WorldWideScience

Sample records for based enrichment protocols

  1. Iran to sign additional protocol and suspend uranium enrichment and reprocessing

    International Nuclear Information System (INIS)

    2003-01-01

    Full text: Iran's representative to the IAEA, Ambassador Ali Akbar Salehi, today delivered a letter to IAEA Director General, Mohamed ElBaradei conveying his Government's acceptance of the Additional Protocol. Mr. Salehi also informed the Director General that Iran had decided, as of today, to suspend all uranium enrichment-related and reprocessing activities in Iran - specifically, to suspend all activities on the site of Natanz, not to produce feed material for enrichment processes and not to import enrichment-related items. 'This is a welcome and positive development,' IAEA Director General Mohamed ElBaradei said. The IAEA intends to verify, in the context of the Safeguards Agreement and the Additional Protocol, the implementation by Iran of these decisions. At its meeting on 12 September, the IAEA Board of Governors adopted a resolution calling on Iran to sign, ratify and fully implement the Additional Protocol promptly and unconditionally, and as a confidence building measure to act henceforth in accordance with the Additional Protocol. The Board also called on Iran to suspend all further uranium enrichment and reprocessing activities, pending provision by the Director General of the assurances required by Member States and pending satisfactory application of the provisions of the Additional Protocol. Also today, Mr. ElBaradei has released his report to IAEA Member States on the 'Implementation of the NPT Safeguards Agreement in the Islamic Republic of Iran' for consideration at the 20 November Board of Governors' meeting. Unless the IAEA Board decides otherwise, the document's circulation is restricted and it cannot be released to the press. (IAEA)

  2. Solution-based targeted genomic enrichment for precious DNA samples

    Directory of Open Access Journals (Sweden)

    Shearer Aiden

    2012-05-01

    Full Text Available Abstract Background Solution-based targeted genomic enrichment (TGE protocols permit selective sequencing of genomic regions of interest on a massively parallel scale. These protocols could be improved by: 1 modifying or eliminating time consuming steps; 2 increasing yield to reduce input DNA and excessive PCR cycling; and 3 enhancing reproducible. Results We developed a solution-based TGE method for downstream Illumina sequencing in a non-automated workflow, adding standard Illumina barcode indexes during the post-hybridization amplification to allow for sample pooling prior to sequencing. The method utilizes Agilent SureSelect baits, primers and hybridization reagents for the capture, off-the-shelf reagents for the library preparation steps, and adaptor oligonucleotides for Illumina paired-end sequencing purchased directly from an oligonucleotide manufacturing company. Conclusions This solution-based TGE method for Illumina sequencing is optimized for small- or medium-sized laboratories and addresses the weaknesses of standard protocols by reducing the amount of input DNA required, increasing capture yield, optimizing efficiency, and improving reproducibility.

  3. Profiling plasma extracellular vesicle by pluronic block-copolymer based enrichment method unveils features associated with breast cancer aggression, metastasis and invasion.

    Science.gov (United States)

    Zhong, Zhenyu; Rosenow, Matthew; Xiao, Nick; Spetzler, David

    2018-01-01

    Extracellular vesicle (EV)-based liquid biopsies have been proposed to be a readily obtainable biological substrate recently for both profiling and diagnostics purposes. Development of a fast and reliable preparation protocol to enrich such small particles could accelerate the discovery of informative, disease-related biomarkers. Though multiple EV enrichment protocols are available, in terms of efficiency, reproducibility and simplicity, precipitation-based methods are most amenable to studies with large numbers of subjects. However, the selectivity of the precipitation becomes critical. Here, we present a simple plasma EV enrichment protocol based on pluronic block copolymer. The enriched plasma EV was able to be verified by multiple platforms. Our results showed that the particles enriched from plasma by the copolymer were EV size vesicles with membrane structure; proteomic profiling showed that EV-related proteins were significantly enriched, while high-abundant plasma proteins were significantly reduced in comparison to other precipitation-based enrichment methods. Next-generation sequencing confirmed the existence of various RNA species that have been observed in EVs from previous studies. Small RNA sequencing showed enriched species compared to the corresponding plasma. Moreover, plasma EVs enriched from 20 advanced breast cancer patients and 20 age-matched non-cancer controls were profiled by semi-quantitative mass spectrometry. Protein features were further screened by EV proteomic profiles generated from four breast cancer cell lines, and then selected in cross-validation models. A total of 60 protein features that highly contributed in model prediction were identified. Interestingly, a large portion of these features were associated with breast cancer aggression, metastasis as well as invasion, consistent with the advanced clinical stage of the patients. In summary, we have developed a plasma EV enrichment method with improved precipitation selectivity

  4. Validation of low-volume enrichment protocols for detection of Escherichia coli O157 in raw ground beef components, using commercial kits.

