) or a dominant negative CaSR mutant (CaSR-DN) and treated them with 1,25-D3 alone, or in combination with CaSR activators (Ca(2+) and NPS R-568). 1,25-D3 enhanced the anti-proliferative effects of Ca(2+) and induced differentiation and apoptosis only in cells with a functional CaSR, which were further enhanced in the presence of NPS R-568, a positive allosteric modulator of CaSR. The mutant CaSR inhibited the anti-tumorigenic effects of 1,25-D3 suggesting that the anti-neoplastic effects of 1,25-D3 are, at least in part, mediated by the CaSR. Taken together, our data provides molecular evidence to support the epidemiological observation that both, vitamin D and calcium are needed for protection against malignant transformation of the colon and that their effect is modulated by the presence of a functional CaSR. This article is part of a Special Issue

  8. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  9. Untitled

    African Journals Online (AJOL)

    rates immatures réparties en cinq groupes expérimentaux de 23 rates chacun ... déterminées à l'aide du Kit 3H-RIA et selon le protocole décrit par .... nous avoir proposer les plantes étudiées. Nous sommes ... La voie enzymatique en colorimétrie. ... ZOU, J.C. (1984), Antineoplastic agents 103: The isolation and structure of ...

  10. Drug: D01223 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D01223 Drug Capecitabine (JAN/USAN/INN); Xeloda (TN) ... C15H22FN3O6 D01223.gif ... Antineoplastic... ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic... ... DG01935 ... Fluoropyrimidine antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG01935 ... Fluoropyrimidine antineoplasti...ic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG01935 ... Fluoropyrimidine antineoplastic

  11. Radiobiological studies on the importance of tumor oxygenation for anti-neoplastic therapy

    International Nuclear Information System (INIS)

    Grau, C.

    1994-01-01

    The aim of the twelve studies included in the present thesis was to determine the importance of hypoxia for various anti-neoplastic treatment modalities, and to evaluate possible ways of overcoming the hypoxia problem by combined modality therapy. The murine tumor systems were the C3H mammary carcinoma with 5-12% hypoxic cells, and the SCCVII squamous cell carcinoma with 2% hypoxic cells. The radiation response was significantly improved by the use of hypoxic cell radiosensitizers such as nimorazole or misonidazole, or by allowing the mice to breathe oxygen or carbogen during irradiation. In contrast, the radiation response was significantly impaired by carbon monoxide breathing at a level comparable to what has been observed in heavy smokers. The clamped TCD 50 assay was used to classify cancer chemotherapeutic drugs according to their preferential cytotoxicity towards the different tumor subpopulations. Methotrexate had no effect on hypoxic cells and was only borderline toxic towards aerobic cells. Three drugs had significant effect against oxic cells only (5-fluorouracil, bleomycin and cisplatin). Similarly, three drugs were toxic towards hypoxic cells only (etoposide, carmustine, and mitomycin c). Three drugs were effective towards both cell types (vincristine, adriamycin, cyclophosphamide). Hypoxic cells in areas with insufficient blood supply, poor nutrition and increased acidity is known to be highly sensitive to hyperthermia. In a study where cisplatin, heat and x-rays were given together, the local tumor control was not improved when compared to radiation + heat, apparently due to a lack of enhancement in the killing of hypoxic cells. These studies have demonstrated the influence of tumor oxygenation on tumor response to treatment with drugs, hyperthermia and irradiation. New strategies targeted also against perfusion-limited hypoxia is needed. One of the most important conclusions from the present thesis can be implemented without expensive trials or

  12. Photo-Fenton and Fenton-like processes for the treatment of the antineoplastic drug 5-fluorouracil under simulated solar radiation.

    Science.gov (United States)

    Koltsakidou, Α; Antonopoulou, M; Sykiotou, M; Εvgenidou, Ε; Konstantinou, I; Lambropoulou, D A

    2017-02-01

    In the present study, photo-Fenton and Fenton-like processes were investigated for the degradation and mineralization of the antineoplastic drug 5-fluorouracil (5-FU). For the optimization of photo-Fenton treatment under simulated solar light (SSL) radiation, the effects of several operating parameters (i.e., 5-FU concentration, Fe 3+ , and oxidant concentration) on the treatment efficiency were studied. According to the results, SSL/[Fe(C 2 Ο 4 ) 3 ] 3- /Η 2 Ο 2 process was the most efficient, since faster degradation of 5-FU and higher mineralization percentages were achieved. All the applied processes followed quite similar transformation routes which include defluorination-hydroxylation as well as pyrimidine ring opening, as demonstrated by the transformation products identified by high resolution mass spectrometry analysis. The toxicity of the treated solutions was evaluated using the Microtox assay. In general, low toxicity was recorded for the initial solution and the solution at the end of the photocatalytic treatment, while an increase in the overall toxicity was observed only at the first stages of SSL/Fe 3+ /Η 2 Ο 2 and SSL/Fe 3+ /S 2 O 8 2- processes.

  13. Dgroup: DG00686 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available Cytarabine ocfosphate hydrate (JAN) ... D03637 ... Cytarabine hydrochloride (USAN) Antineoplastic ... DG01958 ... Nuc...leic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic...acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ATC code: L01BC01 Antineoplastics, Antimetabolite DNA polymerase ... ... Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic

  14. Antioxidants impair anti-tumoral effects of Vorinostat, but not anti-neoplastic effects of Vorinostat and caspase-8 downregulation.

    Science.gov (United States)

    Bergadà, Laura; Yeramian, Andree; Sorolla, Annabel; Matias-Guiu, Xavier; Dolcet, Xavier

    2014-01-01

    We have recently demonstrated that histone deacetylase inhibitor, Vorinostat, applied as a single therapy or in combination with caspase-8 downregulation exhibits high anti-tumoral activity on endometrial carcinoma cell lines. In the present study, we have assessed the signalling processes underlying anti-tumoral effects of Vorinostat. Increasing evidence suggests that reactive oxygen species are responsible for histone deacetylase inhibitor-induced cell killing. We have found that Vorinostat induces formation of reactive oxygen species and DNA damage. To investigate the role of oxidative stress as anti-neoplastic mechanism, we have evaluated the effects of different antioxidants (Bha, Nac and Tiron) on endometrial carcinoma cell line Ishikawa treated with Vorinostat. We show that Bha, Nac and Tiron markedly inhibited the cytotoxic effects of Vorinostat, increasing cell viability in vitro. We found that all three antioxidants did not inhibited accumulation of acetyl Histone H4, so that antioxidants did not inhibit Vorinostat activity. Finally, we have evaluated the effects of antioxidants on anti-tumoral activity of Vorinostat as monotherapy or in combination with caspase-8 downregulation in vivo. Interestingly, antioxidants blocked the reduction of tumour growth caused by Vorinostat, but they were unable to inhibit anti-tumoral activity of Vorinostat plus caspase-8 inhibition.

  15. Dgroup: DG00687 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available 974 ... Fluorouracil sodium salt Antineoplastic ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01935 ... Fluoropyrimidine antineopla...stic ... DG01935 ... Fluoropyrimidine antineoplastic Unclassified ... DG02018 ... Antimetabolit...e ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01935 ... Fluoropyrimidine antineoplastic... ATC code: L01BC02 Antineoplastics, Antimetabolite TYMS [HSA:7298] [KO:K00560] Enzyme: DPYD [HSA:1806] ...

  16. Dgroup: DG00688 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available itabine hydrochloride (JAN/USAN) ... D10222 ... Gemcitabine elaidate (USAN/INN) Antineoplastic ... DG01958 ... Nucleic... acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic...ic ... DG01439 ... Arabinofuranosyl type antineoplastic ATC code: L01BC05 Antineoplastics, Antimetabolite RRM1 [HSA:6240] [KO:K10807] ... ... Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplast

  17. Dgroup: DG00685 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available ne phosphate (JAN/USP) ... Antineoplastic ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabin...ofuranosyl type antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic Unclassified ... DG02018 ... Antimet...abolite ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplasti...c ATC code: L01BB05 Antineoplastics, Antimetabolite RRM [HSA:6240 6241 50484] [KO:K10807 K10808] DNA polymerase RNA polymerase ...

  18. Dexamethasone-(C21-phosphoramide-[anti-EGFR]: molecular design, synthetic organic chemistry reactions, and antineoplastic cytotoxic potency against pulmonary adenocarcinoma (A549

    Directory of Open Access Journals (Sweden)

    Coyne CP

    2016-08-01

    did not significantly modify the ex vivo antineoplastic cytotoxicity of dexamethasone against pulmonary adenocarcinoma at and between the standardized dexamethasone equivalent concentrations of 10-9 M and 10-5 M. Rapid increases in antineoplastic cytotoxicity were observed at and between the dexamethasone equivalent concentrations of 10-9 M and 10-7 M where cancer cell death increased from 7.7% to a maximum of 64.9% (92.3%–35.1% residual survival, respectively, which closely paralleled values for “free” noncovalently bound dexamethasone. Discussion: Organic chemistry reaction regimens were optimized to develop a multiphase synthesis regimen for dexamethasone-(C21-phosphoramide-[anti-EGFR]. Attributes of dexamethasone-(C21-phosphoramide-[anti-EGFR] include a high dexamethasone molar incorporation-index, lack of extraneous chemical group introduction, retained EGFR-binding avidity (“targeted” delivery properties, and potential to enhance long-term pharmaceutical moiety effectiveness. Keywords: dexamethasone, anti-EGFR, organic chemistry reactions, synthesis, selective “targeted” delivery, covalent immunopharmaceuticals, EGFR 

  19. Drug: D04134 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D04134 Drug Fazarabine (USAN/INN) ... C8H12N4O5 D04134.gif ... Antineoplastic ... DG01958... ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplas...tic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic... ... DG01439 ... Arabinofuranosyl type antineoplastic ... arabinofuranosyl de

  20. Drug: D06221 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D06221 Drug Triciribine phosphate (USAN) ... C13H17N6O7P D06221.gif ... Antineoplastic... ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic... ... DG01439 ... Arabinofuranosyl type antineoplastic ... CAS: 6

  1. Drug: D03637 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D03637 Drug Cytarabine hydrochloride (USAN) ... C9H13N3O5. HCl D03637.gif ... Antineoplastic... ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG...01439 ... Arabinofuranosyl type antineoplastic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic... ... DG01439 ... Arabinofuranosyl type antineoplastic ATC cod

  2. Use of oral antineoplastic in special situations in a third level hospital: real life results.

    Science.gov (United States)

    Garcia-Muñoz, Carmen; Rodriguez-Quesada, Pedro Pablo; Ferrari-Piquero, José Miguel

    2018-01-01

    To analyse the effectiveness and safety of oral antineoplastic drugs  (ANEOs) that are authorized in special situations in a third-level hospital and to  compare the results obtained with the clinical evidence used for this  authorization. Descriptive observational and retrospective study. We included all  adult patients who started treatment with ANEO in special situations during the  year 2016. We collected demographic, treatment-related and clinical variables  (overall survival (OS), progression-free survival (PFS)). Adverse reactions and  detected interactions were collected. An unadjusted comparison was made  between the results of the available evidence and those of the study patients. 34 patients were treated, 50% were men, the median age was 58  years (38-80) and they presented ECOG 1 in 64.7%. Most of the treated  patients were diagnosed with advanced colorectal cancer, treated with  trifluridine-tipiracil, followed by palbociclib in breast cancer, obtaining results  similar to those of the evidence. The median PFS was 2.8 months (95% CI 0.8- 4.8) and the 8-month SG (95% CI 3.4-12.5) for all patients. 26% of patients  required dose reduction because of treatment toxicity. We found 13 interactions,  which affected 15 patients, only two of category X. The effectiveness of ANEO in special situations in our center is  similar to that of available evidence. The impact on survival is low and adverse  effects are common. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  3. Drug: D01633 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D01633 Drug Enocitabine (JAN/INN); Sunrabin (TN) ... C31H55N3O6 D01633.gif ... Antineoplastic... ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... D...G01439 ... Arabinofuranosyl type antineoplastic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic... ... DG01439 ... Arabinofuranosyl type antineoplastic Therap

  4. Drug: D05134 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available 5 D05134.gif ... Antineoplastic ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic... ... DG01439 ... Arabinofuranosyl type antineoplastic Unclassified ... DG02018 ... Antimetabolite ... ...DG01958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic... D05134 Drug Nelarabine (JAN/USAN/INN); Nelzarabine (USAN); Arranon (TN) ... C11H15N5O

  5. Drug: D01309 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D01309 Drug Doxifluridine (JP17/INN); Furtulon (TN) ... C9H11FN2O5 D01309.gif ... Antineoplastic... ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01935 ... Fluoropyrimidine antineoplastic ... DG0...1935 ... Fluoropyrimidine antineoplastic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic... ... DG01935 ... Fluoropyrimidine antineoplastic Same as: C12739 Th

  6. Drug: D09712 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D09712 Drug Elacytarabine (USAN/INN) ... C27H45N3O6 D09712.gif ... Antineoplastic ... DG0...1958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG01439 ... Arab...inofuranosyl type antineoplastic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic... ... DG01439 ... Arabinofuranosyl type antineoplastic ... Elacytarabine i

  7. Drug: D06100 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D06100 Drug Tezacitabine (USAN); Tezacitabine monohydrate ... C10H12FN3O4. H2O D06100.gif ... Antineoplastic... ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic... ... DG01439 ... Arabinofuranosyl type antineoplastic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic

  8. Drug: D04197 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D04197 Drug Floxuridine (USP/INN); FUDR (TN) ... C9H11FN2O5 D04197.gif ... Antineoplastic... ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01935 ... Fluoropyrimidine antineoplastic ... DG01935 ... F...luoropyrimidine antineoplastic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic... ... DG01935 ... Fluoropyrimidine antineoplastic Same as: C11736 ... TYMS [

  9. Drug: D10222 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D10222 Drug Gemcitabine elaidate (USAN/INN) ... C27H43F2N3O5 D10222.gif ... Antineoplastic... ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG01...439 ... Arabinofuranosyl type antineoplastic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic... ... DG01439 ... Arabinofuranosyl type antineoplastic ATC code:

  10. Drug: D01651 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D01651 Drug Ancitabine hydrochloride (JAN) ... C9H11N3O4. HCl D01651.gif ... Antineoplastic... ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG0...1439 ... Arabinofuranosyl type antineoplastic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic... ... DG01439 ... Arabinofuranosyl type antineoplastic Same as:

  11. Drug: D07974 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D07974 Drug Fluorouracil sodium salt; Fluorouracil (TN) ... C4H3FN2O2. xNa D07974.gif ... Antineoplastic... ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01935 ... Fluoropyrimidine antineoplastic... ... DG01935 ... Fluoropyrimidine antineoplastic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplasti...c ... DG01935 ... Fluoropyrimidine antineoplastic ATC code:

  12. Drug: D09722 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D09722 Drug Sapacitabine (USAN/INN) ... C26H42N4O5 D09722.gif ... Antineoplastic ... DG01...958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG01439 ... Arabi...nofuranosyl type antineoplastic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic... ... DG01439 ... Arabinofuranosyl type antineoplastic ... nucleoside analo

  13. Drug: D04233 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D04233 Drug Flurocitabine (USAN/INN) ... C9H10FN3O4 D04233.gif ... Antineoplastic ... DG0...1958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG01439 ... Arab...inofuranosyl type antineoplastic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic... ... DG01439 ... Arabinofuranosyl type antineoplastic ... CAS: 37717-

  14. Drug: D07966 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D07966 Drug Fludarabine (INN); Fluradosa (TN) ... C10H12FN5O4 D07966.gif ... Antineoplastic... ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG0...1439 ... Arabinofuranosyl type antineoplastic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic... ... DG01439 ... Arabinofuranosyl type antineoplastic Same as:

  15. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  16. Organotypic Culture of Breast Tumor Explants as a Multicellular System for the Screening of Natural Compounds with Antineoplastic Potential

    Directory of Open Access Journals (Sweden)

    Irma Edith Carranza-Torres

    2015-01-01

    Full Text Available Breast cancer is the leading cause of death in women worldwide. The search for novel compounds with antitumor activity, with less adverse effects and higher efficacy, and the development of methods to evaluate their toxicity is an area of ​​intense research. In this study we implemented the preparation and culture of breast tumor explants, which were obtained from precision-cut breast tumor slices. In order to validate the model we are proposing to screen antineoplastic effect of natural compounds, we selected caffeic acid, ursolic acid, and rosmarinic acid. Using the Krumdieck tissue slicer, precision-cut tissue slices were prepared from breast cancer samples; from these slices, 4 mm explants were obtained and incubated with the selected compounds. Viability was assessed by Alamar Blue assay, LDH release, and histopathological criteria. Results showed that the viability of the explants cultured in the presence of paclitaxel (positive control decreased significantly (P<0.05; however, tumor samples responded differently to each compound. When the explants were coincubated with paclitaxel and compounds, a synergic effect was observed. This study shows that ex vivo culture of breast cancer explants offers a suitable alternative model for evaluating natural or synthetic compounds with antitumor properties within the complex microenvironment of the tumor.