    Science.gov (United States)

    Ahmed, Imtiaz; Hughes, Denise; Jenson, Ian; Karalis, Tass

    2009-03-01

    Testing of beef destined for use in ground beef products for the presence of Escherichia coli O157:H7 has become an important cornerstone of control and verification activities within many meat supply chains. Validation of the ability of methods to detect low levels of E. coli O157:H7 is critical to confidence in test systems. Many rapid methods have been validated against standard cultural methods for 25-g samples. In this study, a number of previously validated enrichment broths and commercially available test kits were validated for the detection of low numbers of E. coli O157:H7 in 375-g samples of raw ground beef component matrices using 1 liter of enrichment broth (large-sample:low-volume enrichment protocol). Standard AOAC International methods for 25-g samples in 225 ml of enrichment broth, using the same media, incubation conditions, and test kits, were used as reference methods. No significant differences were detected in the ability of any of the tests to detect low levels of E. coli O157:H7 in samples of raw ground beef components when enriched according to standard or large-sample:low-volume enrichment protocols. The use of large-sample:low-volume enrichment protocols provides cost savings for media and logistical benefits when handling and incubating large numbers of samples.

  5. A simplified and cost-effective enrichment protocol for the isolation of Campylobacter spp. from retail broiler meat without microaerobic incubation

    LENUS (Irish Health Repository)

    Zhou, Ping

    2011-08-03

    Abstract Background To simplify the methodology for the isolation of Campylobacter spp. from retail broiler meat, we evaluated 108 samples (breasts and thighs) using an unpaired sample design. The enrichment broths were incubated under aerobic conditions (subsamples A) and for comparison under microaerobic conditions (subsamples M) as recommended by current reference protocols. Sensors were used to measure the dissolved oxygen (DO) in the broth and the percentage of oxygen (O2) in the head space of the bags used for enrichment. Campylobacter isolates were identified with multiplex PCR assays and typed using pulsed-field gel electrophoresis (PFGE). Ribosomal intergenic spacer analyses (RISA) and denaturing gradient gel electrophoresis (DGGE) were used to study the bacterial communities of subsamples M and A after 48 h enrichment. Results The number of Campylobacter positive subsamples were similar for A and M when all samples were combined (P = 0.81) and when samples were analyzed by product (breast: P = 0.75; thigh: P = 1.00). Oxygen sensors showed that DO values in the broth were around 6 ppm and O2 values in the head space were 14-16% throughout incubation. PFGE demonstrated high genomic similarity of isolates in the majority of the samples in which isolates were obtained from subsamples A and M. RISA and DGGE results showed a large variability in the bacterial populations that could be attributed to sample-to-sample variations and not enrichment conditions (aerobic or microaerobic). These data also suggested that current sampling protocols are not optimized to determine the true number of Campylobacter positive samples in retail boiler meat. Conclusions Decreased DO in enrichment broths is naturally achieved. This simplified, cost-effective enrichment protocol with aerobic incubation could be incorporated into reference methods for the isolation of Campylobacter spp. from retail broiler meat.

  6. Power Tools for Talking: Custom Protocols Enrich Coaching Conversations

    Science.gov (United States)

    Pomerantz, Francesca; Ippolito, Jacy

    2015-01-01

    Discussion-based protocols--an "agreed upon set of discussion or observation rules that guide coach/teacher/student work, discussion, and interactions" (Ippolito & Lieberman, 2012, p. 79)--can help focus and structure productive professional learning discussions. However, while protocols are slowly growing into essential elements of…

  7. 77 FR 14838 - General Electric-Hitachi Global Laser Enrichment LLC, Commercial Laser-Based Uranium Enrichment...

    Science.gov (United States)

    2012-03-13

    ... Laser Enrichment LLC, Commercial Laser-Based Uranium Enrichment Facility, Wilmington, North Carolina... a license to General Electric-Hitachi Global Laser Enrichment LLC (GLE or the applicant) to authorize construction of a laser-based uranium enrichment facility and possession and use of byproduct...

  8. GAME (Goals - Activity - Motor Enrichment): protocol of a single blind randomised controlled trial of motor training, parent education and environmental enrichment for infants at high risk of cerebral palsy.