  17. Cellular uptake mechanism and comparative evaluation of antineoplastic effects of paclitaxel–cholesterol lipid emulsion on triple-negative and non-triple-negative breast cancer cell lines

    Directory of Open Access Journals (Sweden)

    Ye J

    2016-08-01

    Full Text Available Jun Ye,1,2 Xuejun Xia,1,2 Wujun Dong,1,2 Huazhen Hao,1,2 Luhua Meng,1,2 Yanfang Yang,1,2 Renyun Wang,1,2 Yuanfeng Lyu,3 Yuling Liu1,2 1State Key Laboratory of Bioactive Substance and Function of Natural Medicines, 2Beijing Key Laboratory of Drug Delivery Technology and Novel Formulation, Institute of Materia Medica, Chinese Academy of Medical Sciences, Peking Union Medical College, Beijing, 3School of Pharmacy, China Pharmaceutical University, Nanjing, People’s Republic of China Abstract: There is no effective clinical therapy for triple-negative breast cancers (TNBCs, which have high low-density lipoprotein (LDL requirements and express relatively high levels of LDL receptors (LDLRs on their membranes. In our previous study, a novel lipid emulsion based on a paclitaxel–cholesterol complex (PTX-CH Emul was developed, which exhibited improved safety and efficacy for the treatment of TNBC. To date, however, the cellular uptake mechanism and intracellular trafficking of PTX-CH Emul have not been investigated. In order to offer powerful proof for the therapeutic effects of PTX-CH Emul, we systematically studied the cellular uptake mechanism and intracellular trafficking of PTX-CH Emul and made a comparative evaluation of antineoplastic effects on TNBC (MDA-MB-231 and non-TNBC (MCF7 cell lines through in vitro and in vivo experiments. The in vitro antineoplastic effects and in vivo tumor-targeting efficiency of PTX-CH Emul were significantly more enhanced in MDA-MB-231-based models than those in MCF7-based models, which was associated with the more abundant expression profile of LDLR in MDA-MB-231 cells. The results of the cellular uptake mechanism indicated that PTX-CH Emul was internalized into breast cancer cells through the LDLR-mediated internalization pathway via clathrin-coated pits, localized in lysosomes, and then released into the cytoplasm, which was consistent with the internalization pathway and intracellular trafficking of native

  18. Cell-based laboratory evaluation of coagulation activation by antineoplastic drugs for the treatment of lymphoid tumors

    Directory of Open Access Journals (Sweden)

    Misae Tsunaka

    2016-07-01

    Full Text Available Objectives: Combining vorinostat, L-asparaginase, and doxorubicin (Dox led to improved response rates in the treatment of lymphoid tumors. However, deep-vein thrombosis has been noted as one of the most serious side effects with these drugs, and how these regimens cause deep-vein thrombosis is unclear. Methods: We investigated the procoagulant effects of vorinostat, L-asparaginase, and doxorubicin in lymphoid tumors, focusing on tissue factor, phosphatidylserine, and antithrombin. The human vascular endothelial cell line EAhy926 as well as the lymphoid neoplastic cell lines HUT78 (cutaneous T-cell lymphoma, Molt4 (acute T-lymphoblastic leukemia, and Ramos (Burkitt lymphoma were employed to investigate these procoagulant effects. Results: Vorinostat, L-asparaginase, and doxorubicin induced exposure of phosphatidylserine and procoagulant activity on the surface of lymphoid tumor cells. Vorinostat and doxorubicin also induced phosphatidylserine exposure and increased procoagulant activity on EAhy926 cells. Expression of tissue factor antigen was induced by doxorubicin on the surface of each type of cells, whereas expression of tissue factor mRNA was unchanged. Secretion of antithrombin from HepG2 cells was reduced only by L-asparaginase. Conclusion: These data suggest that vorinostat and doxorubicin may induce procoagulant activity in vessels through apoptosis of tumor cells and through phosphatidylserine exposure and/or tissue factor expression on vascular endothelial cells. L-asparaginase may induce a thrombophilic state by reducing the secretion of anticoagulant proteins such as antithrombin. The laboratory methods described here could be useful to evaluate the procoagulant effects of antineoplastic drugs.

  19. Drug: D02368 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D02368 Drug Gemcitabine (USAN/INN) ... C9H11F2N3O4 D02368.gif ... Antineoplastic ... DG01...958 ... Nucleic acid derivative, antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG01439 ... Arabi...nofuranosyl type antineoplastic Unclassified ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic... ... DG01439 ... Arabinofuranosyl type antineoplastic Same as: C07650 ATC

  20. Drug: D03046 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available arasid (TN) ... C27H49N3O8P. Na. H2O D03046.gif ... Antineoplastic ... DG01958 ... Nucleic acid derivative, antineoplastic... ... DG01439 ... Arabinofuranosyl type antineoplastic ... DG01439 ... Arabinofuranosyl type antineoplastic Unclassi...fied ... DG02018 ... Antimetabolite ... DG01958 ... Nucleic acid derivative, antineoplastic ... ... DG01439 ... Arabinofuranosyl type antineoplastic Therapeutic category: 4224 ATC code: L01BC01 Chemical group

  1. Drug: D01244 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D01244 Drug Tegafur (JP17/USAN/INN); Atillon (TN) ... C8H9FN2O3 D01244.gif ... Antineoplastic... ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01935 ... Fluoropyrimidine antineoplastic ... DG0193...5 ... Fluoropyrimidine antineoplastic Cyp substrate ... DG01638 ... CYP2A6 substrate Unclassified ... DG02018 ... Antimetab...olite ... DG01958 ... Nucleic acid derivative, antineoplastic ... DG01935 ... Fluoropyrimidine antineoplastic

  2. Effect of alpha-interferon alone and combined with other antineoplastic agents on renal cell carcinoma determined by the tetrazolium microculture assay.

    Science.gov (United States)

    Homma, Y; Aso, Y

    1994-01-01

    The antiproliferative effect of various alpha-interferons (alpha-IFNs), alone or combined with other agents, on a renal cell carcinoma cell line was evaluated by the tetrazolium microculture assay to examine the rationale for combination therapies. Cells incubated in 96-week microculture plates at 5 x 10(3)/well were exposed to various agents for 3 days. There were no obvious differences in the growth inhibition caused by the 5 kinds of alpha-IFN examined as single agents. The combination of alpha-IFN with the following agents was also assessed: 5-fluorouracil (5FU), methotrexate (MTX), mitomycin C, bleomycin, cis-diaminedichloroplatinum (CDDP), vinblastine, etoposide (ETOP), alpha-IFN, tumor necrosis factor-alpha (TNF), and alpha-difluoromethylornithine. Synergism was observed for the combination of alpha-IFN+TNF, while the other combinations had additive or subadditive effects. No interference or antagonism was found. Trimodal combinations of alpha-IFN+MTX with either 5FU, ETOP, or CDDP all showed subadditive effects. These results indicated that an increased antiproliferative effect, although not necessarily synergistic, was obtained by the combination of alpha-IFN with a variety of antineoplastic agents, providing a rationale to seek for combination therapies including alpha-IFN for treating renal cell carcinoma.

  3. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  4. The husk fiber of Cocos nucifera L. (Palmae) is a source of anti-neoplastic activity.

    Science.gov (United States)

    Koschek, P R; Alviano, D S; Alviano, C S; Gattass, C R

    2007-10-01

    In the present study, we investigated the in vitro anti-tumoral activities of fractions from aqueous extracts of the husk fiber of the typical A and common varieties of Cocos nucifera (Palmae). Cytotoxicity against leukemia cells was determined by the 3-[4,5-dimethylthiazol-2-yl]-2,5-diphenyltetrazolium bromide (MTT) assay. Cells (2 x 10(4)/well) were incubated with 0, 5, 50 or 500 microg/mL high- or low-molecular weight fractions for 48 h, treated with MTT and absorbance was measured with an ELISA reader. The results showed that both varieties have almost similar antitumoral activity against the leukemia cell line K562 (60.1 +/- 8.5 and 47.5 +/- 11.9% for the typical A and common varieties, respectively). Separation of the crude extracts with Amicon membranes yielded fractions with molecular weights ranging in size from 1-3 kDa (fraction A) to 3-10 kDa (fraction B) and to more than 10 kDa (fraction C). Cells were treated with 500 microg/mL of these fractions and cytotoxicity was evaluated by MTT. Fractions ranging in molecular weight from 1-10 kDa had higher cytotoxicity. Interestingly, C. nucifera extracts were also active against Lucena 1, a multidrug-resistant leukemia cell line. Their cytotoxicity against this cell line was about 50% (51.9 +/- 3.2 and 56.3 +/- 2.9 for varieties typical A and common, respectively). Since the common C. nucifera variety is extensively cultured in Brazil and the husk fiber is its industrial by-product, the results obtained in the present study suggest that it might be a very inexpensive source of new antineoplastic and anti-multidrug resistant drugs that warrants further investigation.

  5. Oral antineoplastic agent interactions with medicinal plants and food: an issue to take into account.

    Science.gov (United States)

    Collado-Borrell, Roberto; Escudero-Vilaplana, Vicente; Romero-Jiménez, Rosa; Iglesias-Peinado, Irene; Herranz-Alonso, Ana; Sanjurjo-Sáez, María

    2016-11-01

    To review interactions between oral antineoplastic agents (OAAs) for the treatment of solid and hematological tumors and common food and medicinal plants. All potential interactions between OAAs, medicinal plants and food were reviewed. OAAs were considered to be drugs for oral administration that have direct antitumor activity and were approved by the European Medicines Agency in April 2015. We performed the literature search in Pubmed(®) considering only medicinal plants and food. In addition, available data were analyzed from each OAA in secondary data sources taken from Thomson Micromedex(®) and Lexi-comp(®), as well as in the summary of product characteristics. Fifty-eight OAAs were analyzed. We found interactions in 60.3 % of OAAs. Those with most interactions described were: imatinib and procarbazine (4 interactions) and erlotinib, vemurafenib, pomalidomide, medroxyprogesterone and methotrexate (3 interactions). We found 39 interactions (74.4 % important). St. John's wort was the medicinal plant with most interactions (92.6 % were considered important). The rest were: important (ginseng-imatinib, methotrexate-cola and tobacco-erlotinib and tobacco-pomalidomide) and moderate (caffeine-vemurafenib/medroxyprogesterone, medroxyprogesterone-ruxolitinib/St. John's wort, garlic-anagrelide and ginseng-procarbazine). Twenty-six interactions (61.5 % important). Grapefruit had most interactions (82.4 % were considered important). The rest were: important (alcohol-procarbazine) and moderate (dairy-estramustine, methotrexate-ethanol, procarbazine-tyramine, vitamin A-tretinoin/bexarotene and grapefruit-bexarotene/etoposide/sunitinib). A review of interactions of medicinal plants and food should be taken into account in the management of OAAs, since more than half have interactions with MPs and food, of which 70.3 % are considered important. The most relevant are HSJ, grapefruit, ginseng and tobacco. This review is intended to serve as a support to all healthcare

  6. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  7. Evaluation of Oral Mucositis Occurrence in Oncologic Patients under Antineoplastic Therapy Submitted to the Low-Level Laser Coadjuvant Therapy.

    Science.gov (United States)

    Leite Cavalcanti, Alessandro; José de Macêdo, Dário; Suely Barros Dantas, Fernanda; Dos Santos Menezes, Karla; Filipe Bezerra Silva, Diego; Alves de Melo Junior, William; Fabia Cabral Cavalcanti, Alidianne

    2018-04-24

    Low-level laser therapy has been widely used in treating many conditions, including oral mucositis. The purpose of this study was to evaluate the occurrence of oral mucositis in patients undergoing antineoplastic therapy submitted to preventive and therapeutic treatment with low-level laser therapy. This cross-sectional study was carried out with 51 children and adolescents of both sexes with malignant neoplasias who developed oral mucositis and underwent low-level laser therapy. Data were collected on sex, age, type and degree of neoplasia, region affected, and remission time. 64.7% of the patients were male and were between 3 and 6 years of age (39.2%). Acute lymphoid leukemia was the most frequent neoplasm (37.3%). Regarding the maximum oral mucositis, grade 2 (41.2%) was predominant, with jugal mucosa (29.9%) and tongue (17.7%) being the most affected regions. The majority of cases presented lesion remission time between 4 and 7 days (44.0%). Most patients were young, male, and diagnosed with acute lymphoid leukemia. Predominance of grade 2 oral mucositis was observed, with jugal mucosa and tongue being the most affected regions, with the majority of cases presenting lesion remission time between 4 and 7 days. Low-level laser therapy has been shown to be an essential therapy in the prevention and treatment of these lesions, since it is a non-invasive and low-cost method.

  8. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  9. Comparison of new nitrosoureas esters with modified steroidal nucleus for cytogenetic and antineoplastic activity.

    Science.gov (United States)

    Hussein, A; Mioglou-Kalouptsi, E; Papageorgiou, A; Karapidaki, I; Iakovidou-Kritsi, Z; Lialiaris, T; Xrysogelou, E; Camoutsis, C; Mourelatos, D

    2007-01-01

    Nitrosourea is decomposed under physiological conditions to react with biological macromolecules by two mechanisms: alkylation (with proteins and nucleic acids) and carbamoylation (with proteins but not nucleic acids). It has been suggested that the alkylating action is responsible for the therapeutic effects of nitrosoureas, and that the carbamoylation activity leads to toxicity effects. In order to reduce systemic toxicity and improve specificity and distribution for cancer therapy, 2-haloethyl nitrosourea has been esterified with modified steroids, which are used as biological platforms for transporting the alkylating agent to the tumor site in a specific manner. The cytogenetic and antineoplastic effect were studied of seven newly synthesized esters of N,N-bis(2-chloroethyl)alanyl carboxyl derivatives with a modified steroidal nucleus (compounds 1-7). As a very sensitive indicator of genotoxicity the Sister Chromatid Exchange (SCE) assay was used and as a valuable marker of cytostatic activity the cell Proliferation Rate Index (PRI) in cultures of normal human lymphocytes was used. The order of magnitude of the cytogenetic activity on a molar basis (15, 30, 120 microM) of the compounds was 7>6>3>5>2>4>1. The most active compound 7 has an enlarged (seven carbon atoms) A ring modified with a lactam group (-NHCO-) with the nitrosourea moiety esterified at position 17 In the group of seven substances a correlation was observed between the magnitude of SCE response and the depression in PRI (r=-O, 65, p6>2>5>4>3>1 and on lympocytic P388 leukemia cells is 7>2>6>5>4>3>1. The present results are in agreement with previous suggestions that the effectiveness in cytogenetic activity may well be correlated with antitumor effects [T/C: 248% for the compound 7 in 250 mg/kg b.w.; T/C: mean survival time of drug-treated animals (T) (excluding long term survivals) vs. corn-oil-treated controls (C)].

  10. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  11. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  12. Current options for palliative treatment in patients with pancreatic cancer.

    Science.gov (United States)

    Ridwelski, K; Meyer, F

    2001-01-01

    Palliative treatment is often the only remaining option in the management of pancreatic carcinoma, but its efficacy is poor due to low tumor sensitivity and inadequate treatment protocols. There are several options of palliative treatment with antitumor or supportive intention. Classical end points of palliative treatment are survival, tumor response, and quality of life. A decade ago, palliative chemotherapy consisted mainly of 5-fluorouracil as the standard agent in combination with either other agents and/or radiotherapy. Only the new antineoplastic drug gemcitabine, which was introduced simultaneously with the definition of novel end points of chemotherapy such as clinical benefit, allowed to achieve some progress. However, while gemcitabine monotherapy appeared to be superior to 5-fluorouracil and improved important parameters of quality of life, it could not provide a significant improvement of survival. A novel concept, therefore, is to improve this beneficial cytostatic response in pancreatic carcinoma using a gemcitabine-based protocol by combining it with antineoplastic drugs such as taxanes or platin analogs. This strategy may have the potential to improve the outcome in palliative chemotherapy of pancreatic carcinoma patients with advanced tumor growth or metastases. Best supportive care in pancreatic cancer consists of the treatment of symptoms, such as pain, jaundice, duodenal obstruction, weight loss, exocrine pancreatic insufficiency, and tumor-associated depression. Copyright 2001 S. Karger AG, Basel

  13. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  14. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  15. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  16. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  17. Dgroup: DG00684 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available DG00684 Chemical ... DGroup Tioguanine ... D08603 ... Tioguanine (INN) D06109 ... Thioguanine (USP) ... Antineoplastic... ... DG01958 ... Nucleic acid derivative, antineoplastic Unclassified ... DG02018 ... Antimetabo...lite ... DG01958 ... Nucleic acid derivative, antineoplastic ATC code: L01BB03 Antineoplastics, Antimetabolite ...

  18. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  19. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  20. Evaluation of Oral Mucositis Occurrence in Oncologic Patients under Antineoplastic Therapy Submitted to the Low-Level Laser Coadjuvant Therapy

    Directory of Open Access Journals (Sweden)

    Alessandro Leite Cavalcanti

    2018-04-01

    Full Text Available Low-level laser therapy has been widely used in treating many conditions, including oral mucositis. The purpose of this study was to evaluate the occurrence of oral mucositis in patients undergoing antineoplastic therapy submitted to preventive and therapeutic treatment with low-level laser therapy. This cross-sectional study was carried out with 51 children and adolescents of both sexes with malignant neoplasias who developed oral mucositis and underwent low-level laser therapy. Data were collected on sex, age, type and degree of neoplasia, region affected, and remission time. 64.7% of the patients were male and were between 3 and 6 years of age (39.2%. Acute lymphoid leukemia was the most frequent neoplasm (37.3%. Regarding the maximum oral mucositis, grade 2 (41.2% was predominant, with jugal mucosa (29.9% and tongue (17.7% being the most affected regions. The majority of cases presented lesion remission time between 4 and 7 days (44.0%. Most patients were young, male, and diagnosed with acute lymphoid leukemia. Predominance of grade 2 oral mucositis was observed, with jugal mucosa and tongue being the most affected regions, with the majority of cases presenting lesion remission time between 4 and 7 days. Low-level laser therapy has been shown to be an essential therapy in the prevention and treatment of these lesions, since it is a non-invasive and low-cost method.

  1. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  2. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  3. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  4. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  5. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  6. Metabolism and disposition of a novel antineoplastic JS-38 (Benzamide, N-[4-(2,4-dimethoxyphenyl)-4,5-dihydro-5-oxo-1,2-dithiolo[4,3-b]pyrrol-6-yl]-3,5-bis (trifluoromethyl)-(9Cl)) in rats.

    Science.gov (United States)

    Zhang, Hong; Liu, Quanhai; Fan, Tingting; Fang, Yu; Li, Ying; Wang, Guoping

    2012-03-01

    The metabolism and catabolism of a novel antineoplastic (ID code JS-38),Benzamide, N-[4-(2,4-dimethoxyphenyl)-4,5-dihydro-5-oxo-1,2-dithiolo[4,3-b]pyrrol-6-yl]-3,5-bis (trifluoromethyl)-(9Cl), were investigated in Wistar rats (3 female, 3 male). LC/UV, LC/MS, LC/MS/MS, NMR and acid hydrolysis methods showed that the metabolic process of JS-38 consists of a series of acetylation and glucoronation that form a metabolic product with a unique pharmacologic property of accelerating bone-marrow cell formation, and also showed a novel metabolic pathway of being acetylated and glucuronated in series.

  7. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  8. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  9. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  10. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  11. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  12. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  13. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  14. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  15. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  16. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  17. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  18. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  19. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  20. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  1. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  2. ASSESSMENT OF RIP-V1 AND OSPF-V2 PROTOCOL WITH CONSIDERATION OF CONVERGENCE CRITERIA AND SENDING PROTOCOLS TRAFFIC

    Directory of Open Access Journals (Sweden)

    Hamed Jelodar

    2014-03-01

    Full Text Available Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.

  3. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  4. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  5. Omega-3 PUFA Loaded in Resveratrol-Based Solid Lipid Nanoparticles: Physicochemical Properties and Antineoplastic Activities in Human Colorectal Cancer Cells In Vitro

    Directory of Open Access Journals (Sweden)

    Simona Serini

    2018-02-01

    Full Text Available New strategies are being investigated to ameliorate the efficacy and reduce the toxicity of the drugs currently used in colorectal cancer (CRC, one of the most common malignancies in the Western world. Data have been accumulated demonstrating that the antineoplastic therapies with either conventional or single-targeted drugs could take advantage from a combined treatment with omega-3 polyunsaturated fatty acids (omega-3 PUFA. These nutrients, shown to be safe at the dosage generally used in human trials, are able to modulate molecules involved in colon cancer cell growth and survival. They have also the potential to act against inflammation, which plays a critical role in CRC development, and to increase the anti-cancer immune response. In the present study, omega-3 PUFA were encapsulated in solid lipid nanoparticles (SLN having a lipid matrix containing resveratrol esterified to stearic acid. Our aim was to increase the efficiency of the incorporation of these fatty acids into the cells and prevent their peroxidation and degradation. The Resveratrol-based SLN were characterized and investigated for their antioxidant activity. It was observed that the encapsulation of omega-3 PUFA into the SLN enhanced significantly their incorporation in human HT-29 CRC cells in vitro, and their growth inhibitory effects in these cancer cells, mainly by reducing cell proliferation.

  6. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  7. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  8. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  9. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  10. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  11. Dgroup: DG00702 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available rubicin hydrochloride ... Antineoplastic ... DG01682 ... Anthracycline antineoplastic Other ... DG01529 ... Topoisomerase... inhibitor ... DG01527 ... Topoisomerase II inhibitor ATC code: L01DB08 Antineoplastic antibiotics TOP2 [HSA:7153 7155] [KO:K03164] ...

  12. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  13. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  14. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  15. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  16. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  17. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  18. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  19. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  20. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  1. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  2. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  3. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  4. Dgroup: DG00700 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available hydrochloride (JP17/USP) ... Antineoplastic ... DG01682 ... Anthracycline antineoplastic Other ... DG01529 ... Topoisomer...ase inhibitor ... DG01527 ... Topoisomerase II inhibitor ATC code: L01DB06 Antineoplastic antibiotics TOP2 [HSA:7153 7155] [KO:K03164] ...

  5. Dgroup: DG00698 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available hydrochloride (JP17/USAN) ... Antineoplastic ... DG01682 ... Anthracycline antineoplastic Other ... DG01529 ... Topoisome...rase inhibitor ... DG01527 ... Topoisomerase II inhibitor ATC code: L01DB03 Antineoplastic antibiotics TOP2 [HSA:7153 7155] [KO:K03164] ...

  6. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  7. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  8. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  9. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  10. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  11. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  12. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  13. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  14. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  15. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  16. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  17. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  18. Parallel screening of FDA-approved antineoplastic drugs for identifying sensitizers of TRAIL-induced apoptosis in cancer cells

    International Nuclear Information System (INIS)

    Taylor, David J; Parsons, Christine E; Han, Haiyong; Jayaraman, Arul; Rege, Kaushal

    2011-01-01

    Tumor Necrosis Factor-α Related Apoptosis Inducing Ligand (TRAIL) and agonistic antibodies to death receptor 4 and 5 are promising candidates for cancer therapy due to their ability to induce apoptosis selectively in a variety of human cancer cells, while demonstrating little cytotoxicity in normal cells. Although TRAIL and agonistic antibodies to DR4 and DR5 are considered safe and promising candidates in cancer therapy, many malignant cells are resistant to DR-mediated, TRAIL-induced apoptosis. In the current work, we screened a small library of fifty-five FDA and foreign-approved anti-neoplastic drugs in order to identify candidates that sensitized resistant prostate and pancreatic cancer cells to TRAIL-induced apoptosis. FDA-approved drugs were screened for their ability to sensitize TRAIL resistant prostate cancer cells to TRAIL using an MTT assay for cell viability. Analysis of variance was used to identify drugs that exhibited synergy with TRAIL. Drugs demonstrating the highest synergy were selected as leads and tested in different prostate and pancreatic cancer cell lines, and one immortalized human pancreatic epithelial cell line. Sequential and simultaneous dosing modalities were investigated and the annexin V/propidium iodide assay, in concert with fluorescence microscopy, was employed to visualize cells undergoing apoptosis. Fourteen drugs were identified as having synergy with TRAIL, including those whose TRAIL sensitization activities were previously unknown in either prostate or pancreatic cancer cells or both. Five leads were tested in additional cancer cell lines of which, doxorubicin, mitoxantrone, and mithramycin demonstrated synergy in all lines. In particular, mitoxantrone and mithramycin demonstrated significant synergy with TRAIL and led to reduction of cancer cell viability at concentrations lower than 1 μM. At these low concentrations, mitoxantrone demonstrated selectivity toward malignant cells over normal pancreatic epithelial cells

  19. Parallel screening of FDA-approved antineoplastic drugs for identifying sensitizers of TRAIL-induced apoptosis in cancer cells

    Directory of Open Access Journals (Sweden)

    Taylor David J

    2011-11-01

    Full Text Available Abstract Background Tumor Necrosis Factor-α Related Apoptosis Inducing Ligand (TRAIL and agonistic antibodies to death receptor 4 and 5 are promising candidates for cancer therapy due to their ability to induce apoptosis selectively in a variety of human cancer cells, while demonstrating little cytotoxicity in normal cells. Although TRAIL and agonistic antibodies to DR4 and DR5 are considered safe and promising candidates in cancer therapy, many malignant cells are resistant to DR-mediated, TRAIL-induced apoptosis. In the current work, we screened a small library of fifty-five FDA and foreign-approved anti-neoplastic drugs in order to identify candidates that sensitized resistant prostate and pancreatic cancer cells to TRAIL-induced apoptosis. Methods FDA-approved drugs were screened for their ability to sensitize TRAIL resistant prostate cancer cells to TRAIL using an MTT assay for cell viability. Analysis of variance was used to identify drugs that exhibited synergy with TRAIL. Drugs demonstrating the highest synergy were selected as leads and tested in different prostate and pancreatic cancer cell lines, and one immortalized human pancreatic epithelial cell line. Sequential and simultaneous dosing modalities were investigated and the annexin V/propidium iodide assay, in concert with fluorescence microscopy, was employed to visualize cells undergoing apoptosis. Results Fourteen drugs were identified as having synergy with TRAIL, including those whose TRAIL sensitization activities were previously unknown in either prostate or pancreatic cancer cells or both. Five leads were tested in additional cancer cell lines of which, doxorubicin, mitoxantrone, and mithramycin demonstrated synergy in all lines. In particular, mitoxantrone and mithramycin demonstrated significant synergy with TRAIL and led to reduction of cancer cell viability at concentrations lower than 1 μM. At these low concentrations, mitoxantrone demonstrated selectivity toward

  20. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  1. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  2. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  3. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  4. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  5. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  6. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  7. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  8. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  9. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  10. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  11. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  12. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  13. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  14. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  15. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  16. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  17. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash; Guibas, Leonidas; Levis, Philip

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  18. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  19. Game-theoretic perspective of Ping-Pong protocol

    Science.gov (United States)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  20. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  1. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  2. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  3. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  4. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  5. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  6. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  7. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  8. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  9. The UMTS-AKA Protocols for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Hwang Min-Shiang

    2009-01-01

    Full Text Available The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS in the recent years. Many advanced techniques have been garnered to improve online communication and to promote the security, comfort, and efficiency of ITS. Of primary importance to the effective application of ITS is the communication protocol used. A fascinating development is that the yesterday's Global System for Mobile Communication protocol is being replaced by the Universal Mobile Telecommunication System protocol, which is the third-generation mobile technology. This article attempts to identify a suitable communication system for ITS applications. It is impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus we explore other possibilities through this research. We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.

  10. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  11. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  12. Protocols for second-generation business satellites systems

    Science.gov (United States)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  13. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  14. Radio protocols for LTE and LTE-advanced

    CERN Document Server

    Yi, SeungJune; Lee, YoungDae; Park, SungJun; Jung, SungHoon

    2012-01-01

    Provides a unique focus on radio protocols for LTE and LTE-Advanced (LTE-A) Giving readers a valuable understanding of LTE radio protocols, this book covers LTE (Long-Term Evolution) Layer 2/3 radio protocols as well as new features including LTE-Advanced. It is divided into two sections to differentiate between the two technologies' characteristics. The authors systematically explain the design principles and functions of LTE radio protocols during the development of mobile handsets. The book also provides essential knowledge on the interaction between mobile networks a

  15. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  16. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  17. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  18. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  19. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  20. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  1. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  2. Extraction protocols for orthodontic treatment: A retrospective study

    Directory of Open Access Journals (Sweden)

    Vaishnevi N Thirunavukkarasu

    2016-01-01

    Full Text Available Background and Objectives: Various extraction protocols have been followed for successful orthodontic treatment. The purpose of this study was to evaluate the extraction protocols in patients who had previously undergone orthodontic treatment and also who had reported for continuing orthodontic treatment from other clinics. Materials and Methods: One hundred thirty eight patients who registered for orthodontic treatment at the Faculty of Dentistry were divided into 10 extraction protocols based on the Orthodontic treatment protocol given by Janson et al. and were evaluated for statistical significance. Results: The descriptive statistics of the study revealed a total of 40 (29% patients in protocol 1, 43 (31.2% in protocol 2, 18 (13% in protocol 3, 16 (11.6% in protocol 5, and 12 (8.7% in Type 3 category of protocol 9. The Type 3 category in protocol 9 was statistically significant compared to other studies. Midline shift and collapse of the arch form were noticed in these individuals. Conclusion: Extraction of permanent teeth such as canine and lateral incisors without rational reasons could have devastating consequences on the entire occlusion. The percentage of cases wherein extraction of permanent teeth in the crowded region was adopted as a treatment option instead of orthodontic treatment is still prevalent in dental practice. The shortage of orthodontists in Malaysia, the long waiting period, and lack of subjective need for orthodontic treatment at an earlier age group were the reasons for the patient's to choose extraction of the mal-aligned teeth such as the maxillary canine or maxillary lateral incisors.

  3. Survey of protocols for the manual segmentation of the hippocampus: preparatory steps towards a joint EADC-ADNI harmonized protocol.

    Science.gov (United States)

    Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G; de Leon, Mony J; deToledo-Morrell, Leyla; Killiany, Ronald J; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C; Soininen, H; Watson, Craig; Duchesne, Simon; Jack, Clifford R; Frisoni, Giovanni B

    2011-01-01

    Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer's disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols' interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol.

  4. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  5. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  6. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  7. Extraction and Isolation of Antineoplastic Pristimerin from Mortonia greggii (Celastraceae).

    Science.gov (United States)

    Mejia-Manzano, Luis Alberto; Barba-Dávila, Bertha A; Gutierrez-Uribe, Janet A; Escalante-Vázquez, Edgardo J; Serna-Saldivar, Sergio O

    2015-11-01

    The aim of this research was to identify, extract and isolate pristimerin in leaves, stems and roots of the Mexican plant Mortonia greggii (Celastraceae). The principal objective was to determine the best laboratory experimental conditions for the extraction and isolation of this powerful natural anticancer agent from the root tissue. Six experimental factors in solid-liquid pristimerin extraction were analyzed: solvent systems, number of extractions, ratio of plant weight (g)/solvent volume (mL) used, time of extraction, temperature and agitation. A mathematical model was generated for pristimerin purity and yield. Ethanol, first extraction, 0.5 ratio of plant weight/solvent volume (g/mL), 0.5 h, 200 rpm and 49.7°C were optimal conditions for the extraction of this phytochemical. The degree of purification of pristimerin root extract was studied by size-exclusion chromatography (SEC) using Sephadex LH-20 reaching fractions with purification indexes (PI) greater than 2 and recoveries of 28.3%. When fractions with purification indices higher than 1 and less than 2 were accumulated, the recovery of pristimerin increased by about 73.6%. By combining the optimum extracts and SEC purification protocols, an enriched fraction containing 245.6 mg pristimerin was obtained from 100 g of root bark, representing about 14.4%, w/w, pristimerin from the total solids presented in the fraction.

  8. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  9. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  10. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  11. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  12. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  13. ET-09DECOY OLIGONUCLEOTIDE DERIVED FROM MGMT ENHANCER HAS AN ANTINEOPLASTIC ACTIVITY IN-VITRO AND IN-VIVO

    Science.gov (United States)

    Canello, Tamar; Ovadia, Haim; Refael, Miri; Zrihan, Daniel; Siegal, Tali; Lavon, Iris

    2014-01-01

    INTRODUCTION: Silencing of O(6)-methylguanine-DNA-methyltransferase (MGMT) in tumors, correlates with a better therapeutic response and with increased survival. Our previous results demonstrated the pivotal role of NF-kappaB in MGMT expression, mediated mainly through binding of p65/NF-kappaB homodimers to the non-canonical NF-KappaB motif (MGMT-kappaB1) within MGMT enhancer. METHODS AND RESULTS: In an attempt to attenuate the transcription activity of MGMT in tumors we designed locked nucleic acids (LNA) modified decoy oligonucleotides corresponding to the specific sequence of MGMT-kappaB1 (MGMT-kB1-LODN). Following confirmation of the ability of MGMT-kB1-LODN to interfere with the binding of p65/NF-kappaB to MGMT enhancer, the potential of the MGMT-kB1-LODN to enhance cell killing was studied in vitro in two glioma cell lines (T98G and U87) and a melanoma cell line (A375P). All three cell lines manifested a significant enhanced cell killing effect following exposure to temozolomide (TMZ) when first transfected with MGMT-kb1-LODN, and also induced a significant cell killing when administered as monotherapy. These results were confirmed also in-vivo on A375P Melanoma xenografts. Intratumoral (Intralesional - IL) injection of MGMT-kB1-LODN with or without IP injection of TMZ induced significant tumor growth inhibition either as a monotherapy or in combination with TMZ. The long-term effect of MGMT-kB1-LODN monotherapy was evaluated using a repetitive IL injection every 4 to 5 days for 55 days with either MGMT-κB1 LODN or control ODN or vehicle. A significant difference (p < 0.01) in tumor volume was obtained by MGMT-κB1-LODN compared to both control groups. Moreover, two out of the seven mice treated with MGMT-κB1-LODN demonstrated tumor regression by day 55 and no tumor recurrence was observed five months later. CONCLUSION: The results of these experiments show that the MGMT-kB1-LODN has a substantial antineoplastic effect when used either in combination with

  14. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  15. Prosthesis Prescription Protocol of the Arm (PPP-Arm) : The implementation of a national prosthesis prescription protocol

    NARCIS (Netherlands)

    Wijdenes, Paula; Brouwers, Michael; van der Sluis, Corry K

    BACKGROUND AND AIM: In order to create more uniformity in the prescription of upper limb prostheses by Dutch rehabilitation teams, the development and implementation of a Prosthesis Prescription Protocol of the upper limb (PPP-Arm) was initiated. The aim was to create a national digital protocol to

  16. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  17. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  18. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  19. Comparison of a new whole-body continuous-table-movement protocol versus a standard whole-body MR protocol for the assessment of multiple myeloma

    International Nuclear Information System (INIS)

    Weckbach, S.; Michaely, H.J.; Schoenberg, S.O.; Dinter, D.J.; Stemmer, A.

    2010-01-01

    To evaluate a whole body (WB) continuous-table-movement (CTM) MR protocol for the assessment of multiple myeloma (MM) in comparison to a step-by-step WB protocol. Eighteen patients with MM were examined at 1.5T using a WB CTM protocol (axial T2-w fs BLADE, T1-w GRE sequence) and a step-by-step WB protocol including coronal/sagittal T1-w SE and STIR sequences as reference. Protocol time was assessed. Image quality, artefacts, liver/spleen assessability, and the ability to depict bone marrow lesions less than or greater than 1 cm as well as diffuse infiltration and soft tissue lesions were rated. Potential changes in the Durie and Salmon Plus stage and the detectability of complications were assessed. Mean protocol time was 6:38 min (CTM) compared to 24:32 min (standard). Image quality was comparable. Artefacts were more prominent using the CTM protocol (P = 0.0039). Organ assessability was better using the CTM protocol (P < 0.001). Depiction of bone marrow and soft tissue lesions was identical without a staging shift. Vertebral fractures were not detected using the CTM protocol. The new protocol allows a higher patient throughput and facilitates the depiction of extramedullary lesions. However, as long as vertebral fractures are not detectable, the protocol cannot be safely used for clinical routine without the acquisition of an additional sagittal sequence. (orig.)

  20. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  1. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  2. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  3. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  4. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  5. FLIP: An Internetwork Protocol for Supporting Distributed Systems

    NARCIS (Netherlands)

    Kaashoek, M.F.; van Renesse, R.; van Staveren, H.; Tanenbaum, A.S.

    1993-01-01

    Most modern network protocols give adequate support for traditional applications such as file transfer and remote login. Distributed applications, however, have different requirements 1993. Instead of using ad hoc protocols to meet each of the new requirements, we have designed a new protocol,

  6. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  7. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  8. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  9. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  10. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  11. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature...... of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a process algebra model and deriving from this process models analysable by the Imperial PEPA Compiler and the LySatool....

  12. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  13. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  14. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  15. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  16. Geographic Variations and Time Trends in Cancer Treatments in Taiwan.

    Science.gov (United States)

    Hsu, Jason C; Chang, Sheng-Mao; Lu, Christine Y

    2017-08-02

    Targeted therapies have become important treatment options for cancer care in many countries. This study aimed to examine recent trends in utilization of antineoplastic drugs, particularly the use of targeted therapies for treatment of cancer, by geographic region in Taiwan (northern, midwestern, southern, and eastern regions and the outer islands). This was a retrospective observational study of antineoplastic agents using 2009-2012 quarterly claims data from Taiwan's National Health Insurance Research Database. Yearly market shares by prescription volume and costs for targeted therapies among total antineoplastic agents by region were estimated. We used multivariate regression model and ANOVA to examine variations in utilization of targeted therapies between geographic regions and used ARIMA models to estimate longitudinal trends. Population-adjusted use and costs of antineoplastic drugs (including targeted therapies) were highest in the southern region of Taiwan and lowest in the outer islands. We found a 4-fold difference in use of antineoplastic drugs and a 49-fold difference in use of targeted therapies between regions if the outer islands were included. There were minimal differences in use of antineoplastic drugs between other regions with about a 2-fold difference in use of targeted therapies. Without considering the outer islands, the market share by prescription volume and costs of targeted therapies increased almost 2-fold (1.84-1.90) and 1.5-fold (1.26-1.61) respectively between 2009 and 2012. Furthermore, region was not significantly associated with use of antineoplastic agents or use of targeted therapies after adjusting for confounders. Region was associated with costs of antineoplastic agents but it was not associated with costs of targeted therapies after confounding adjustments. Use of antineoplastic drugs overall and use of targeted therapies for treatment of cancer varied somewhat between regions in Taiwan; use was notably low in the outer

  17. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  18. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  19. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  20. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  1. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  2. Novel protocol for persister cells isolation.

    Directory of Open Access Journals (Sweden)

    Silvia J Cañas-Duarte

    Full Text Available Bacterial persistence, where a fraction of a population presents a transient resistance to bactericidal substances, has great medical importance due to its relation with the appearance of antibiotic resistances and untreatable bacterial chronic infections. The mechanisms behind this phenomenon remain largely unknown in spite of recent advances, in great part because of the difficulty in isolating the very small fraction of the population that is in this state at any given time. Current protocols for persister isolation have resulted in possible biases because of the induction of this state by the protocol itself. Here we present a novel protocol that allows rapid isolation of persister cells both from exponential and stationary phase. Moreover, it is capable of differentiating between type I and type II persister cells, which should allow the field to move beyond its current state of studying only one type. While this protocol prompts a revision of many of the current results, it should greatly facilitate further advances in the field.

  3. Feeling Is Believing: A Secure Template Exchange Protocol

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.; Lee, Seong-Whan; Li, Stan Z.