    Science.gov (United States)

    Morgan, Catherine; Novak, Iona; Dale, Russell C; Guzzetta, Andrea; Badawi, Nadia

    2014-10-07

    Cerebral palsy is the most common physical disability of childhood and early detection is possible using evidence based assessments. Systematic reviews indicate early intervention trials rarely demonstrate efficacy for improving motor outcomes but environmental enrichment interventions appear promising. This study is built on a previous pilot study and has been designed to assess the effectiveness of a goal - oriented motor training and enrichment intervention programme, "GAME", on the motor outcomes of infants at very high risk of cerebral palsy (CP) compared with standard community based care. A two group, single blind randomised controlled trial (n = 30) will be conducted. Eligible infants are those diagnosed with CP or designated "at high risk of CP" on the basis of the General Movements Assessment and/or abnormal neuroimaging. A physiotherapist and occupational therapist will deliver home-based GAME intervention at least fortnightly until the infant's first birthday. The intervention aims to optimize motor function and engage parents in developmental activities aimed at enriching the home learning environment. Primary endpoint measures will be taken 16 weeks after intervention commences with the secondary endpoint at 12 months and 24 months corrected age. The primary outcome measure will be the Peabody Developmental Motor Scale second edition. Secondary outcomes measures include the Gross Motor Function Measure, Bayley Scales of Infant and Toddler Development, Affordances in the Home Environment for Motor Development - Infant Scale, and the Canadian Occupational Performance Measure. Parent well-being will be monitored using the Depression Anxiety and Stress Scale. This paper presents the background, design and intervention protocol of a randomised trial of a goal driven, motor learning approach with customised environmental interventions and parental education for young infants at high risk of cerebral palsy. This trial is registered on the Australian

  9. 77 FR 13367 - General Electric-Hitachi Global Laser Enrichment, LLC, Proposed Laser-Based Uranium Enrichment...

    Science.gov (United States)

    2012-03-06

    ... NUCLEAR REGULATORY COMMISSION [NRC-2009-0157] General Electric-Hitachi Global Laser Enrichment, LLC, Proposed Laser-Based Uranium Enrichment Facility, Wilmington, NC AGENCY: Nuclear Regulatory... Impact Statement (EIS) for the proposed General Electric- Hitachi Global Laser Enrichment, LLC (GLE...

  10. Evaluation of different enrichment methods for pathogenic Yersinia species detection by real time PCR

    Science.gov (United States)

    2014-01-01

    Background Yersiniosis is a zoonotic disease reported worldwide. Culture and PCR based protocols are the most common used methods for detection of pathogenic Yersinia species in animal samples. PCR sensitivity could be increased by an initial enrichment step. This step is particularly useful in surveillance programs, where PCR is applied to samples from asymptomatic animals. The aim of this study was to evaluate the improvement in pathogenic Yersinia species detection using a suitable enrichment method prior to the real time PCR (rtPCR). Nine different enrichment protocols were evaluated including six different broth mediums (CASO, ITC, PSB, PBS, PBSMSB and PBSSSB). Results The analysis of variance showed significant differences in Yersinia detection by rtPCR according to the enrichment protocol used. These differences were higher for Y. pseudotuberculosis than for Y. enterocolitica. In general, samples incubated at lower temperatures yielded the highest detection rates. The best results were obtained with PBSMSB and PBS2. Application of PBSMSB protocol to free-ranging wild board samples improved the detection of Y. enterocolitica by 21.2% when compared with direct rtPCR. Y. pseudotuberculosis detection was improved by 10.6% when results obtained by direct rtPCR and by PBSMSB enrichment before rtPCR were analyzed in combination. Conclusions The data obtained in the present study indicate a difference in Yersinia detection by rtPCR related to the enrichment protocol used, being PBSMSB enrichment during 15 days at 4°C and PBS during 7 days at 4°C the most efficient. The use of direct rtPCR in combination with PBSMSB enrichment prior to rtPCR resulted in an improvement in the detection rates of pathogenic Yersinia in wild boar and could be useful for application in other animal samples. PMID:25168886

  11. PC based uranium enrichment analyser

    International Nuclear Information System (INIS)

    Madan, V.K.; Gopalakrishana, K.R.; Bairi, B.R.

    1991-01-01

    It is important to measure enrichment of unirradiated nuclear fuel elements during production as a quality control measure. An IBM PC based system has recently been tested for enrichment measurements for Nuclear Fuel Complex (NFC), Hyderabad. As required by NFC, the system has ease of calibration. It is easy to switch the system from measuring enrichment of fuel elements to pellets and also automatically store the data and the results. The system uses an IBM PC plug in card to acquire data. The card incorporates programmable interval timers (8253-5). The counter/timer devices are executed by I/O mapped I/O's. A novel algorithm has been incorporated to make the system more reliable. The application software has been written in BASIC. (author). 9 refs., 1 fig

  12. Sonication-based isolation and enrichment of Chlorella protothecoides chloroplasts for illumina genome sequencing

    Energy Technology Data Exchange (ETDEWEB)

    Angelova, Angelina [University of Arizona; Park, Sang-Hycuk [University of Arizona; Kyndt, John [Bellevue University; Fitzsimmons, Kevin [University of Arizona; Brown, Judith K [University of Arizona

    2013-09-01

    With the increasing world demand for biofuel, a number of oleaginous algal species are being considered as renewable sources of oil. Chlorella protothecoides Krüger synthesizes triacylglycerols (TAGs) as storage compounds that can be converted into renewable fuel utilizing an anabolic pathway that is poorly understood. The paucity of algal chloroplast genome sequences has been an important constraint to chloroplast transformation and for studying gene expression in TAGs pathways. In this study, the intact chloroplasts were released from algal cells using sonication followed by sucrose gradient centrifugation, resulting in a 2.36-fold enrichment of chloroplasts from C. protothecoides, based on qPCR analysis. The C. protothecoides chloroplast genome (cpDNA) was determined using the Illumina HiSeq 2000 sequencing platform and found to be 84,576 Kb in size (8.57 Kb) in size, with a GC content of 30.8 %. This is the first report of an optimized protocol that uses a sonication step, followed by sucrose gradient centrifugation, to release and enrich intact chloroplasts from a microalga (C. prototheocoides) of sufficient quality to permit chloroplast genome sequencing with high coverage, while minimizing nuclear genome contamination. The approach is expected to guide chloroplast isolation from other oleaginous algal species for a variety of uses that benefit from enrichment of chloroplasts, ranging from biochemical analysis to genomics studies.

  13. GOMA: functional enrichment analysis tool based on GO modules

    Institute of Scientific and Technical Information of China (English)

    Qiang Huang; Ling-Yun Wu; Yong Wang; Xiang-Sun Zhang

    2013-01-01

    Analyzing the function of gene sets is a critical step in interpreting the results of high-throughput experiments in systems biology.A variety of enrichment analysis tools have been developed in recent years,but most output a long list of significantly enriched terms that are often redundant,making it difficult to extract the most meaningful functions.In this paper,we present GOMA,a novel enrichment analysis method based on the new concept of enriched functional Gene Ontology (GO) modules.With this method,we systematically revealed functional GO modules,i.e.,groups of functionally similar GO terms,via an optimization model and then ranked them by enrichment scores.Our new method simplifies enrichment analysis results by reducing redundancy,thereby preventing inconsistent enrichment results among functionally similar terms and providing more biologically meaningful results.

  14. Methods of staining and visualization of sphingolipid enriched and non-enriched plasma membrane regions of Arabidopsis thaliana with fluorescent dyes and lipid analogues

    Directory of Open Access Journals (Sweden)

    Blachutzik Jörg O

    2012-08-01

    Full Text Available Abstract Background Sterols and Sphingolipids form lipid clusters in the plasma membranes of cell types throughout the animal and plant kingdoms. These lipid domains provide a medium for protein signaling complexes at the plasma membrane and are also observed to be principal regions of membrane contact at the inception of infection. We visualized different specific fluorescent lipophilic stains of the both sphingolipid enriched and non-sphingolipid enriched regions in the plasma membranes of live protoplasts of Arabidopsis thaliana. Results Lipid staining protocols for several fluorescent lipid analogues in plants are presented. The most emphasis was placed on successful protocols for the single and dual staining of sphingolipid enriched regions and exclusion of sphingolipid enriched regions on the plasma membrane of Arabidopsis thaliana protoplasts. A secondary focus was placed to ensure that these staining protocols presented still maintain cell viability. Furthermore, the protocols were successfully tested with the spectrally sensitive dye Laurdan. Conclusion Almost all existing staining procedures of the plasma membrane with fluorescent lipid analogues are specified for animal cells and tissues. In order to develop lipid staining protocols for plants, procedures were established with critical steps for the plasma membrane staining of Arabidopsis leaf tissue and protoplasts. The success of the plasma membrane staining protocols was additionally verified by measurements of lipid dynamics by the fluorescence recovery after photobleaching technique and by the observation of new phenomena such as time dependent lipid polarization events in living protoplasts, for which a putative physiological relevance is suggested.