    We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol efficiently calculates a shared secret key from biometric data. The protocol is used in an application where grip

  4. Optimizing the high-resolution manometry (HRM) study protocol.

    Science.gov (United States)

    Patel, A; Ding, A; Mirza, F; Gyawali, C P

    2015-02-01

    Intolerance of the esophageal manometry catheter may prolong high-resolution manometry (HRM) studies and increase patient distress. We assessed the impact of obtaining the landmark phase at the end of the study when the patient has acclimatized to the HRM catheter. 366 patients (mean age 55.4 ± 0.8 years, 62.0% female) undergoing esophageal HRM over a 1-year period were studied. The standard protocol consisted of the landmark phase, 10 5 mL water swallows 20-30 s apart, and multiple rapid swallows where 4-6 2 mL swallows were administered in rapid succession. The modified protocol consisted of the landmark phase at the end of the study after test swallows. Study duration, technical characteristics, indications, and motor findings were compared between standard and modified protocols. Of the 366 patients, 89.6% underwent the standard protocol (study duration 12.9 ± 0.3 min). In 10.4% with poor catheter tolerance undergoing the modified protocol, study duration was significantly longer (15.6 ± 1.0 min, p = 0.004) despite similar duration of study maneuvers. Only elevated upper esophageal sphincter basal pressures at the beginning of the study segregated modified protocol patients. The 95th percentile time to landmark phase in the standard protocol patients was 6.1 min; as many as 31.4% of modified protocol patients could not obtain their first study maneuver within this period (p = 0.0003). Interpretation was not impacted by shifting the landmark phase to the end of the study. Modification of the HRM study protocol with the landmark phase obtained at the end of the study optimizes study duration without compromising quality. © 2014 John Wiley & Sons Ltd.

  5. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  6. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  7. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  8. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  9. A customised cold-water immersion protocol favours one-size-fits-all protocols in improving acute performance recovery

    NARCIS (Netherlands)

    Zandvoort, Coen S.; de Zwart, Jelmer R.; van Keeken, Brenda L.; Viroux, Patrick J.F.; Tiemessen, Ivo J.H.

    The purpose of the present study was to investigate whether a customised cold-water immersion (CWIc) protocol was more effective in enhancing acute performance recovery than a one-size-fits-all CWI (CWIs) or active recovery (AR) protocol. On three separate testing days, 10 healthy, physically

  10. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  11. Integrative review of factors related to the nursing diagnosis nausea during antineoplastic chemotherapy.

    Science.gov (United States)

    Moysés, Aline Maria Bonini; Durant, Lais Corsino; Almeida, Ana Maria de; Gozzo, Thais de Oliveira

    2016-10-10

    to identify factors related to the nursing diagnosis nausea among cancer patients undergoing chemotherapy. integrative review conducted in four electronic databases (PUBMED, EMBASE, CINAHL and LILACS) using the key words: neoplasia, antineoplastic agents and nausea. only 30 out of 1,258 papers identified met the inclusion criteria. The most frequent related factors were: being younger than 50 years old, motion sickness, being a woman, emetogenic potential of the chemotherapy, anxiety, conditioned stimulus, and expecting nausea after treatment. this review's findings, coupled with the incidence of nausea among cancer patients undergoing chemotherapy, reveal an important difference between evidence found and that used by NANDA International, Inc. Even though it provides an appropriate definition of related factors, it does not mention chemotherapy, despite the various studies addressing the topic using different designs and presenting various objectives and outcomes. identificar os fatores relacionados ao diagnóstico de enfermagem náusea entre pacientes oncológicos durante o tratamento quimioterápico. revisão integrativa de quatro bases eletrônicas de dados (PUBMED, EMBASE, CINAHL e LILACS) com as palavras-chaves neoplasia, agentes antineoplásicos e náusea. dos 1258 artigos identificados, somente 30 atenderam aos critérios de inclusão. Os fatores relacionados mais frequentes foram: idade abaixo de 50 anos, doença do movimento, sexo feminino, potencial emético do quimioterápico, ansiedade, estímulo condicionado e expectativa de náuseas depois do tratamento. diante dos resultados encontrados e da incidência de náusea entre os pacientes oncológicos em tratamento quimioterápico, observa-se diferença importante entre as evidências encontradas e as utilizadas pela NANDA International, Inc. Apesar da definição estar adequada entre os fatores relacionados, não há menção à quimioterapia mesmo com inúmeros estudos, com diferentes delineamentos

  12. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  13. An entanglement concentration protocol for cluster states using ...

    Indian Academy of Sciences (India)

    Permanent link: http://www.ias.ac.in/article/fulltext/pram/086/05/0973-0983 ... The purpose of this paper is a proposal on entanglement concentration protocol forcluster states. The protocol ... We also make a comparative numerical study of the residual entanglement left out after the execution of each step of the protocol.

  14. Preemptive intravenous immunoglobulin allows safe and timely administration of antineoplastic therapies in patients with multiple myeloma and parvovirus B19 disease.

    Science.gov (United States)

    Katragadda, L; Shahid, Z; Restrepo, A; Muzaffar, J; Alapat, D; Anaissie, E

    2013-08-01

    Parvovirus B19 (B19) disease is a rare cause of anemia in cancer patients and often goes unrecognized, causing delays in anticancer therapy. A retrospective review was carried out of the records of patients with multiple myeloma who underwent melphalan-based autologous stem cell transplantation (MEL-ASCT) and developed B19 infection (January 2009-December 2011). Cases were defined by the presence of clinical and laboratory findings consistent with B19 disease in patients with repeatedly positive plasma quantitative polymerase chain reaction for parvovirus. Six patients qualified as cases; 5 presented with trilineage cytopenias (chronic in 1) and 1 with anemia later progressing to pancytopenia. Transfusion-dependent thrombocytopenia led to testing in 5 patients. Two of these patients also had manifestations of autoimmune disease. Therapy with intravenous immunoglobulin (IVIG) resulted in clinical and hematologic response in all; however, 1 patient, whose white blood cell counts and serum hemoglobin levels improved, required splenectomy for persistent thrombocytopenia. All patients required additional IVIG for recurrent B19 disease. Although viral load at diagnosis did not correlate with the severity of cytopenia, its decrease was associated with response during 17 of 20 evaluable episodes (P = 0.02). Preemptive IVIG allowed the safe administration of chemotherapy in 3 patients, including MEL-ASCT in 1. Parvovirus B19 can cause severe disease in myeloma patients including ASCT recipients. Thrombocytopenia - not anemia - was the leading presentation and may be associated with autoimmune conditions. Patients with unexplained cytopenias, particularly when prolonged, should undergo testing for circulating parvovirus. A reduction in viral load was associated with response to IVIG, although additional therapy was needed for recurrent disease. Most importantly, preemptive IVIG allowed for safe and timely administration of antineoplastic therapy in patients with ongoing B

  15. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  16. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  17. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...

  18. Recommendations for Enhancing Implementation of Additional Protocol Declarations

    International Nuclear Information System (INIS)

    Niina, Toshiaki; Nidaira, Kazuo; Aono, Yosuke

    2010-01-01

    Japan signed the Additional Protocol (hereafter, AP) in December 1998. The domestic law and regulation had been revised to implement the initial and annual declarations for the Agency and the Additional Protocol came into force in December 1999. Since initial declaration in 2000, Japan has submitted the annual declaration in every May. Until 2010, Japan has made 10 annual declarations. This paper gives recommendations to enhance implementation of Additional Protocol declarations based on 10-year experience in Japan and addresses the following: Current status of additional protocol declaration in Japan; Outline of processing method; AP Information Management System; Recommendations for improving quality of declaration. Preparation of additional protocol declaration in NMCC has been conducted in the course of contract with Japan Safeguards Office (hereafter, JSGO) for safeguards information treatment. (author)

  19. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-07-01

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  20. The Protocol of Choice for Treatment of Snake Bite

    Directory of Open Access Journals (Sweden)

    Afshin Mohammad Alizadeh

    2016-01-01

    Full Text Available The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF, and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89% were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS. Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values.

  1. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  2. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  3. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  4. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  5. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain...... two Autonomous System disjoint paths and use them efficiently under failure conditions. Three main applications for the protocol extension are illustrated: reducing traffic loss on existing connections by xploiting pre-selected backup paths derived with our proposal, applying multi-domain restoration...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...

  6. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  7. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  8. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  9. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  10. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  11. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  12. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  13. Robust Multi-unit Auction Protocol against False-name Bids

    Science.gov (United States)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  14. Removing Ambiguities of IP Telephony Traffic Using Protocol Scrubbers

    Directory of Open Access Journals (Sweden)

    Bazara I. A. Barry

    2012-10-01

    Full Text Available Network intrusion detection systems (NIDSs face the serious challenge of attacks such as insertion and evasion attacks that are caused by ambiguous network traffic. Such ambiguity comes as a result of the nature of network traffic which includes protocol implementation variations and errors alongside legitimate network traffic. Moreover, attackers can intentionally introduce further ambiguities in the traffic. Consequently, NIDSs need to be aware of these ambiguities when detection is performed and make sure to differentiate between true attacks and protocol implementation variations or errors; otherwise, detection accuracy can be affected negatively. In this paper we present the design and implementation of tools that are called protocol scrubbers whose main functionality is to remove ambiguities from network traffic before it is presented to the NIDS. The proposed protocol scrubbers are designed for session initiation and data transfer protocols in IP telephony systems. They guarantee that the traffic presented to NIDSs is unambiguous by eliminating ambiguous behaviors of protocols using well-designed protocol state machines, and walking through packet headers of protocols to make sure packets will be interpreted in the desired way by the NIDS. The experimental results shown in this paper demonstrate the good quality and applicability of the introduced scrubbers.

  15. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  16. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    Science.gov (United States)

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  17. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    Davidson, S.B.

    1982-01-01

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  18. Comparison of the ultrashort gonadotropin-releasing hormone agonist-antagonist protocol with microdose flare -up protocol in poor responders: a preliminary study.

    Science.gov (United States)

    Berker, Bülent; Duvan, Candan İltemir; Kaya, Cemil; Aytaç, Ruşen; Satıroğlu, Hakan

    2010-01-01

    To determine the potential effect of the ultrashort gonadotropin-releasing hormone (GnRH) agonist/GnRH antagonist protocol versus the microdose GnRH agonist protocol in poor responders undergoing intracytoplasmic sperm injection (ICSI). The patients in the Agonist-Antagonist Group (n=41) were administered the ultrashort GnRH-agonist/ antagonist protocol, while the patients in the Microdose Group (n=41) were stimulated according to the microdose flare-up protocol. The mean number of mature oocytes retrieved was the primary outcome measure. Fertilization rate, implantation rate per embryo and clinical pregnancy rates were secondary outcome measures. There was no differenc between the mean number of mature oocytes retrieved in the two groups. There were also no statistical differences between the two groups in terms of peak serum E2 level, canceled cycles, endometrial thickness on hCG day, number of 2 pronucleus and number of embryos transferred. However, the total gonadotropin consumption and duration of stimulation were significantly higher with the Agonist-Antagonist Group compared with the Microdose Group. The implantation and clinical pregnancy rates were similar between the two groups. Despite the high dose of gonadotropin consumption and longer duration of stimulation with the ultrashort GnRH agonist/ antagonist protocol, it seems that the Agonist-Antagonist Protocol is not inferior to the microdose protocol in poor responders undergoing ICSI.

  19. Drug: D04783 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available ... Antineoplastic ... DG01727 ... Anthraquinone antineoplastic ... anthraquinone derivative TOP2 [HSA:7153 7155] [KO:K03164] ... CAS: 132937-89-4 PubChem: 47206593 LigandBox: D04783 ...

  20. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  1. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  2. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  3. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  4. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  5. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  6. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  7. IAEA to implement Safeguards Additional Protocols in the EU

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: IAEA Director General Mohamed ElBaradei welcomed the entry into force today of the Additional Protocols for 15 States of the European Union - France, the United Kingdom and the 13 non-nuclear weapon States of the EU - and the European Atomic Energy Community (EURATOM). The Protocols, which provide the Agency with better tools to verify compliance with nuclear non-proliferation commitments, entered into force when the European Commission informed the Agency that EURATOM's own requirements for entry into force had been met. The 15 States had provided similar notifications over the past years since signing the Protocols in 1998. The simultaneous entry into force of Additional Protocols for the 15 EU States is 'a very positive development and a milestone in our efforts to strengthen the verification regime', said Dr. ElBaradei. 'In my view, the Additional Protocol should become the standard for verification under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).' He added that the Agency had been preparing for the entry into force of the EU protocols and was confident that, in co-operation with the 15 States and EURATOM, it would be able to ensure effective and efficient implementation in the EU States. The Model Additional Protocol was developed following the discovery of Iraq's clandestine nuclear weapons programme to ensure that the IAEA is given the information and access it needs for timely discovery of any similar activities in States that have pledged not to use nuclear material and activities for weapons purposes. In the past year, Additional Protocols entered into force for 22 countries, and the Agency will now implement Additional Protocols in 58 States, which includes the 15 EU States. The 10 countries joining the EU on 1 May 2004 - seven of which already have brought into force Additional Protocols to their respective safeguards agreements - are expected to gradually accede to the Safeguards Agreement and Additional Protocol covering

  8. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  9. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  10. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  11. Gemcitabine-(5'-phosphoramidate)-[anti-IGF-1R]: molecular design, synthetic organic chemistry reactions, and antineoplastic cytotoxic potency in populations of pulmonary adenocarcinoma (A549).

    Science.gov (United States)

    Coyne, Cody P; Narayanan, Lakshmi

    2017-03-01

    One molecular-based approach that increases potency and reduces dose-limited sequela is the implementation of selective 'targeted' delivery strategies for conventional small molecular weight chemotherapeutic agents. Descriptions of the molecular design and organic chemistry reactions that are applicable for synthesis of covalent gemcitabine-monophosphate immunochemotherapeutics have to date not been reported. The covalent immunopharmaceutical, gemcitabine-(5'-phosphoramidate)-[anti-IGF-1R] was synthesized by reacting gemcitabine with a carbodiimide reagent to form a gemcitabine carbodiimide phosphate ester intermediate which was subsequently reacted with imidazole to create amine-reactive gemcitabine-(5'-phosphorylimidazolide) intermediate. Monoclonal anti-IGF-1R immunoglobulin was combined with gemcitabine-(5'-phosphorylimidazolide) resulting in the synthetic formation of gemcitabine-(5'-phosphoramidate)-[anti-IGF-1R]. The gemcitabine molar incorporation index for gemcitabine-(5'-phosphoramidate)-[anti-IGF-R1] was 2.67:1. Cytotoxicity Analysis - dramatic increases in antineoplastic cytotoxicity were observed at and between the gemcitabine-equivalent concentrations of 10 -9  M and 10 -7  M where lethal cancer cell death increased from 0.0% to a 93.1% maximum (100.% to 6.93% residual survival), respectively. Advantages of the organic chemistry reactions in the multistage synthesis scheme for gemcitabine-(5'-phosphoramidate)-[anti-IGF-1R] include their capacity to achieve high chemotherapeutic molar incorporation ratios; option of producing an amine-reactive chemotherapeutic intermediate that can be preserved for future synthesis applications; and non-dedicated organic chemistry reaction scheme that allows substitutions of either or both therapeutic moieties, and molecular delivery platforms. © 2016 The Authors Chemical Biology & Drug Design Published by John Wiley & Sons Ltd.

  12. Intelligent routing protocol for ad hoc wireless network

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2006-05-01

    A novel routing scheme for mobile ad hoc networks (MANETs), which combines hybrid and multi-inter-routing path properties with a distributed topology discovery route mechanism using control agents is proposed in this paper. In recent years, a variety of hybrid routing protocols for Mobile Ad hoc wireless networks (MANETs) have been developed. Which is proactively maintains routing information for a local neighborhood, while reactively acquiring routes to destinations beyond the global. The hybrid protocol reduces routing discovery latency and the end-to-end delay by providing high connectivity without requiring much of the scarce network capacity. On the other side the hybrid routing protocols in MANETs likes Zone Routing Protocol still need route "re-discover" time when a route between zones link break. Sine the topology update information needs to be broadcast routing request on local zone. Due to this delay, the routing protocol may not be applicable for real-time data and multimedia communication. We utilize the advantages of a clustering organization and multi-routing path in routing protocol to achieve several goals at the same time. Firstly, IRP efficiently saves network bandwidth and reduces route reconstruction time when a routing path fails. The IRP protocol does not require global periodic routing advertisements, local control agents will automatically monitor and repair broke links. Secondly, it efficiently reduces congestion and traffic "bottlenecks" for ClusterHeads in clustering network. Thirdly, it reduces significant overheads associated with maintaining clusters. Fourthly, it improves clusters stability due to dynamic topology changing frequently. In this paper, we present the Intelligent Routing Protocol. First, we discuss the problem of routing in ad hoc networks and the motivation of IRP. We describe the hierarchical architecture of IRP. We describe the routing process and illustrate it with an example. Further, we describe the control manage

  13. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  14. Prevention of disease progression in a patient with a gastric cancer-re-recurrence. Outcome after intravenous treatment with the novel antineoplastic agent taurolidine. Report of a case

    Directory of Open Access Journals (Sweden)

    Menenakos Charalambos

    2006-06-01

    Full Text Available Abstract Background Taurolidine (TRD is a novel agent with multimodal antineoplastic effects. We present the case of a tumor remission after intravenous administration of taurolidine in a patient with gastric cancer re-recurrence. Case presentation A 58 years old male patient suffering from a gastric adenocarcinoma was submitted to partial gastrectomy and partial liver resection (pT2, pN1, pM1L (liver segment 2, N0, V0. 24 months later a local recurrence was diagnosed and the patient was reoperated. Postoperatively the patient underwent a palliative chemotherapy with eloxatin, FU, and leucovorin. A subsequent CT-revealed a liver metastasis and a recurrence adjacent to the hepatic artery. After successful radiofrequency ablation of the liver metastasis the patient was intravenously treated with 2% taurolidine. The patient endured the therapy well and no toxicity was observed. CT-scans revealed a stable disease without a tumor progression or metastatic spread. After 39 cycles the patient was submitted to left nephrectomy due to primary urothelial carcinoma and died 2 days later due to myocardial infarction. Postmortem histology of the esophageal-jejunal anastomosis and liver revealed complete remission of the known metastasized gastric adenocarcinoma. Conclusion The intravenous treatment with 2% taurolidine led to a histological remission of the tumor growth without any toxicity for the patient.

  15. Multi-party quantum key agreement protocol secure against collusion attacks

    Science.gov (United States)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  16. Protocols for pressure ulcer prevention: are they evidence-based?

    Science.gov (United States)

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  17. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  18. Auto-Configuration Protocols in Mobile Ad Hoc Networks

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity. PMID:22163814

  19. RadNet: Open network protocol for radiation data

    International Nuclear Information System (INIS)

    Rees, B.; Olson, K.; Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W.; Koskelo, M.