  15. Network-based functional enrichment

    Directory of Open Access Journals (Sweden)

    Poirel Christopher L

    2011-11-01

    Full Text Available Abstract Background Many methods have been developed to infer and reason about molecular interaction networks. These approaches often yield networks with hundreds or thousands of nodes and up to an order of magnitude more edges. It is often desirable to summarize the biological information in such networks. A very common approach is to use gene function enrichment analysis for this task. A major drawback of this method is that it ignores information about the edges in the network being analyzed, i.e., it treats the network simply as a set of genes. In this paper, we introduce a novel method for functional enrichment that explicitly takes network interactions into account. Results Our approach naturally generalizes Fisher’s exact test, a gene set-based technique. Given a function of interest, we compute the subgraph of the network induced by genes annotated to this function. We use the sequence of sizes of the connected components of this sub-network to estimate its connectivity. We estimate the statistical significance of the connectivity empirically by a permutation test. We present three applications of our method: i determine which functions are enriched in a given network, ii given a network and an interesting sub-network of genes within that network, determine which functions are enriched in the sub-network, and iii given two networks, determine the functions for which the connectivity improves when we merge the second network into the first. Through these applications, we show that our approach is a natural alternative to network clustering algorithms. Conclusions We presented a novel approach to functional enrichment that takes into account the pairwise relationships among genes annotated by a particular function. Each of the three applications discovers highly relevant functions. We used our methods to study biological data from three different organisms. Our results demonstrate the wide applicability of our methods. Our algorithms are

  16. Enriching step-based product information models to support product life-cycle activities

    Science.gov (United States)

    Sarigecili, Mehmet Ilteris

    The representation and management of product information in its life-cycle requires standardized data exchange protocols. Standard for Exchange of Product Model Data (STEP) is such a standard that has been used widely by the industries. Even though STEP-based product models are well defined and syntactically correct, populating product data according to these models is not easy because they are too big and disorganized. Data exchange specifications (DEXs) and templates provide re-organized information models required in data exchange of specific activities for various businesses. DEXs show us it would be possible to organize STEP-based product models in order to support different engineering activities at various stages of product life-cycle. In this study, STEP-based models are enriched and organized to support two engineering activities: materials information declaration and tolerance analysis. Due to new environmental regulations, the substance and materials information in products have to be screened closely by manufacturing industries. This requires a fast, unambiguous and complete product information exchange between the members of a supply chain. Tolerance analysis activity, on the other hand, is used to verify the functional requirements of an assembly considering the worst case (i.e., maximum and minimum) conditions for the part/assembly dimensions. Another issue with STEP-based product models is that the semantics of product data are represented implicitly. Hence, it is difficult to interpret the semantics of data for different product life-cycle phases for various application domains. OntoSTEP, developed at NIST, provides semantically enriched product models in OWL. In this thesis, we would like to present how to interpret the GD & T specifications in STEP for tolerance analysis by utilizing OntoSTEP.

  17. Comparative proteomic assessment of matrisome enrichment methodologies

    Science.gov (United States)

    Krasny, Lukas; Paul, Angela; Wai, Patty; Howard, Beatrice A.; Natrajan, Rachael C.; Huang, Paul H.

    2016-01-01

    The matrisome is a complex and heterogeneous collection of extracellular matrix (ECM) and ECM-associated proteins that play important roles in tissue development and homeostasis. While several strategies for matrisome enrichment have been developed, it is currently unknown how the performance of these different methodologies compares in the proteomic identification of matrisome components across multiple tissue types. In the present study, we perform a comparative proteomic assessment of two widely used decellularisation protocols and two extraction methods to characterise the matrisome in four murine organs (heart, mammary gland, lung and liver). We undertook a systematic evaluation of the performance of the individual methods on protein yield, matrisome enrichment capability and the ability to isolate core matrisome and matrisome-associated components. Our data find that sodium dodecyl sulphate (SDS) decellularisation leads to the highest matrisome enrichment efficiency, while the extraction protocol that comprises chemical and trypsin digestion of the ECM fraction consistently identifies the highest number of matrisomal proteins across all types of tissue examined. Matrisome enrichment had a clear benefit over non-enriched tissue for the comprehensive identification of matrisomal components in murine liver and heart. Strikingly, we find that all four matrisome enrichment methods led to significant losses in the soluble matrisome-associated proteins across all organs. Our findings highlight the multiple factors (including tissue type, matrisome class of interest and desired enrichment purity) that influence the choice of enrichment methodology, and we anticipate that these data will serve as a useful guide for the design of future proteomic studies of the matrisome. PMID:27589945

  18. Principal Angle Enrichment Analysis (PAEA): Dimensionally Reduced Multivariate Gene Set Enrichment Analysis Tool.

    Science.gov (United States)

    Clark, Neil R; Szymkiewicz, Maciej; Wang, Zichen; Monteiro, Caroline D; Jones, Matthew R; Ma'ayan, Avi

    2015-11-01

    Gene set analysis of differential expression, which identifies collectively differentially expressed gene sets, has become an important tool for biology. The power of this approach lies in its reduction of the dimensionality of the statistical problem and its incorporation of biological interpretation by construction. Many approaches to gene set analysis have been proposed, but benchmarking their performance in the setting of real biological data is difficult due to the lack of a gold standard. In a previously published work we proposed a geometrical approach to differential expression which performed highly in benchmarking tests and compared well to the most popular methods of differential gene expression. As reported, this approach has a natural extension to gene set analysis which we call Principal Angle Enrichment Analysis (PAEA). PAEA employs dimensionality reduction and a multivariate approach for gene set enrichment analysis. However, the performance of this method has not been assessed nor its implementation as a web-based tool. Here we describe new benchmarking protocols for gene set analysis methods and find that PAEA performs highly. The PAEA method is implemented as a user-friendly web-based tool, which contains 70 gene set libraries and is freely available to the community.

  19. Comparative study on gene set and pathway topology-based enrichment methods.

    Science.gov (United States)

    Bayerlová, Michaela; Jung, Klaus; Kramer, Frank; Klemm, Florian; Bleckmann, Annalen; Beißbarth, Tim

    2015-10-22

    Enrichment analysis is a popular approach to identify pathways or sets of genes which are significantly enriched in the context of differentially expressed genes. The traditional gene set enrichment approach considers a pathway as a simple gene list disregarding any knowledge of gene or protein interactions. In contrast, the new group of so called pathway topology-based methods integrates the topological structure of a pathway into the analysis. We comparatively investigated gene set and pathway topology-based enrichment approaches, considering three gene set and four topological methods. These methods were compared in two extensive simulation studies and on a benchmark of 36 real datasets, providing the same pathway input data for all methods. In the benchmark data analysis both types of methods showed a comparable ability to detect enriched pathways. The first simulation study was conducted with KEGG pathways, which showed considerable gene overlaps between each other. In this study with original KEGG pathways, none of the topology-based methods outperformed the gene set approach. Therefore, a second simulation study was performed on non-overlapping pathways created by unique gene IDs. Here, methods accounting for pathway topology reached higher accuracy than the gene set methods, however their sensitivity was lower. We conducted one of the first comprehensive comparative works on evaluating gene set against pathway topology-based enrichment methods. The topological methods showed better performance in the simulation scenarios with non-overlapping pathways, however, they were not conclusively better in the other scenarios. This suggests that simple gene set approach might be sufficient to detect an enriched pathway under realistic circumstances. Nevertheless, more extensive studies and further benchmark data are needed to systematically evaluate these methods and to assess what gain and cost pathway topology information introduces into enrichment analysis. Both

  20. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  1. ToNER: A tool for identifying nucleotide enrichment signals in feature-enriched RNA-seq data.

    Directory of Open Access Journals (Sweden)

    Yuttachon Promworn

    Full Text Available Biochemical methods are available for enriching 5' ends of RNAs in prokaryotes, which are employed in the differential RNA-seq (dRNA-seq and the more recent Cappable-seq protocols. Computational methods are needed to locate RNA 5' ends from these data by statistical analysis of the enrichment. Although statistical-based analysis methods have been developed for dRNA-seq, they may not be suitable for Cappable-seq data. The more efficient enrichment method employed in Cappable-seq compared with dRNA-seq could affect data distribution and thus algorithm performance.We present Transformation of Nucleotide Enrichment Ratios (ToNER, a tool for statistical modeling of enrichment from RNA-seq data obtained from enriched and unenriched libraries. The tool calculates nucleotide enrichment scores and determines the global transformation for fitting to the normal distribution using the Box-Cox procedure. From the transformed distribution, sites of significant enrichment are identified. To increase power of detection, meta-analysis across experimental replicates is offered. We tested the tool on Cappable-seq and dRNA-seq data for identifying Escherichia coli transcript 5' ends and compared the results with those from the TSSAR tool, which is designed for analyzing dRNA-seq data. When combining results across Cappable-seq replicates, ToNER detects more known transcript 5' ends than TSSAR. In general, the transcript 5' ends detected by ToNER but not TSSAR occur in regions which cannot be locally modeled by TSSAR.ToNER uses a simple yet robust statistical modeling approach, which can be used for detecting RNA 5'ends from Cappable-seq data, in particular when combining information from experimental replicates. The ToNER tool could potentially be applied for analyzing other RNA-seq datasets in which enrichment for other structural features of RNA is employed. The program is freely available for download at ToNER webpage (http://www4a

  2. ToNER: A tool for identifying nucleotide enrichment signals in feature-enriched RNA-seq data.

    Science.gov (United States)

    Promworn, Yuttachon; Kaewprommal, Pavita; Shaw, Philip J; Intarapanich, Apichart; Tongsima, Sissades; Piriyapongsa, Jittima