    1998-01-01

    Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet's flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems

  20. Auto-configuration protocols in mobile ad hoc networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Matesanz, Julián García; Orozco, Ana Lucila Sandoval; Díaz, José Duván Márquez

    2011-01-01

    The TCP/IP protocol allows the different nodes in a network to communicate by associating a different IP address to each node. In wired or wireless networks with infrastructure, we have a server or node acting as such which correctly assigns IP addresses, but in mobile ad hoc networks there is no such centralized entity capable of carrying out this function. Therefore, a protocol is needed to perform the network configuration automatically and in a dynamic way, which will use all nodes in the network (or part thereof) as if they were servers that manage IP addresses. This article reviews the major proposed auto-configuration protocols for mobile ad hoc networks, with particular emphasis on one of the most recent: D2HCP. This work also includes a comparison of auto-configuration protocols for mobile ad hoc networks by specifying the most relevant metrics, such as a guarantee of uniqueness, overhead, latency, dependency on the routing protocol and uniformity.

  1. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  2. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    events. Methods like strand spaces and the inductive method of Paulson have been designed to support an intensional, event-based, style of reasoning. These methods have successfully tackled a number of protocols though in an ad hoc fashion. They make an informal spring from a protocol to its......-nets. They have persistent conditions and as we show in this thesis, unfold under reasonable assumptions to a more basic kind of nets. We relate SPL-nets to strand spaces and inductive rules, as well as trace languages and event structures so unifying a range of approaches, as well as providing conditions under...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  3. Information-theoretic security proof for quantum-key-distribution protocols

    International Nuclear Information System (INIS)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-01-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel

  4. Information-theoretic security proof for quantum-key-distribution protocols

    Science.gov (United States)

    Renner, Renato; Gisin, Nicolas; Kraus, Barbara

    2005-07-01

    We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.

  5. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  6. An Improved 6LoWPAN Hierarchical Routing Protocol

    Directory of Open Access Journals (Sweden)

    Xue Li

    2015-10-01

    Full Text Available IETF 6LoWPAN working group is engaged in the IPv6 protocol stack research work based on IEEE802.15.4 standard. In this working group, the routing protocol is one of the important research contents. In the 6LoWPAN, HiLow is a well-known layered routing protocol. This paper puts forward an improved hierarchical routing protocol GHiLow by improving HiLow parent node selection and path restoration strategy. GHiLow improves the parent node selection by increasing the choice of parameters. Simutaneously, it also improves path recovery by analysing different situations to recovery path. Therefore, GHiLow contributes to the ehancement of network performance and the decrease of network energy consumption.

  7. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    Science.gov (United States)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  8. Examining recombinant human TSH primed 131I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    International Nuclear Information System (INIS)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip

    2014-01-01

    Recombinant human thyroid-stimulating hormone (rhTSH)-based protocol is a promising recent development in the management of differentiated thyroid carcinoma (DTC). The objectives of this prospective study were: (1) to assess the feasibility and efficacy of the rhTSH primed 131 I therapy protocol in patients with DTC with distant metastatic disease, (2) to perform lesional dosimetry in this group of patients compared to the traditional protocol, (3) to document the practical advantages (patient symptoms and hospital stay) of the rhTSH protocol compared to the traditional thyroid hormone withdrawal protocol, (4) to document and record any adverse effect of this strategy, (5) to compare the renal function parameters, and (6) to compare the serum TSH values achieved in either of the protocols in this group of patients. The study included 37 patients with metastatic DTC having lung or skeletal metastases or both. A comparison of lesional radiation absorbed dose, hospital stay, renal function tests, and symptom profile was undertaken between the traditional thyroid hormone withdrawal protocol and rhTSH-based therapy protocol. Dosimetric calculations of metastatic lesions were performed using lesion uptake and survey meter readings for calculation of effective half-life. Non-contrast-enhanced CT was used for assessment of tumor volume. Quality of life was assessed using the European Organization for Research and Treatment of Cancer (EORTC) QOL forms. A comparison of pretreatment withdrawal thyroglobulin (TG) was done with the withdrawal TG level 3 months after treatment. The mean effective half-life of 131 I in metastatic lesions was less during the rhTSH protocol (29.49 h) compared to the thyroid hormone withdrawal protocol (35.48 h), but the difference was not statistically significant (p = 0.056). The mean 24-h % uptake of the lesions during the traditional protocol (4.84 %) was slightly higher than the 24-h % uptake during the rhTSH protocol (3.56 %), but the

  9. Performance Analysis of TDMA Protocol in a Femtocell Network

    Directory of Open Access Journals (Sweden)

    Wanod Kumar

    2014-07-01

    Full Text Available In this paper, we evaluate the performance of TDMA (Time Division Multiple Access protocol using queuing theory in a femtocell network. The fair use of wireless channel among the users of network is carried out using TDMA protocol. The arrival of data packets from M communicating nodes becomes multiple Poisson process. The time slots of TDMA protocol represent c servers to communicate data packets coming from communicating nodes to the input of FAP (Femtocell Access Point. The service time of each server (time slot is exponentially distributed. This complete communication scenario using TDMA protocol is modeled using M/M/c queue. The performance of the protocol is evaluated in terms of mean number in system, average system delay and utilization for varying traffic intensity

  10. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  11. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  12. Blockchain Consensus Protocols in the Wild (Keynote Talk)

    OpenAIRE

    Cachin, Christian; Vukolic, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  13. Implementation of Siemens USS protocol into LabVIEW.

    Science.gov (United States)

    Hosek, P; Diblik, M

    2011-10-01

    This article gives basic overview of the USS protocol as a communication interface to drive Siemens frequency inverters. It presents our implementation of this protocol into LabVIEW, as there was permanent demand from the community of the users to have native LabVIEW implementation of the USS protocol. It also states encountered problems and their solutions. Copyright © 2011 Society for Laboratory Automation and Screening. Published by Elsevier Inc. All rights reserved.

  14. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  15. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  16. A two-step quantum secure direct communication protocol with hyperentanglement

    International Nuclear Information System (INIS)

    Gu Bin; Zhang Cheng-Yi; Huang Yu-Gai; Fang Xia

    2011-01-01

    We propose a two-step quantum secure direct communication (QSDC) protocol with hyperentanglement in both the spatial-mode and the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. This QSDC protocol has a higher capacity than the original two-step QSDC protocol as each photon pair can carry 4 bits of information. Compared with the QSDC protocol based on hyperdense coding, this QSDC protocol has the immunity to Trojan horse attack strategies with the process for determining the number of the photons in each quantum signal as it is a one-way quantum communication protocol. (general)

  17. An improved AODV routing protocol based on tower structure

    Directory of Open Access Journals (Sweden)

    Li Yong Qiang

    2016-01-01

    Full Text Available The paper proposed a new routing protocol(IAODV based on tower structure in the Ad Hoc network for the problem which Location Routing Protocol need hardware and Complex algorithm. By the simulation, The complexity of the new routing protocol is reduced without reducing the performance of the network.

  18. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  19. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  20. Effects of combinations of chemotherapy and radiation on the emergence of drug resistant cells in 9L rat brain tumor spheroids

    International Nuclear Information System (INIS)

    Tofilon, P.J.; Arundel, C.; Vines, C.M.

    1987-01-01

    Repeated administration of antineoplastic chemotherapeutic agents is generally considered to induce and/or select for drug resistant cells. The authors recently begun to investigate whether chemotherapy interdigitated with radiation can minimize or eliminate the emergence of drug resiistent cells in 9L rat brain tumor spheroids grown from defined mixtures of cells sensitive (9L) and resistant (R/sub 3/) to BCNU. In this experimental system, the sister chromatid exchange (SCE) assay is used to quantitate the proportions of sensitive and resistant cells within the spheroids. While 9L and R/sub 3/ cell have different sensitivities to BCNU, they are equally sensitive to radiation. Mixed-cell spheroids consisting of 1% R/sub 3/ cells were treated with three doses of BCNU (10 μM) every 72 hr resulting in a shift in the 9L to R/sub 3/ ratio to greater than 50% R/sub 3/ cells. The combined protocols to be investigated will involve γ rays administered either 36 hr before or after each BCNU treatment. By initiating these combined protocols on spheroids of different sizes, the effectiveness of each protocol is evaluated with respect to the number of resistant cells present

  1. A Review of Communications Protocol for Intelligent Remote Terminal Unit Development

    Directory of Open Access Journals (Sweden)

    Mohd Ruddin Ab. Ghani

    2013-11-01

    Full Text Available This paper reviewed all the possible interfacing communication protocols for remote terminal unit (RTU. Supervisory Control and Data Acquisition (SCADA system is a central station that can communicate with other network using the protocol. Fundamentally, the architectures of all networks are based on the seven layers of open system interconnection (OSI and International Standard Organization (ISO. The objective of designing the protocols is to check the status of all the input and output field devices and send the report according to that status. The corresponding protocol and communication parameters between the connecting devices will be included in designing a complex SCADA system. The available protocols to develop the communication of RTU are Modbus/ASCII, distributed network protocol (DNP3, controller area network (CAN, International Electro-technical Commission (IEC 60870, transmission control protocol/internet protocol (TCP/IP.

  2. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  3. Protocol to co-operation agreement with Iran

    CERN Document Server

    2001-01-01

    A Co-operation Agreement between CERN and Iran will be signed in the coming weeks within the framework of the decisions taken by the Committee of Council and Council in June 1989. In view of implementing this Agreement, a Protocol between CERN and the International Scientific Meetings Office of the Ministry of Science of the Islamic Republic of Iran has been drawn up. It concerns the participation of scientific Institutions of Iran in the CMS Collaboration where CERN is acting on behalf of this Collaboration. This Protocol incorporates the agreement between CMS and ISMO on the Iranese contribution. It does not involve any financial commitment for CERN. The Protocol mainly addresses the status of the Iranese scientists at CERN, the supply by ISMO of the support tables for CMS, as well as the usual provisions concerning delivery and customs, guarantees, responsibilities, intellectual property and disputes. This Protocol is submitted to the Finance Committee for information.

  4. Security of modified Ping-Pong protocol in noisy and lossy channel.

    Science.gov (United States)

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-05-12

    The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.

  5. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  6. The micro-step motor controller protocol and driver

    International Nuclear Information System (INIS)

    Hong, Kwang Pyo; Lee, Chang Hee; Moon, Myung Kook; Choi, Bung Hun; Choi, Young Hyun; Cheon, Jong Gu

    2004-11-01

    We developed the communication protocol which is a main kernel of motor control firmware program that is used at HANARO neutron spectrometer now. This protocol driver divide into as a 4 group(Serial protocol, DLL, Active-X, Labview driver), so end-user can control the motor control as easily by PC RS232/422 port and have a merits as follows: Support a Low Level/High level driver, Support a Network Connectivity function by using High level Driver, One Server can services many client request. By using this protocol, The End-user can be easily makes a application motor control program and developed another application system program by using several kinds of programming tools under Widows and Linux based operation systems

  7. EMS Adherence to a Pre-hospital Cervical Spine Clearance Protocol

    Directory of Open Access Journals (Sweden)

    Johnson, David

    2001-10-01

    Full Text Available Purpose: To determine the degree of adherence to a cervical spine (c-spine clearance protocol by pre-hospital Emergency Medical Services (EMS personnel by both self-assessment and receiving hospital assessment, to describe deviations from the protocol, and to determine if the rate of compliance by paramedic self-assessment differed from receiving hospital assessment. Methods: A retrospective sample of pre-hospital (consecutive series and receiving hospital (convenience sample assessments of the compliance with and appropriateness of c-spine immobilization. The c-spine clearance protocol was implemented for Orange County EMS just prior to the April-November 1999 data collection period. Results: We collected 396 pre-hospital and 162 receiving hospital data forms. From the pre-hospital data sheet. the percentage deviation from the protocol was 4.096 (16/396. Only one out of 16 cases that did not comply with the protocol was due to over immobilization (0.2%. The remaining 15 cases were under immobilized, according to protocol. Nine of the under immobilized cases (66% that should have been placed in c-spine precautions met physical assessment criteria in the protocol, while the other five cases met mechanism of injury criteria. The rate of deviations from protocol did not differ over time. The receiving hospital identified 8.0% (13/162; 6/16 over immobilized, 7/16 under immobilized of patients with deviations from the protocol; none was determined to have actual c-spine injury. Conclusion: The implementation of a pre-hospital c-spine clearance protocol in Orange County was associated with a moderate overall adherence rate (96% from the pre-hospital perspective, and 92% from the hospital perspective, p=.08 for the two evaluation methods. Most patients who deviated from protocol were under immobilized, but no c-spine injuries were missed. The rate of over immobilization was better than previously reported, implying a saving of resources.

  8. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  9. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  10. Topology Discovery Using Cisco Discovery Protocol

    OpenAIRE

    Rodriguez, Sergio R.

    2009-01-01

    In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of discovering topology ...

  11. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  12. Evaluation of an adult insulin infusion protocol at an academic medical center.

    Science.gov (United States)

    Petrov, Katerina I; Burns, Tammy L; Drincic, Andjela

    2012-05-01

    Acknowledging evidence of possible detrimental effects of tightly controlled blood glucose levels, the American Association of Clinical Endocrinologists and the American Diabetes Association published a consensus statement recommending less strict control for most diabetic patients. As a result of these recommendations, our academic center at Creighton University Medical Center revised its adult insulin infusion protocol to target blood glucose levels ranging from 120 to 180 mg/dL for regular (standard) glycemic control and 80 to 120 mg/dL for tight control; previous targets had ranged from 80 to 180 mg/dL and 70 to 110 mg/dL, respectively. The primary objective was to evaluate the time that blood glucose values were within the target range for patients receiving the new protocol, compared with patients receiving the previous protocol. Our study was designed to evaluate the effectiveness and safety of the revised protocol. Using a retrospective chart review, we collected data for 4 months from patients on the old insulin protocol (May to August 2009) and for 4 months from patients on the new protocol (September to December 2009). Secondary endpoints included the number of hypoglycemic episodes (blood glucose below 70 mg/dL) and severe hypoglycemic episodes (blood glucose 40 mg/dL or lower) experienced by patients receiving the new insulin protocol compared with those receiving the former protocol. Patient characteristics were similar at baseline. Blood glucose values stayed within the target range for a significantly shorter time with the new protocol than with the former protocol (44.6% vs. 56.8%, respectively; P protocol. No statistically significant differences in hypoglycemia were observed after the protocol was changed. Hypoglycemia occurred in 31% of the former-protocol patients compared with 18% of the revised-protocol patients. Severe hypoglycemia was experienced by 2.1% of patients on the old protocol and by 3.1% of patients on the new protocol. Rates of

  13. A Protocol for Advanced Psychometric Assessment of Surveys

    Science.gov (United States)

    Squires, Janet E.; Hayduk, Leslie; Hutchinson, Alison M.; Cranley, Lisa A.; Gierl, Mark; Cummings, Greta G.; Norton, Peter G.; Estabrooks, Carole A.

    2013-01-01

    Background and Purpose. In this paper, we present a protocol for advanced psychometric assessments of surveys based on the Standards for Educational and Psychological Testing. We use the Alberta Context Tool (ACT) as an exemplar survey to which this protocol can be applied. Methods. Data mapping, acceptability, reliability, and validity are addressed. Acceptability is assessed with missing data frequencies and the time required to complete the survey. Reliability is assessed with internal consistency coefficients and information functions. A unitary approach to validity consisting of accumulating evidence based on instrument content, response processes, internal structure, and relations to other variables is taken. We also address assessing performance of survey data when aggregated to higher levels (e.g., nursing unit). Discussion. In this paper we present a protocol for advanced psychometric assessment of survey data using the Alberta Context Tool (ACT) as an exemplar survey; application of the protocol to the ACT survey is underway. Psychometric assessment of any survey is essential to obtaining reliable and valid research findings. This protocol can be adapted for use with any nursing survey. PMID:23401759

  14. Comparison of microdose GnRH agonist protocol with GnRH antagonist / letrazole protocol in patients with poor ovarian response

    Directory of Open Access Journals (Sweden)

    Yiğit Çakıroğlu

    2013-09-01

    Full Text Available Objective: To compare microdose GnRH agonist (MDL protocol with GnRH antagonist/letrazole (AL protocol in patients with poor ovarian response. Design: Randomised clinical trial. Setting: Kocaeli University Assisted Reproductive Centre Interventions: POR was diagnosed according to ESHRE Bologna criteria in case of presence of 2 out of 3 criteria. In the MDL group (n=27, 40µg/0.2 cc subcutaneous leuprolid acetate was given two times a day starting on the first day of menstrual cycle. On the second day of the cycle, gonadotrophin stimulation was started at 450-600 IU and/or 150 IU human menopausal gonadotrophin (hMG along with leuprolid. In the AL group (n=28, 5 mg letrazole was given for 5 days starting on the second day of the spontaneous cycle and after the 5th day of the cycle, 450-600 IU and/or 150 IU hMG was given. Main Outcome Measures: To compare the outcomes of MDL protocol with AL protocol in patients with poor ovarian response. Results: Stimulation days, total gonadotrophin dose (IU, peak E2 (pg/ml levels, and endometrial thickness were found to be statistically significantly lower in the AL group. While no cases of cycle cancellation was detected in the MDL group, statistically significantly higher rates of cycle cancellation (%35.7, p<0.001 was detected in the AL group. No statistically significant differences were detected in total oocyte numbers (3.7±2.9 vs 2.7±2.2, number of transferred embryos (1.4±0.5 vs 1.4±1.9, pregnancy rates (3/27 (%11.1 vs 2/28 (%7.1 and implantation rates (3/36 (%8.3 vs 2/22 (%9.1 in between the groups. Comment: Although AL protocol is not superior to MDL protocol in poor ovarian response patients, it may be used as an alternative protocol.

  15. Development of high-reliable real-time communication network protocol for SMART

    Energy Technology Data Exchange (ETDEWEB)

    Song, Ki Sang; Kim, Young Sik [Korea National University of Education, Chongwon (Korea); No, Hee Chon [Korea Advanced Institute of Science and Technology, Taejon (Korea)

    1999-04-01

    In this research, we first define protocol subsets for SMART(System-integrated Modular Advanced Reactor) communication network based on the requirement of SMART MMIS transmission delay and traffic requirements and OSI(Open System Interconnection) 7 layers' network protocol functions. Also, current industrial purpose LAN protocols are analyzed and the applicability of commercialized protocols are checked. For the suitability test, we have applied approximated SMART data traffic and maximum allowable transmission delay requirement. With the simulation results, we conclude that IEEE 802.5 and FDDI which is an ANSI standard, is the most suitable for SMART. We further analyzed the FDDI and token ring protocols for SMART and nuclear plant network environment including IEEE 802.4, IEEE 802.5, and ARCnet. The most suitable protocol for SMART is FDDI and FDDI MAC and RMT protocol specifications have been verified with LOTOS and the verification results show that FDDI MAC and RMT satisfy the reachability and liveness, but does not show deadlock and livelock. Therefore, we conclude that FDDI MAC and RMT is highly reliable protocol for SMART MMIS network. After that, we consider the stacking fault of IEEE 802.5 token ring protocol and propose a fault tolerant MAM(Modified Active Monitor) protocol. The simulation results show that the MAM protocol improves lower priority traffic service rate when stacking fault occurs. Therefore, proposed MAM protocol can be applied to SMART communication network for high reliability and hard real-time communication purpose in data acquisition and inter channel network. (author). 37 refs., 79 figs., 39 tabs.