    2017-01-01

    Biochemical methods are available for enriching 5' ends of RNAs in prokaryotes, which are employed in the differential RNA-seq (dRNA-seq) and the more recent Cappable-seq protocols. Computational methods are needed to locate RNA 5' ends from these data by statistical analysis of the enrichment. Although statistical-based analysis methods have been developed for dRNA-seq, they may not be suitable for Cappable-seq data. The more efficient enrichment method employed in Cappable-seq compared with dRNA-seq could affect data distribution and thus algorithm performance. We present Transformation of Nucleotide Enrichment Ratios (ToNER), a tool for statistical modeling of enrichment from RNA-seq data obtained from enriched and unenriched libraries. The tool calculates nucleotide enrichment scores and determines the global transformation for fitting to the normal distribution using the Box-Cox procedure. From the transformed distribution, sites of significant enrichment are identified. To increase power of detection, meta-analysis across experimental replicates is offered. We tested the tool on Cappable-seq and dRNA-seq data for identifying Escherichia coli transcript 5' ends and compared the results with those from the TSSAR tool, which is designed for analyzing dRNA-seq data. When combining results across Cappable-seq replicates, ToNER detects more known transcript 5' ends than TSSAR. In general, the transcript 5' ends detected by ToNER but not TSSAR occur in regions which cannot be locally modeled by TSSAR. ToNER uses a simple yet robust statistical modeling approach, which can be used for detecting RNA 5'ends from Cappable-seq data, in particular when combining information from experimental replicates. The ToNER tool could potentially be applied for analyzing other RNA-seq datasets in which enrichment for other structural features of RNA is employed. The program is freely available for download at ToNER webpage (http://www4a.biotec.or.th/GI/tools/toner) and Git

  3. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  4. Enriched Title-Based Keyword Index Generation Using dBase II.

    Science.gov (United States)

    Rajendran, P. P.

    1986-01-01

    Describes the use of a database management system (DBMS)--dBaseII--to create an enriched title-based keyword index for a collection of news items at the Renewable Energy Resources Information Center of the Asian Institute of Technology. The use of DBMSs in libraries in developing countries is emphasized. (Author/LRW)

  5. Quantum multi-signature protocol based on teleportation

    International Nuclear Information System (INIS)

    Wen Xiao-jun; Liu Yun; Sun Yu

    2007-01-01

    In this paper, a protocol which can be used in multi-user quantum signature is proposed. The scheme of signature and verification is based on the correlation of Greenberger-Horne-Zeilinger (GHZ) states and the controlled quantum teleportation. Different from the digital signatures, which are based on computational complexity, the proposed protocol has perfect security in the noiseless quantum channels. Compared to previous quantum signature schemes, this protocol can verify the signature independent of an arbitrator as well as realize multi-user signature together. (orig.)

  6. Recommendations based on semantically enriched museum collections

    NARCIS (Netherlands)

    Wang, Y.; Stash, N.; Aroyo, L.M.; Gorgels, P.; Rutledge, L.W.; Schreiber, G.

    2008-01-01

    This article presents the CHIP demonstrator1 for providing personalized access to digital museum collections. It consists of three main components: Art Recommender, Tour Wizard, and Mobile Tour Guide. Based on the semantically enriched Rijksmuseum Amsterdam2 collection, we show how Semantic Web

  7. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  8. Electronic Voting Protocol Using Identity-Based Cryptography

    Directory of Open Access Journals (Sweden)

    Gina Gallegos-Garcia

    2015-01-01

    Full Text Available Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC, which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE. With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI. Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  9. Electronic Voting Protocol Using Identity-Based Cryptography.

    Science.gov (United States)

    Gallegos-Garcia, Gina; Tapia-Recillas, Horacio

    2015-01-01

    Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. Consequently, the components of the protocol increase notably. An alternative is to use Identity-Based Encryption (IBE). With this kind of cryptography, it is possible to have all the benefits offered by PKC, without neither the need of certificates nor all the core components of a Public Key Infrastructure (PKI). Considering the aforementioned, in this paper we propose an electronic voting protocol, which meets the privacy and robustness properties by using bilinear maps.

  10. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  11. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  12. Whole-system nutrient enrichment increases secondary production in a detritus-based ecosystem

    Science.gov (United States)

    W.F. Cross; J.B. Wallace; A.D. Rosemond; S.L. Eggert

    2006-01-01

    Although the effects of nutrient enrichment on consumer-resource dynamics are relatively well studied in ecosystems based on living plants, little is known about the manner in which enrichment influences the dynamics and productivity of consumers and resources in detritus-based ecosystems. Because nutrients can stimulate loss of carbon at the base of detrital food webs...