  16. IVOA Credential Delegation Protocol Version 1.0

    Science.gov (United States)

    Plante, Raymond; Graham, Matthew; Rixon, Guy; Taffoni, Giuliano; Plante, Raymond; Graham, Matthew

    2010-02-01

    The credential delegation protocol allows a client program to delegate a user's credentials to a service such that that service may make requests of other services in the name of that user. The protocol defines a REST service that works alongside other IVO services to enable such a delegation in a secure manner. In addition to defining the specifics of the service protocol, this document describes how a delegation service is registered in an IVOA registry along with the services it supports. The specification also explains how one can determine from a service registration that it requires the use of a supporting delegation service.

  17. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  18. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Mahdi Zareei

    2017-09-01

    Full Text Available New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN. First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  19. Drug: D08224 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D08224 Drug Mitoxantrone (INN); Misostol (TN) ... C22H28N4O6 D08224.gif ... Antineoplastic ... DG01727 ... Anthraquin...one antineoplastic Other ... DG01529 ... Topoisomerase inhibitor ... DG01527 ... Topoisomerase

  20. Quantum protocols within Spekkens' toy model

    Science.gov (United States)

    Disilvestro, Leonardo; Markham, Damian

    2017-05-01

    Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.

  1. Bidirectional Quantum Secure Direct Communication Network Protocol with Hyperentanglement

    International Nuclear Information System (INIS)

    Gu Bin; Chen Yulin; Huang Yugai; Fang Xia

    2011-01-01

    We propose a bidirectional quantum secure direct communication (QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. Compared with other QSDC network protocols, our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information. Also, we discuss the security of our QSDC network protocol and its feasibility with current techniques. (general)

  2. Analysis of limiting information characteristics of quantum-cryptography protocols

    International Nuclear Information System (INIS)

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-01

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  3. Improving the capacity of the ping-pong protocol

    OpenAIRE

    Cai, Qing-yu; Li, Bai-wen

    2003-01-01

    We present a quantum communication protocol which keeps all the properties of the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the capacity doubly as the ping-pong protocol. Alice and Bob can use the variable measurement basises in control mode to detect Eve's eavesdropping attack. In message mode, Alice can use one unitary operations to encode two bits information. Bob only needs to perform a Bell type measurement to decode Alice's information. A classical message aut...

  4. Quantum protocol for cheat-sensitive weak coin flipping.

    Science.gov (United States)

    Spekkens, R W; Rudolph, Terry

    2002-11-25

    We present a quantum protocol for the task of weak coin flipping. We find that, for one choice of parameters in the protocol, the maximum probability of a dishonest party winning the coin flip if the other party is honest is 1/sqrt[2]. We also show that if parties restrict themselves to strategies wherein they cannot be caught cheating, their maximum probability of winning can be even smaller. As such, the protocol offers additional security in the form of cheat sensitivity.

  5. A Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. We present an outline of a deductive proof of the correctness of the protocol. A model of the protocol was mechanically verified using the Symbolic Model Verifier (SMV) for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  6. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2013-12-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  7. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal; Ismail, Amr; Alouini, Mohamed-Slim; Aï ssa, Sonia

    2013-01-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  8. Examining recombinant human TSH primed {sup 131}I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    Energy Technology Data Exchange (ETDEWEB)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip [Bhabha Atomic Research Centre (BARC), Radiation Medicine Centre, Mumbai (India)

    2014-09-15

    Recombinant human thyroid-stimulating hormone (rhTSH)-based protocol is a promising recent development in the management of differentiated thyroid carcinoma (DTC). The objectives of this prospective study were: (1) to assess the feasibility and efficacy of the rhTSH primed {sup 131}I therapy protocol in patients with DTC with distant metastatic disease, (2) to perform lesional dosimetry in this group of patients compared to the traditional protocol, (3) to document the practical advantages (patient symptoms and hospital stay) of the rhTSH protocol compared to the traditional thyroid hormone withdrawal protocol, (4) to document and record any adverse effect of this strategy, (5) to compare the renal function parameters, and (6) to compare the serum TSH values achieved in either of the protocols in this group of patients. The study included 37 patients with metastatic DTC having lung or skeletal metastases or both. A comparison of lesional radiation absorbed dose, hospital stay, renal function tests, and symptom profile was undertaken between the traditional thyroid hormone withdrawal protocol and rhTSH-based therapy protocol. Dosimetric calculations of metastatic lesions were performed using lesion uptake and survey meter readings for calculation of effective half-life. Non-contrast-enhanced CT was used for assessment of tumor volume. Quality of life was assessed using the European Organization for Research and Treatment of Cancer (EORTC) QOL forms. A comparison of pretreatment withdrawal thyroglobulin (TG) was done with the withdrawal TG level 3 months after treatment. The mean effective half-life of {sup 131}I in metastatic lesions was less during the rhTSH protocol (29.49 h) compared to the thyroid hormone withdrawal protocol (35.48 h), but the difference was not statistically significant (p = 0.056). The mean 24-h % uptake of the lesions during the traditional protocol (4.84 %) was slightly higher than the 24-h % uptake during the rhTSH protocol (3.56 %), but

  9. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Michael D. Colagrosso

    2006-11-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  10. Intelligent Broadcasting in Mobile Ad Hoc Networks: Three Classes of Adaptive Protocols

    Directory of Open Access Journals (Sweden)

    Colagrosso Michael D

    2007-01-01

    Full Text Available Because adaptability greatly improves the performance of a broadcast protocol, we identify three ways in which machine learning can be applied to broadcasting in a mobile ad hoc network (MANET. We chose broadcasting because it functions as a foundation of MANET communication. Unicast, multicast, and geocast protocols utilize broadcasting as a building block, providing important control and route establishment functionality. Therefore, any improvements to the process of broadcasting can be immediately realized by higher-level MANET functionality and applications. While efficient broadcast protocols have been proposed, no single broadcasting protocol works well in all possible MANET conditions. Furthermore, protocols tend to fail catastrophically in severe network environments. Our three classes of adaptive protocols are pure machine learning, intra-protocol learning, and inter-protocol learning. In the pure machine learning approach, we exhibit a new approach to the design of a broadcast protocol: the decision of whether to rebroadcast a packet is cast as a classification problem. Each mobile node (MN builds a classifier and trains it on data collected from the network environment. Using intra-protocol learning, each MN consults a simple machine model for the optimal value of one of its free parameters. Lastly, in inter-protocol learning, MNs learn to switch between different broadcasting protocols based on network conditions. For each class of learning method, we create a prototypical protocol and examine its performance in simulation.

  11. Shoulder muscle endurance: the development of a standardized and reliable protocol

    Directory of Open Access Journals (Sweden)

    Roy Jean-Sébastien

    2011-01-01

    Full Text Available Abstract Background Shoulder muscle fatigue has been proposed as a possible link to explain the association between repetitive arm use and the development of rotator cuff disorders. To our knowledge, no standardized clinical endurance protocol has been developed to evaluate the effects of muscle fatigue on shoulder function. Such a test could improve clinical examination of individuals with shoulder disorders. Therefore, the purpose of this study was to establish a reliable protocol for objective assessment of shoulder muscle endurance. Methods An endurance protocol was developed on a stationary dynamometer (Biodex System 3. The endurance protocol was performed in isotonic mode with the resistance set at 50% of each subject's peak torque as measured for shoulder external (ER and internal rotation (IR. Each subject performed 60 continuous repetitions of IR/ER rotation. The endurance protocol was performed by 36 healthy individuals on two separate occasions at least two days apart. Maximal isometric shoulder strength tests were performed before and after the fatigue protocol to evaluate the effects of the endurance protocol and its reliability. Paired t-tests were used to evaluate the reduction in shoulder strength due to the protocol, while intraclass correlation coefficients (ICC and minimal detectable change (MDC were used to evaluate its reliability. Results Maximal isometric strength was significantly decreased after the endurance protocol (P 0.84. Conclusions Changes in muscular performance observed during and after the muscular endurance protocol suggests that the protocol did result in muscular fatigue. Furthermore, this study established that the resultant effects of fatigue of the proposed isotonic protocol were reproducible over time. The protocol was performed without difficulty by all volunteers and took less than 10 minutes to perform, suggesting that it might be feasible for clinical practice. This protocol could be used to induce

  12. Compositional mining of multiple object API protocols through state abstraction.

    Science.gov (United States)

    Dai, Ziying; Mao, Xiaoguang; Lei, Yan; Qi, Yuhua; Wang, Rui; Gu, Bin

    2013-01-01

    API protocols specify correct sequences of method invocations. Despite their usefulness, API protocols are often unavailable in practice because writing them is cumbersome and error prone. Multiple object API protocols are more expressive than single object API protocols. However, the huge number of objects of typical object-oriented programs poses a major challenge to the automatic mining of multiple object API protocols: besides maintaining scalability, it is important to capture various object interactions. Current approaches utilize various heuristics to focus on small sets of methods. In this paper, we present a general, scalable, multiple object API protocols mining approach that can capture all object interactions. Our approach uses abstract field values to label object states during the mining process. We first mine single object typestates as finite state automata whose transitions are annotated with states of interacting objects before and after the execution of the corresponding method and then construct multiple object API protocols by composing these annotated single object typestates. We implement our approach for Java and evaluate it through a series of experiments.

  13. A Review of Fair Exchange Protocols

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...

  14. Joint estimation and contention-resolution protocol for wireless random access

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Trillingsgaard, Kasper Fløe; Kiilerich Pratas, Nuno

    2013-01-01

    We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution of their transmissi......We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution...... successive interference cancellation which, coupled with the use of the optimized access probabilities, enables throughputs that are substantially higher than the traditional slotted ALOHA-like protocols. The key feature of the proposed protocol is that the round durations are not a priori set...

  15. New View of Ping-Pong Protocol Security

    International Nuclear Information System (INIS)

    Zawadzki Piotr

    2012-01-01

    The ping-pong protocol offers confidential transmission of classic information without a prior key agreement. It is believed that it is quasi secure in lossless quantum channels. Serious doubts related to the analysis paradigm which has been used so far are presented in the study. The security of the protocol is reconsidered. (general)

  16. Drug: D05522 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D05522 Drug Pixantrone (USAN/INN); Pixuvri (TN) ... C17H19N5O2 D05522.gif ... Antineoplastic ... DG01727 ... Anthraqu...inone antineoplastic Other ... DG01529 ... Topoisomerase inhibitor ... DG01527 ... Topoisomera

  17. On consensus through communication without a commonly known protocol

    OpenAIRE

    Tsakas Elias; Voorneveld Mark

    2010-01-01

    The present paper extends the standard model of pairwise communication among Bayesianagents to cases where the structure of the communication protocol is not commonly known.We show that, even under strict conditions on the structure of the protocols and the nature of the transmitted signals, a consensus may never be reached if very little asymmetric information about the protocol is introduced.

  18. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  19. I-123 IBZM-SPECT: improved acquisition protocol with HR-collimator

    International Nuclear Information System (INIS)

    Sandrock, D.; Ivancevic, V.; Dopichaj-Menge, U.; Gruber, D.; Munz, D.

    2002-01-01

    Aim: Aim of this study was to evaluate the impact of different acquisition and reconstruction protocols on the quality of SPECT diagnostics with I-123 IBZM in patients with diseases of the dopaminergic system. Material and Methods: Overall, 30 patients (19 men, 11 women, aged 22 - 80 years) were studied with SPECT after i.v. injection of 5 mCi (185 MBq) I-123 IBZM. Acquisition was performed 60 min p.i. (protocol A) using a medium energy collimator, a 64 x 64 matrix, 64 projections, step and shoot technique, 5.6 0 and 20 seconds per step with a MultiSPECT2 double-head gamma camera (Siemens). Immediately afterwards, a second acquisition (protocol B, 90 min p.i.) using a high resolution collimator, a 128 x 128 matrix, 60 projections, step and shoot technique, 3 0 and 30 seconds per step was performed. The reconstruction was done in filtered backprojection technique and a Butterworth filter of order 7, in protocol A using a cutoff of 0.5 and in protocol B of 0.4. Finally, the net count ratios of the basal ganglia to the frontal lobe(s) were calculated and compared with the clinical diagnosis. Results: The visual analysis yielded - as expected -a better image quality for protocol B (concordant impression of 3 independent observers) with more accurate delineation of the basal ganglia. The count ratios with protocol B were (mean) 0.19 higher (equivalent to 13 %) than with protocol A. In the group of patients with count ratios > 1.55 there was the highest (and significant) difference between protocols A and B with (mean count ratio difference) 0.32 (equivalent to 20 %). Protocol B also allowed a better differentiation between patients clinically staged normal and abnormal. In patients with unilateral disease, this difference between normal and abnormal was more prominent (in comparison to the contralateral side as well as compared to the reference value [1.5]). The comparison of the count ratios with the clinical data revealed 7 patients with borderline results with

  20. WE-E-304-00: Implementing SBRT Protocols

    International Nuclear Information System (INIS)

    2015-01-01

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation

  1. Monitoring System with Two Central Facilities Protocol

    Directory of Open Access Journals (Sweden)

    Caesar Firdaus

    2017-03-01

    Full Text Available The security of data and information on government’s information system required proper way of defending against threat. Security aspect can be achieved by using cryptography algorithm, applying information hiding concept, and implementing security protocol. In this research, two central facilities protocol was implemented on Research and Development Center of Mineral and Coal Technology’s Cooperation Contract Monitoring System by utilizing AES and whitespace manipulation algorithm. Adjustment on the protocol by creating several rule of validation ID’s generation and checking processes could fulfill two of four cryptography objectives, consist of authentication and non-repudiation. The solid collaboration between central legitimization agency (CLA, central tabulating facility (CTF, and client is the main idea in two central facilities protocol. The utilization of AES algorithm could defend the data on transmission from man in the middle attack scenario. On the other hand, whitespace manipulation algorithm provided data integrity aspect of the document that is uploaded to the system itself. Both of the algorithm fulfill confidentiality, data integrity, and authentication.

  2. WE-E-304-00: Implementing SBRT Protocols

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2015-06-15

    SBRT is having a dramatic impact on radiation therapy of early-stage, locally advanced cancers. A number of national protocols have been and are being developed to assess the clinical efficacy of SBRT for various anatomical sites, such as lung and spine. Physics credentialing for participating and implementation of trial protocols involve a broad spectrum of requirements from image guidance, motion management, to planning technology and dosimetric constrains. For radiation facilities that do not have extensive experiences in SBRT treatment and protocol credentialing, these complex processes of credentialing and implementation could be very challenging and, sometimes, may lead to ineffective even unsuccessful execution of these processes. In this proposal, we will provide comprehensive review of some current SBRT protocols, explain the requirements and their underline rationales, illustrate representative failed and successful experiences, related to SBRT credentialing, and discuss strategies for effective SBRT credentialing and implementation. Learning Objectives: Understand requirements and challenges of SBRT credentailing and implentation Discuss processes and strategies of effective SBRT credentailing Discuss practical considerations, potential pitfalls and solutions of SBRT implentation.

  3. Past and Future of the Kyoto Protocol. Final report

    International Nuclear Information System (INIS)

    Wijen, F.; Zoeteman, K.

    2004-01-01

    The present report reflects findings from a study on the realization of and prospects for the Kyoto Protocol. The purpose of the study was (1) to obtain insights into the factors that enabled the realization of the Kyoto Protocol, in particular the interactions among major parties involved; (2) to assess the future opportunities and threats of the Kyoto Protocol, in particular against the backdrop of an increasingly globalised world. The study was conducted from February up to December 2003 by (a) reviewing the literature, especially publications on the negotiation history of the Kyoto process, the social interactions enabling the realization of the Protocol, analyses of strengths and weaknesses, and future climate regimes; (b) conducting a series of interviews with representatives from government, academia, non-governmental organisations, and business, who have been - directly or indirectly - involved in the Kyoto process; (c) internal discussions,brainstorming and analysing the Protocol's strengths and weaknesses, possible future scenarios (including policy options), and the management of a possible failure of the Kyoto Protocol. The present report reflects and integrates the different sources. The first section deals with the past and the present. It discusses how the Kyoto Protocol could be realized despite the divergent interests, reflects on its architecture, and analyses major strengths and weaknesses. In the second section, we present possible future scenarios. We explore how different combinations of domestic and international commitment provide possible realities that national government may face when crafting climate policy. The third section provides an in-depth analysis of the possible event that the Kyoto Protocol fails. We discuss its definition and policy implications. The final section is reserved for overall conclusions and policy recommendations

  4. Analytical protocols for characterisation of sulphur-free lignin

    NARCIS (Netherlands)

    Gosselink, R.J.A.; Abächerli, A.; Semke, H.; Malherbe, R.; Käuper, P.; Nadif, A.; Dam, van J.E.G.

    2004-01-01

    Interlaboratory tests for chemical characterisation of sulphur-free lignins were performed by five laboratories to develop useful analytical protocols, which are lacking, and identify quality-related properties. Protocols have been established for reproducible determination of the chemical

  5. Pregnancy outcome of “delayed start” GnRH antagonist protocol versus GnRH antagonist protocol in poor responders: A clinical trial study

    Directory of Open Access Journals (Sweden)

    Abbas Aflatoonian

    2017-08-01

    Full Text Available Background: Management of poor-responding patients is still major challenge in assisted reproductive techniques (ART. Delayed-start GnRH antagonist protocol is recommended to these patients, but little is known in this regards. Objective: The goal of this study was assessment of delayed-start GnRH antagonist protocol in poor responders, and in vitro fertilization (IVF outcomes. Materials and Methods: This randomized clinical trial included sixty infertile women with Bologna criteria for ovarian poor responders who were candidate for IVF. In case group (n=30, delayed-start GnRH antagonist protocol administered estrogen priming followed by early follicular-phase GnRH antagonist treatment for 7 days before ovarian stimulation with gonadotropin. Control group (n=30 treated with estrogen priming antagonist protocol. Finally, endometrial thickness, the rates of oocytes maturation, , embryo formation, and pregnancy were compared between two groups. Results: Rates of implantation, chemical, clinical, and ongoing pregnancy in delayed-start cycles were higher although was not statistically significant. Endometrial thickness was significantly higher in case group. There were no statistically significant differences in the rates of oocyte maturation, embryo formation, and IVF outcomes between two groups. Conclusion: There is no significant difference between delayed-start GnRH antagonist protocol versus GnRH antagonist protocol.

  6. CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, M. G.; Kabir, M. Hasnat; Rahim, M. Sajjadur; Ullah, Sk. Enayet

    2012-01-01

    A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. We introduce cluster head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to collect information from target field. On rotation basis, a head-set member receives data from the neighbor nodes and transmits the aggregated results to the distance base station. This protocol ...

  7. Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol

    DEFF Research Database (Denmark)

    Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele

    2017-01-01

    We introduce the notion of privacy-preserving verifiability for security protocols. It holds when a protocol admits a verifiability test that does not reveal, to the verifier that runs it, more pieces of information about the protocol’s execution than those required to run the test. Our definition...... of privacy-preserving verifiability is general and applies to cryptographic protocols as well as to human security protocols. In this paper we exemplify it in the domain of e-exams. We prove that the notion is meaningful by studying an existing exam protocol that is verifiable but whose verifiability tests...... are not privacy-preserving. We prove that the notion is applicable: we review the protocol using functional encryption so that it admits a verifiability test that preserves privacy according to our definition. We analyse, in ProVerif, that the verifiability holds despite malicious parties and that the new...

  8. Authentication Protocols for Internet of Things: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Mohamed Amine Ferrag

    2017-01-01

    Full Text Available In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1 Machine to Machine Communications (M2M, (2 Internet of Vehicles (IoV, (3 Internet of Energy (IoE, and (4 Internet of Sensors (IoS. Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

  9. Protocol-based care: the standardisation of decision-making?

    Science.gov (United States)

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  10. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  11. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    Science.gov (United States)

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

  12. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  13. Antineoplastic-related cardiotoxicity, morphofunctional aspects in a murine model: contribution of the new tool 2D-speckle tracking

    Directory of Open Access Journals (Sweden)

    Coppola C

    2016-11-01

    Full Text Available Carmela Coppola,1 Gennaro Riccio,1 Antonio Barbieri,2 Maria Gaia Monti,3 Giovanna Piscopo,1 Domenica Rea,2 Claudio Arra,2 Carlo Maurea,1 Claudia De Lorenzo,4,5 Nicola Maurea1 1Division of Cardiology, Istituto Nazionale per lo Studio e la Cura dei Tumori “Fondazione G. Pascale”, IRCCS, Naples, Italy; 2Animal Facility Unit, Department of Experimental Oncology, Istituto Nazionale per lo Studio e la Cura dei Tumori “Fondazione G. Pascale”, IRCCS, Naples, Italy; 3Department of Translational Medical Sciences, University Federico II, Naples, Italy; 4Department of Molecular Medicine and Medical Biotechnology, University Federico II, Naples, Italy; 5CEINGE Biotecnologie Avanzate, Naples, Italy Objective: Considering that global left ventricular systolic radial strain is a sensitive technique for the early detection of left ventricular dysfunction due to antineoplastics and the analysis of segmental myocardial contractility, we evaluated this technique for early detection of trastuzumab-related cardiotoxicity by comparing it with cardiac structural damage.Methods: Groups of six mice were injected with trastuzumab or doxorubicin, used either as single agents or in combination. Cardiac function was evaluated by transthoracic echocardiography measurements before and after treatment for 2 or 7 days, by using a Vevo 2100 high-resolution imaging system. After echocardiography, mice were euthanized, and hearts were processed for histological evaluations, such as cardiac fibrosis, apoptosis, capillary density, and inflammatory response.Results: Trastuzumab-related cardiotoxicity was detected early by 2D strain imaging. Radial strain was reduced after 2 days in mice treated with trastuzumab alone (21.2%±8.0% vs 40.5%±4.8% sham; P<0.01. Similarly, trastuzumab was found to induce apoptosis, capillary density reduction, and inflammatory response in cardiac tissue after 2 days of treatment, in a fashion similar to doxorubicin. On the contrary, fractional

  14. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  15. SPECT/CT workflow and imaging protocols

    International Nuclear Information System (INIS)

    Beckers, Catherine; Hustinx, Roland

    2014-01-01

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  16. The development of standard operating protocols for paediatric radiology

    International Nuclear Information System (INIS)

    Hardwick, J.; Mencik, C.; McLaren, C.; Young, C.; Scadden, S.; Mashford, P.; McHugh, K.; Beckett, M.; Calvert, M.; Marsden, P.J.

    2001-01-01

    This paper describes how the requirement for operating protocols for standard radiological practice was expanded to provide a comprehensive aide to the operator conducting a medical exposure. The protocols adopted now include justification criteria, patient preparation, radiographic technique, standard exposure charts, diagnostic reference levels and image quality criteria. In total, the protocols have been welcomed as a tool for ensuring that medical exposures are properly optimised. (author)

  17. Protocols development for security and privacy of radio frequency identification systems

    Science.gov (United States)

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  18. Improving the security of quantum protocols via commit-and-open

    NARCIS (Netherlands)

    I.B. Damgård (Ivan); S. Fehr (Serge); C. Luneman; L. Salvail (Louis); C. Schaffner (Christian)

    2009-01-01

    htmlabstractWe consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general compiler improving the security of such protocols: if the original protocol is secure against an almost honest adversary, then the

  19. Caltech computer scientists develop FAST protocol to speed up Internet

    CERN Multimedia

    2003-01-01

    "Caltech computer scientists have developed a new data transfer protocol for the Internet fast enough to download a full-length DVD movie in less than five seconds. The protocol is called FAST, standing for Fast Active queue management Scalable Transmission Control Protocol" (1 page).

  20. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  1. SPIRIT 2013 explanation and elaboration: guidance for protocols of clinical trials.

    Science.gov (United States)

    Chan, An-Wen; Tetzlaff, Jennifer M; Gøtzsche, Peter C; Altman, Douglas G; Mann, Howard; Berlin, Jesse A; Dickersin, Kay; Hróbjartsson, Asbjørn; Schulz, Kenneth F; Parulekar, Wendy R; Krleza-Jeric, Karmela; Laupacis, Andreas; Moher, David

    2013-01-08

    High quality protocols facilitate proper conduct, reporting, and external review of clinical trials. However, the completeness of trial protocols is often inadequate. To help improve the content and quality of protocols, an international group of stakeholders developed the SPIRIT 2013 Statement (Standard Protocol Items: Recommendations for Interventional Trials). The SPIRIT Statement provides guidance in the form of a checklist of recommended items to include in a clinical trial protocol. This SPIRIT 2013 Explanation and Elaboration paper provides important information to promote full understanding of the checklist recommendations. For each checklist item, we provide a rationale and detailed description; a model example from an actual protocol; and relevant references supporting its importance. We strongly recommend that this explanatory paper be used in conjunction with the SPIRIT Statement. A website of resources is also available (www.spirit-statement.org). The SPIRIT 2013 Explanation and Elaboration paper, together with the Statement, should help with the drafting of trial protocols. Complete documentation of key trial elements can facilitate transparency and protocol review for the benefit of all stakeholders.

  2. Data-driven CT protocol review and management—experience from a large academic hospital.

    Science.gov (United States)

    Zhang, Da; Savage, Cristy A; Li, Xinhua; Liu, Bob

    2015-03-01

    Protocol review plays a critical role in CT quality assurance, but large numbers of protocols and inconsistent protocol names on scanners and in exam records make thorough protocol review formidable. In this investigation, we report on a data-driven cataloging process that can be used to assist in the reviewing and management of CT protocols. We collected lists of scanner protocols, as well as 18 months of recent exam records, for 10 clinical scanners. We developed computer algorithms to automatically deconstruct the protocol names on the scanner and in the exam records into core names and descriptive components. Based on the core names, we were able to group the scanner protocols into a much smaller set of "core protocols," and to easily link exam records with the scanner protocols. We calculated the percentage of usage for each core protocol, from which the most heavily used protocols were identified. From the percentage-of-usage data, we found that, on average, 18, 33, and 49 core protocols per scanner covered 80%, 90%, and 95%, respectively, of all exams. These numbers are one order of magnitude smaller than the typical numbers of protocols that are loaded on a scanner (200-300, as reported in the literature). Duplicated, outdated, and rarely used protocols on the scanners were easily pinpointed in the cataloging process. The data-driven cataloging process can facilitate the task of protocol review. Copyright © 2015 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  3. High-Performance CCSDS AOS Protocol Implementation in FPGA

    Science.gov (United States)

    Clare, Loren P.; Torgerson, Jordan L.; Pang, Jackson

    2010-01-01

    The Consultative Committee for Space Data Systems (CCSDS) Advanced Orbiting Systems (AOS) space data link protocol provides a framing layer between channel coding such as LDPC (low-density parity-check) and higher-layer link multiplexing protocols such as CCSDS Encapsulation Service, which is described in the following article. Recent advancement in RF modem technology has allowed multi-megabit transmission over space links. With this increase in data rate, the CCSDS AOS protocol implementation needs to be optimized to both reduce energy consumption and operate at a high rate.

  4. Design and Implementation of a Secure Modbus Protocol

    Science.gov (United States)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  5. Hybrid protocols plus natural treatments for inflammatory conditions.

    Science.gov (United States)

    1998-01-01

    Hybrid protocols combine one, two, or three pharmaceutical drugs with several nutritional or immune-based therapies. These protocols are not limited solely to FDA-approved drugs or strictly to alternative therapies. The rationale for using a hybrid protocol is to find an effective antiviral regimen that also restores immune function. The goal is to obtain the benefits of protease inhibitors without viral resistance and side effects which include problems with fat metabolism and cholesterol levels. Natural treatments for inflammatory conditions are also described. Options include licorice root, ginger root, and slippery elm.

  6. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    Science.gov (United States)

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  7. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair.

    Science.gov (United States)

    Lightsey, Harry M; Kantrowitz, David E; Swindell, Hasani W; Trofa, David P; Ahmad, Christopher S; Lynch, T Sean

    2018-02-01

    The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Cross-sectional study. Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises. Fifteen protocols (43%) required completion of

  8. Security of modified Ping-Pong protocol in noisy and lossy channel

    OpenAIRE

    Han, Yun-Guang; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Guo, Guang-Can; Han, Zheng-Fu

    2014-01-01

    The “Ping-Pong” (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove ...

  9. Protocol compliance and time management in blunt trauma resuscitation.

    Science.gov (United States)

    Spanjersberg, W R; Bergs, E A; Mushkudiani, N; Klimek, M; Schipper, I B

    2009-01-01

    To study advanced trauma life support (ATLS) protocol adherence prospectively in trauma resuscitation and to analyse time management of daily multidisciplinary trauma resuscitation at a level 1 trauma centre, for both moderately and severely injured patients. All victims of severe blunt trauma were consecutively included. Patients with a revised trauma score (RTS) of 12 were resuscitated by a "minor trauma" team and patients with an RTS of less than 12 were resuscitated by a "severe trauma" team. Digital video recordings were used to analyse protocol compliance and time management during initial assessment. From 1 May to 1 September 2003, 193 resuscitations were included. The "minor trauma" team assessed 119 patients, with a mean injury severity score (ISS) of 7 (range 1-45). Overall protocol compliance was 42%, ranging from 0% for thoracic percussion to 93% for thoracic auscultation. The median resuscitation time was 45.9 minutes (range 39.7-55.9). The "severe team" assessed 74 patients, with a mean ISS of 22 (range 1-59). Overall protocol compliance was 53%, ranging from 4% for thoracic percussion to 95% for thoracic auscultation. Resuscitation took 34.8 minutes median (range 21.6-44.1). Results showed the current trauma resuscitation to be ATLS-like, with sometimes very low protocol compliance rates. Timing of secondary survey and radiology and thus time efficiency remains a challenge in all trauma patients. To assess the effect of trauma resuscitation protocols on outcome, protocol adherence needs to be improved.

  10. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  11. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  12. The Nagoya Protocol: Fragmentation or Consolidation?

    Directory of Open Access Journals (Sweden)

    Carmen Richerzhagen

    2014-02-01

    Full Text Available In October, 2010, a protocol on access and benefit-sharing (ABS of genetic resources was adopted, the so-called Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity. Before the adoption of the Nagoya Protocol, the governance architecture of ABS was already characterized by a multifaceted institutional environment. The use of genetic resources is confronted with many issues (conservation, research and development, intellectual property rights, food security, health issues, climate change that are governed by different institutions and agreements. The Nagoya Protocol contributes to increased fragmentation. However, the question arises whether this new regulatory framework can help to advance the implementation of the ABS provisions of the Convention on Biological Diversity (CBD. This paper attempts to find an answer to that question by following three analytical steps. First, it analyzes the causes of change against the background of theories of institutional change. Second, it aims to assess the typology of the architecture in order to find out if this new set of rules will contribute to a more synergistic, cooperative or conflictive architecture of ABS governance. Third, the paper looks at the problem of “fit” and identifies criteria that can be used to assess the new ABS governance architecture with regard to its effectiveness.

  13. International protocol on volatile organic compounds

    International Nuclear Information System (INIS)

    Gauthier, J.-P.

    1992-01-01

    In August 1991, negotiations between Canada, the USA, and 33 European countries led to an international protocol on reducing the emissions of volatile organic compounds (VOC), which are responsible for serious ozone pollution problems. This was the third transborder pollution agreement developed under the auspices of the United Nations Economic Commission for Europe. Certain aspects of negotiations related to an earlier protocol developed for SO 2 and nitrogen oxide emissions had reappeared during the VOC negotiations, and these aspects are discussed. The VOC protocol proposes three approaches to satisfy basic obligations: reducing VOC emissions of a country by 30%, reducing VOC emissions by 30% in certain regions, and ensuring a freeze in VOC emissions in a country starting on a specified date. The protocol also introduces a new concept, that of zones of tropospheric ozone management. In Canada, plans for management of nitrogen oxides and VOC have been adapted to the ozone problem, and the management plan has been developed by a consultation process involving all sectors of society including industry, environmental groups, and governments. In Canada, it will be sufficient to reduce total VOC emissions by 16% during a first phase and to increase these reductions slightly in the second phase. Special ozone management zones in the Quebec City/Windsor corridor and the Fraser River valley have been established

  14. Samples and Sampling Protocols for Scientific Investigations | Joel ...

    African Journals Online (AJOL)

    ... from sampling, through sample preparation, calibration to final measurement and reporting. This paper, therefore offers useful information on practical guidance on sampling protocols in line with best practice and international standards. Keywords: Sampling, sampling protocols, chain of custody, analysis, documentation ...

  15. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4, Volume IV: Inherent Optical Properties: Instruments, Characterizations, Field Measurements and Data Analysis Protocols

    Science.gov (United States)

    Mueller, J. L.; Fargion, G. S.; McClain, C. R. (Editor); Pegau, S.; Zanefeld, J. R. V.; Mitchell, B. G.; Kahru, M.; Wieland, J.; Stramska, M.

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparision and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background, and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 is entirely superseded by the six volumes of Revision 4 listed above.

  16. A correctness proof of the bakery protocol in $ mu $CRL

    NARCIS (Netherlands)

    J.F. Groote (Jan Friso); H.P. Korver

    1994-01-01

    textabstractA specification of a bakery protocol is given in $mu$CRL. We provide a simple correctness criterion for the protocol. Then the protocol is proven correct using a proof system that has been developed for $mu$CRL. The proof primarily consists of algebraic manipulations based on

  17. A randomized trial of microdose leuprolide acetate protocol versus luteal phase ganirelix protocol in predicted poor responders.

    Science.gov (United States)

    DiLuigi, Andrea J; Engmann, Lawrence; Schmidt, David W; Benadiva, Claudio A; Nulsen, John C

    2011-06-30

    We performed a randomized trial to compare IVF outcomes in 54 poor responder patients undergoing a microdose leuprolide acetate (LA) protocol or a GnRH antagonist protocol incorporating a luteal phase E(2) patch and GnRH antagonist in the preceding menstrual cycle. Cancellation rates, number of oocytes retrieved, clinical pregnancy rates (PR), and ongoing PRs were similar between the two groups. Copyright © 2011 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  18. Blind quantum computation protocol in which Alice only makes measurements

    Science.gov (United States)

    Morimae, Tomoyuki; Fujii, Keisuke

    2013-05-01

    Blind quantum computation is a new secure quantum computing protocol which enables Alice (who does not have sufficient quantum technology) to delegate her quantum computation to Bob (who has a full-fledged quantum computer) in such a way that Bob cannot learn anything about Alice's input, output, and algorithm. In previous protocols, Alice needs to have a device which generates quantum states, such as single-photon states. Here we propose another type of blind computing protocol where Alice does only measurements, such as the polarization measurements with a threshold detector. In several experimental setups, such as optical systems, the measurement of a state is much easier than the generation of a single-qubit state. Therefore our protocols ease Alice's burden. Furthermore, the security of our protocol is based on the no-signaling principle, which is more fundamental than quantum physics. Finally, our protocols are device independent in the sense that Alice does not need to trust her measurement device in order to guarantee the security.

  19. Privacy-Preserving Meter Report Protocol of Isolated Smart Grid Devices

    Directory of Open Access Journals (Sweden)

    Zhiwei Wang

    2017-01-01

    Full Text Available Smart grid aims to improve the reliability, efficiency, and security of the traditional grid, which allows two-way transmission and efficiency-driven response. However, a main concern of this new technique is that the fine-grained metering data may leak the personal privacy information of the customers. Thus, the data aggregation mechanism for privacy protection is required for the meter report protocol in smart grid. In this paper, we propose an efficient privacy-preserving meter report protocol for the isolated smart grid devices. Our protocol consists of an encryption scheme with additively homomorphic property and a linearly homomorphic signature scheme, where the linearly homomorphic signature scheme is suitable for privacy-preserving data aggregation. We also provide security analysis of our protocol in the context of some typical attacks in smart grid. The implementation of our protocol on the Intel Edison platform shows that our protocol is efficient enough for the physical constrained devices, like smart meters.

  20. Benzimidazole condensed ring systems 10 (1). Synthesis and cytotoxic activity of some pyrido[1,2-a]benzimidazoles.

    Science.gov (United States)

    Badawey, E S; Kappe, T

    1995-01-01

    As a part of research project on the synthesis of a number of pyrido[1,2-a]benzimidazole derivatives with possible antineoplastic activity and as a result of the interesting antineoplastic activity recorded for one such compounds (NSC 649900), some new pyrido[1,2-a]benzimidazoles were prepared and evaluated for such activity. Compound (11, NSC 660334) exhibited a moderate in vitro antineoplastic activity especially against most of the leukemia cell lines, while compound (10, VM30309) showed a good cytotoxic activity against Artina salina larvae (IC50 = 1.75 micrograms/ml).

  1. Drug: D03414 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D03414 Drug Carubicin hydrochloride (USAN) ... C26H27NO10. HCl D03414.gif ... Antineoplastic... ... DG01682 ... Anthracycline antineoplastic ... CAS: 52794-97-5 PubChem: 17397554 ChEMBL: CHEMBL537408 LigandBox: D03414 ...

  2. IoT real time data acquisition using MQTT protocol

    Science.gov (United States)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  3. Cluster protocols in Underwater Sensor Networks: a Research Review

    Directory of Open Access Journals (Sweden)

    K. Ovaliadis

    2014-07-01

    Full Text Available Underwater Wireless Sensor Networks (UWSN have different characteristics in relation to terrestrial wireless sensor networks; such as limited bandwidth capacity, high propagation delays and limited battery power. Although there has been much work completed in developing protocols and models for terrestrial networks, these are rarely applicable for underwater sensor networks. Up to today major efforts have been made for designing efficient protocols while considering the underwater communication characteristics. An important issue on this research area is the construction of an efficient clustering algorithm. Clustering in the context of UWSN is important as it contributes a great deal towards the efficient use of energy resources. This paper reviews the most significant cluster based protocols proposed for UWSN. Major performance issues of these protocols with respect to the network conditions such as packet delivery ratio, average packet delay, node mobility effect and energy consumption are examined. The advantages and disadvantages of each protocol are also pointed out.

  4. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    International Nuclear Information System (INIS)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua

    2010-01-01

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  5. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua [Department of Electronic Information Engineering, Nanchang University, Nanchang 330031 (China)], E-mail: znr21@163.com, E-mail: znr21@hotmail.com

    2010-04-15

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  6. Communicating systems with UML 2 modeling and analysis of network protocols

    CERN Document Server

    Barrera, David Garduno

    2013-01-01

    This book gives a practical approach to modeling and analyzing communication protocols using UML 2. Network protocols are always presented with a point of view focusing on partial mechanisms and starting models. This book aims at giving the basis needed for anybody to model and validate their own protocols. It follows a practical approach and gives many examples for the description and analysis of well known basic network mechanisms for protocols.The book firstly shows how to describe and validate the main protocol issues (such as synchronization problems, client-server interactions, layer

  7. On the Composition of Public-Coin Zero-Knowledge Protocols

    Science.gov (United States)

    2011-05-31

    only languages in BPP have public-coin black-box zero-knowledge protocols that are secure under an unbounded (polynomial) number of parallel...only languages in BPP have public-coin black-box zero-knowledge protocols that are secure under an unbounded (polynomial) number of parallel repetitions...and Krawczyk [GK96b] show that only languages in BPP have constant-round public-coin (stand-alone) black-box ZK protocols with negligible soundness

  8. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    OpenAIRE

    RIBEIRO, CHRISTIE GRAF; MOREIRA, ANA TEREZA RAMOS; PINTO, JOSÉ SIMÃO DE PAULA; MALAFAIA, OSVALDO

    2016-01-01

    ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c)). Methods: this is a descriptive study, with the methodology divided into three phases: (1) development of a theoretical ophthalmologic database with emphasis on strabismus; (2) compute...

  9. Protocol - RPD | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available switchLanguage; BLAST Search Image Search Home About Archive Update History Data ...e version) File URL: ftp://ftp.biosciencedbc.jp/archive/rpd/LATEST/rpd_protocol_jp.zip File size: 535 KB Fil...e name: rpd_protocol_en.zip (English version) File URL: ftp://ftp.biosciencedbc.jp/archiv...tabase Database Description Download License Update History of This Database Site Policy | Contact Us Protocol - RPD | LSDB Archive ...

  10. Development and validation of a remote home safety protocol.

    Science.gov (United States)

    Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon

    2018-02-01

    Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.

  11. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  12. Ocean fertilization, carbon credits and the Kyoto Protocol

    Science.gov (United States)

    Westley, M. B.; Gnanadesikan, A.

    2008-12-01

    Commercial interest in ocean fertilization as a carbon sequestration tool was excited by the December 1997 agreement of the Kyoto Protocol to the United Nations Convention on Climate Change. The Protocol commits industrialized countries to caps on net greenhouse gas emissions and allows for various flexible mechanisms to achieve these caps in the most economically efficient manner possible, including trade in carbon credits from projects that reduce emissions or enhance sinks. The carbon market was valued at 64 billion in 2007, with the bulk of the trading (50 billion) taking place in the highly regulated European Union Emission Trading Scheme, which deals primarily in emission allowances in the energy sector. A much smaller amount, worth $265 million, was traded in the largely unregulated "voluntary" market (Capoor and Ambrosi 2008). As the voluntary market grows, so do calls for its regulation, with several efforts underway to set rules and standards for the sale of voluntary carbon credits using the Kyoto Protocol as a starting point. Four US-based companies and an Australian company currently seek to develop ocean fertilization technologies for the generation of carbon credits. We review these plans through the lens of the Kyoto Protocol and its flexible mechanisms, and examine whether and how ocean fertilization could generate tradable carbon credits. We note that at present, ocean sinks are not included in the Kyoto Protocol, and that furthermore, the Kyoto Protocol only addresses sources and sinks of greenhouse gases within national boundaries, making open-ocean fertilization projects a jurisdictional challenge. We discuss the negotiating history behind the limited inclusion of land use, land use change and forestry in the Kyoto Protocol and the controversy and eventual compromise concerning methodologies for terrestrial carbon accounting. We conclude that current technologies for measuring and monitoring carbon sequestration following ocean fertilization

  13. A Correctness Proof of the Bakery Protocol in μCRL

    NARCIS (Netherlands)

    Groote, J.F.; Korver, H.

    1992-01-01

    A specification of the bakery protocol is given in μCRL. We provide a simple correctness criterion for the protocol. Then the protocol is proven correct using a proof system that has been developed for μCRL. The proof primarily consists of algebraic manipulations based on specifications of

  14. RSComPro: An Open Communication Protocol for Remote Sensing Systems

    DEFF Research Database (Denmark)

    Vasiljevic, Nikola; Trujillo, Juan-José

    The remote sensing protocol (RSComPro) is a communication protocol, which has been developed for controlling multiple remote sensing systems simultaneously through a UDP/IP and TPC/IP network. This protocol is meant to be open to the remote sensing community. The scope is the implementation of so...

  15. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    Science.gov (United States)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  16. Mechanical verification of concurrency control and recovery protocols

    NARCIS (Netherlands)

    Chkliaev, D.

    2001-01-01

    The thesis concerns the formal specification and mechanized verification of concurrency control and recovery protocols for distributed databases. Such protocols are needed for many modern application such as banking and are often used in safety-critical applications. Therefore it is very important

  17. A Dialogue Game Protocol for Agent Purchase Negotiations

    NARCIS (Netherlands)

    McBurney, P.; Eijk, R.M. van; Parsons, S.; Amgoud, L.

    2003-01-01

    We propose a dialogue game protocol for purchase negotiation dialogues which identifies appropriate speech acts, defines constraints on their utterances, and specifies the different sub-tasks agents need to perform in order to engage in dialogues according to this protocol. Our formalism combines

  18. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  19. A quantum secret-sharing protocol with fairness

    International Nuclear Information System (INIS)

    Liu, Feng; Qin, Su-Juan; Wen, Qiao-Yan

    2014-01-01

    A quantum secret-sharing (QSS) protocol consists of two main phases, called sharing and reconstruction. In the first phase, the dealer selects a secret, divides it into several shares, and sends each participant its share securely with a quantum channel. In the second phase, the participants run an interactive protocol in order to reconstruct the secret. If the participants can communicate via a broadcast channel, they can show their shares and learn the secrets simultaneously. So what happens if the channel is not simultaneous? In this paper, we propose a QSS protocol with cheaters by using partially and maximally entangled states. A secure and fair reconstruction mechanism is designed, in a way that each participant can learn or cannot learn the secret simultaneously. (papers)

  20. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  1. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  2. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  3. Comparison Pregnancy Outcomes Between Minimal Stimulation Protocol and Conventional GnRH Antagonist Protocols in Poor Ovarian Responders

    Directory of Open Access Journals (Sweden)

    Shamim Pilehvari

    2016-05-01

    Full Text Available Objective: To compare the pregnancy outcomes achieved by in vitro fertilization (IVF between minimal stimulation and conventional antagonist protocols in poor ovarian responders (PORs.Materials and methods: In this randomized controlled trial, 77 PORs undergoing IVF were selected and divided into two groups. First group was the minimal stimulation group (n = 42 receiving 100 mg/day clomiphene citrate on day 2of the cycle for 5 day that was followed by150IU/day human menopausal gonadotropin (hMG on day 5 of the cycle. Second group was the conventional group (n = 35 receiving at least 300 IU/daygonadotropin on day 2 of the cycle. Gonadotropin-releasing hormone (GnRH antagonist protocol was applied for both groups according to flexible protocol. Number of retrieved oocytes and chemical pregnancy rate were the main outcomes.Results: There was no difference in number ofretrieved oocyte and pregnancy rate (2.79 ± 1.96 vs. 2.20 ± 1.71 and 5.6% vs. 4.1%; p > 0.05 between both groups. The gonadotropin dose used in the minimal stimulation group was lower than conventional group (1046 ± 596 vs. 2806 ± 583.Conclusion: Minimal stimulation protocol with lower gonadotropin used is likely to be considered as a patient- friendly and cost-effective substitute for PORs. 

  4. Protocol notions from the bibliography of his authorities

    Directory of Open Access Journals (Sweden)

    Dra. María Luz Álvarez Rodríguez

    2008-01-01

    Full Text Available Protocol is a subject that has suffered great changes over the last years in Spain. Its presence at university training has shifted from being a mere anecdote to becoming one more subject to be taught in postgraduate courses endorsed by a big social and professional demand. With the aim of announcing Protocol as a subject to the Spanish academic field, the present article carries out a study of the theoretical situation of this subject and profession in Spain. This research means to get to know the scientific character of Protocol, at the same time as it tries to found such professional side in the current offer of courses and of training. For this reason, this research could be interesting for the Spanish academic field, by helping to explain the reality of Protocol in Spain and to impel its theoretical development in our country.

  5. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  6. Drug: D05510 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available D05510 Drug Piroxantrone hydrochloride (USAN) ... C21H25N5O4. 2HCl D05510.gif ... Antineoplastic... ... DG01727 ... Anthraquinone antineoplastic ... anthraquinone derivative ... CAS: 105118-12-5 PubChem: 47207179 LigandBox: D05510 ...

  7. A software defined RTU multi-protocol automatic adaptation data transmission method

    Science.gov (United States)

    Jin, Huiying; Xu, Xingwu; Wang, Zhanfeng; Ma, Weijun; Li, Sheng; Su, Yong; Pan, Yunpeng

    2018-02-01

    Remote terminal unit (RTU) is the core device of the monitor system in hydrology and water resources. Different devices often have different communication protocols in the application layer, which results in the difficulty in information analysis and communication networking. Therefore, we introduced the idea of software defined hardware, and abstracted the common feature of mainstream communication protocols of RTU application layer, and proposed a uniformed common protocol model. Then, various communication protocol algorithms of application layer are modularized according to the model. The executable codes of these algorithms are labeled by the virtual functions and stored in the flash chips of embedded CPU to form the protocol stack. According to the configuration commands to initialize the RTU communication systems, it is able to achieve dynamic assembling and loading of various application layer communication protocols of RTU and complete the efficient transport of sensor data from RTU to central station when the data acquisition protocol of sensors and various external communication terminals remain unchanged.

  8. RSRP: A Robust Secure Routing Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Sinha Ditipriya

    2014-05-01

    Full Text Available In this paper, we propose a novel algorithm RSRP to build a robust secure routing protocol in mobile ad-hoc networks (MANETs. This algorithm is based on some basic schemes such as RSA_CRT for encryption and decryption of messages; CRT for safety key generation, Shamir’s secret sharing principle for generation of secure routes. Those routes which are free from any malicious node and which belong to the set of disjoint routes between a source-destination pair are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to obtain secure routes. Finally, most trustworthy and stable route is selected among those secure routes. Selection of the final route depends on some criteria of the nodes present in a route e.g.: battery power, mobility and trust value. In addition, complexity of key generation is reduced to a large extent by using RSA-CRT instead of RSA. In turn, the routing becomes less expensive and most secure and robust one. Performance of this routing protocol is then compared with non-secure routing protocols (AODV and DSR, secure routing scheme using secret sharing, security routing protocol using ZRP and SEAD depending on basic characteristics of these protocols. All such comparisons show that RSRP shows better performance in terms of computational cost, end-to-end delay and packet dropping in presence of malicious nodes in the MANET, keeping the overhead in terms of control packets same as other secure routing protocols.

  9. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  10. A SURVEY ON MULTICAST ROUTING PROTOCOLS FOR PERFORMANCE EVALUATION IN WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    A. Suruliandi

    2015-03-01

    Full Text Available Multicast is a process used to transfer same message to multiple receivers at the same time. This paper presents the simulation and analysis of the performance of six different multicast routing protocols for Wireless Sensor Network (WSN. They are On Demand Multicast Routing Protocol (ODMRP, Protocol for Unified Multicasting through Announcement (PUMA, Multicast Adhoc On demand Distance Vector Protocol (MAODV, Overlay Boruvka-based Adhoc Multicast Protocol (OBAMP, Application Layer Multicast Algorithm (ALMA and enhanced version of ALMA (ALMA-H for WSN. Among them, ODMRP, MAODV and PUMA are reactive protocols while OBAMP, ALMA and ALMA-H are proactive protocols. This paper compares the performance of these protocols with common parameters such as Throughput, Reliability, End-to-End delay and Packet Delivery Ratio (PDR with increasing the numbers of nodes and increasing the speed of the nodes. The main objective of this work is to select the efficient multicast routing protocol for WSN among six multicast routing protocol based on relative strength and weakness of each protocol. The summary of above six multicast routing protocols is presented with a table of different performance characteristics. Experimental result shows that ODMRP attains higher throughput, reliability and higher packet delivery ratio than other multicast routing protocol, while incurring far less end-to-end delay.

  11. Dynamic-Threshold-Limited Timed-Token (DTLTT) Protocol | Kalu ...

    African Journals Online (AJOL)

    An improved version of the Static-Threshold-Limited On-Demand Guaranteed Service Timed-Token (STOGSTT) Media Access Control (MAC) protocol for channel capacity allocation to the asynchronous trac in Multiservice Local Area Network (MLANs) was developed and analyzed. TLODGSTT protocol uses static value of ...

  12. Adaptive Relay Activation in the Network Coding Protocols

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank

    2015-01-01

    State-of-the-art Network coding based routing protocols exploit the link quality information to compute the transmission rate in the intermediate nodes. However, the link quality discovery protocols are usually inaccurate, and introduce overhead in wireless mesh networks. In this paper, we presen...

  13. Cost-optimization of the IPv4 zeroconf protocol

    NARCIS (Netherlands)

    Bohnenkamp, H.C.; van der Stok, Peter; Hermanns, H.; Vaandrager, Frits

    2003-01-01

    This paper investigates the tradeoff between reliability and effectiveness for the IPv4 Zeroconf protocol, proposed by Cheshire/Adoba/Guttman in 2002, dedicated to the selfconfiguration of IP network interfaces. We develop a simple stochastic cost model of the protocol, where reliability is measured

  14. Quantum secret sharing protocol using modulated doubly entangled photons

    International Nuclear Information System (INIS)

    Chuan, Wang; Yong, Zhang

    2009-01-01

    In this paper, we propose a quantum secret sharing protocol utilizing polarization modulated doubly entangled photon pairs. The measurement devices are constructed. By modulating the polarizations of entangled photons, the boss could encode secret information on the initial state and share the photons with different members to realize the secret sharing process. This protocol shows the security against intercept-resend attack and dishonest member cheating. The generalized quantum secret sharing protocol is also discussed. (general)

  15. Interactive verification of Markov chains: Two distributed protocol case studies

    Directory of Open Access Journals (Sweden)

    Johannes Hölzl

    2012-12-01

    Full Text Available Probabilistic model checkers like PRISM only check probabilistic systems of a fixed size. To guarantee the desired properties for an arbitrary size, mathematical analysis is necessary. We show for two case studies how this can be done in the interactive proof assistant Isabelle/HOL. The first case study is a detailed description of how we verified properties of the ZeroConf protocol, a decentral address allocation protocol. The second case study shows the more involved verification of anonymity properties of the Crowds protocol, an anonymizing protocol.

  16. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair

    Science.gov (United States)

    Lightsey, Harry M.; Kantrowitz, David E.; Swindell, Hasani W.; Trofa, David P.; Ahmad, Christopher S.; Lynch, T. Sean

    2018-01-01

    Background: The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. Purpose: To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Study Design: Cross-sectional study. Methods: Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Results: Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises

  17. A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

    OpenAIRE

    Avoine , Gildas; Bultel , Xavier; Gambs , Sébastien; Gerault , David; Lafourcade , Pascal; Onete , Cristina; Robert , Jean-Marc

    2017-01-01

    International audience; Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, veri-fiers have to authenticate the credentials of untrusted provers. Unfortunately , these protocols are themselves subject to complex threats such as terrorist-fraud attacks, in which a malicious prover helps an accomplice to authenticate. Provably guaranteeing the resistance of distance-bounding protocols to these attacks is a compl...

  18. A critical analysis of a locally agreed protocol for clinical practice

    International Nuclear Information System (INIS)

    Owen, A.; Hogg, P.; Nightingale, J.

    2004-01-01

    Within the traditional scope of radiographic practice (including advanced practice) there is a need to demonstrate effective patient care and management. Such practice should be set within a context of appropriate evidence and should also reflect peer practice. In order to achieve such practice the use of protocols is encouraged. Effective protocols can maximise care and management by minimising inter- and intra-professional variation; they can also allow for detailed procedural records to be kept in case of legal claims. However, whilst literature exists to encourage the use of protocols there is little published material available to indicate how to create, manage and archive them. This article uses an analytical approach to propose a suitable method for protocol creation and archival, it also offers suggestions on the scope and content of a protocol. To achieve this an existing clinical protocol for radiographer reporting barium enemas is analysed to draw out the general issues. Proposals for protocol creation, management, and archival were identified. The clinical practice described or inferred in the protocol should be drawn from evidence, such evidence could include peer-reviewed material, national standards and peer practice. The protocol should include an explanation of how to proceed when the radiographers reach the limit of their ability. It should refer to the initial training required to undertake the clinical duties as well as the on-going continual professional updating required to maintain competence. Audit of practice should be indicated, including the preferred audit methodology, and associated with this should be a clear statement about standards and what to do if standards are not adequately met. Protocols should be archived, in a paper-based form, for lengthy periods in case of legal claims. On the archived protocol the date it was in clinical use should be included

  19. IMHRP: Improved Multi-Hop Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Huang, Jianhua; Ruan, Danwei; Hong, Yadong; Zhao, Ziming; Zheng, Hong

    2017-10-01

    Wireless sensor network (WSN) is a self-organizing system formed by a large number of low-cost sensor nodes through wireless communication. Sensor nodes collect environmental information and transmit it to the base station (BS). Sensor nodes usually have very limited battery energy. The batteries cannot be charged or replaced. Therefore, it is necessary to design an energy efficient routing protocol to maximize the network lifetime. This paper presents an improved multi-hop routing protocol (IMHRP) for homogeneous networks. In the IMHRP protocol, based on the distances to the BS, the CH nodes are divided into internal CH nodes and external CH nodes. The set-up phase of the protocol is based on the LEACH protocol and the minimum distance between CH nodes are limited to a special constant distance, so a more uniform distribution of CH nodes is achieved. In the steady-state phase, the routes of different CH nodes are created on the basis of the distances between the CH nodes. The energy efficiency of communication can be maximized. The simulation results show that the proposed algorithm can more effectively reduce the energy consumption of each round and prolong the network lifetime compared with LEACH protocol and MHT protocol.

  20. Vicissitudes of Nagoya Protocol in Colombia

    International Nuclear Information System (INIS)

    Rojas Blanco, Diana Lorena

    2013-01-01

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.