  13. Highly Selective Enrichment of Glycopeptides Based on Zwitterionically Functionalized Soluble Nanopolymers

    Science.gov (United States)

    Cao, Weiqian; Huang, Jiangming; Jiang, Biyun; Gao, Xing; Yang, Pengyuan

    2016-07-01

    Efficient glycopeptides enrichment prior to mass spectrometry analysis is essential for glycoproteome study. ZIC-HILIC (zwitterionic hydrophilic interaction liquid chromatography) based glycopeptides enrichment approaches have been attracting more attention for several benefits like easy operating, high enrichment specificity and intact glycopeptide retained. In this study, Poly (amidoamine) dendrimer (PAMAM) was adopted for the synthesis of zwitterionically functionalized (ZICF) materials for glycopeptide enrichment. The multiple branched structure and good solubility of ZICF-PAMAM enables a sufficient interaction with glycopeptides. The ZICF-PAMAM combined with the FASP-mode enrichment strategy exhibits more superior performance compared with the existing methods. It has the minimum detectable concentration of femtomolar level and high recovery rate of over 90.01%, and can efficiently enrich glycopeptides from complex biological samples even for merely 0.1 μL human serum. The remarkable glycopeptides enrichment capacity of ZICF-PAMAM highlights the potential application in in-depth glycoproteome research, which may open up new opportunities for the development of glycoproteomics.

  14. Protocol-based care: the standardisation of decision-making?

    Science.gov (United States)

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  15. Modular enrichment measurement system for in-situ enrichment assay

    International Nuclear Information System (INIS)

    Stewart, J.P.

    1976-01-01

    A modular enrichment measurement system has been designed and is in operation within General Electric's Nuclear Fuel Fabrication Facility for the in-situ enrichment assay of uranium-bearing materials in process containers. This enrichment assay system, which is based on the ''enrichment meter'' concept, is an integral part of the site's enrichment control program and is used in the in-situ assay of the enrichment of uranium dioxide (UO 2 ) powder in process containers (five gallon pails). The assay system utilizes a commercially available modular counting system and a collimnator designed for compatability with process container transport lines and ease of operator access. The system has been upgraded to include a microprocessor-based controller to perform system operation functions and to provide data acquisition and processing functions. Standards have been fabricated and qualified for the enrichment assay of several types of uranium-bearing materials, including UO 2 powders. The assay system has performed in excess of 20,000 enrichment verification measurements annually and has significantly contributed to the facility's enrichment control program

  16. An Internal Standard for Assessing Phosphopeptide Recovery from Metal Ion/Oxide Enrichment Strategies

    Science.gov (United States)

    Paulo, Joao A.; Navarrete-Perea, Jose; Erickson, Alison R.; Knott, Jeffrey; Gygi, Steven P.

    2018-04-01

    Phosphorylation-mediated signaling pathways have major implications in cellular regulation and disease. However, proteins with roles in these pathways are frequently less abundant and phosphorylation is often sub-stoichiometric. As such, the efficient enrichment, and subsequent recovery of phosphorylated peptides, is vital. Mass spectrometry-based proteomics is a well-established approach for quantifying thousands of phosphorylation events in a single experiment. We designed a peptide internal standard-based assay directed toward sample preparation strategies for mass spectrometry analysis to understand better phosphopeptide recovery from enrichment strategies. We coupled mass-differential tandem mass tag (mTMT) reagents (specifically, TMTzero and TMTsuper-heavy), nine mass spectrometry-amenable phosphopeptides (phos9), and peak area measurements from extracted ion chromatograms to determine phosphopeptide recovery. We showcase this mTMT/phos9 recovery assay by evaluating three phosphopeptide enrichment workflows. Our assay provides data on the recovery of phosphopeptides, which complement other metrics, namely the number of identified phosphopeptides and enrichment specificity. Our mTMT/phos9 assay is applicable to any enrichment protocol in a typical experimental workflow irrespective of sample origin or labeling strategy. [Figure not available: see fulltext.

  17. CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, M. G.; Kabir, M. Hasnat; Rahim, M. Sajjadur; Ullah, Sk. Enayet

    2012-01-01

    A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. We introduce cluster head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to collect information from target field. On rotation basis, a head-set member receives data from the neighbor nodes and transmits the aggregated results to the distance base station. This protocol ...

  18. Real-time PCR detection of Listeria monocytogenes in infant formula and lettuce following macrophage-based isolation and enrichment.

    Science.gov (United States)

    Day, J B; Basavanna, U

    2015-01-01

    To develop a rapid detection procedure for Listeria monocytogenes in infant formula and lettuce using a macrophage-based enrichment protocol and real-time PCR. A macrophage cell culture system was employed for the isolation and enrichment of L. monocytogenes from infant formula and lettuce for subsequent identification using real-time PCR. Macrophage monolayers were exposed to infant formula and lettuce contaminated with a serial dilution series of L. monocytogenes. As few as approx. 10 CFU ml(-1) or g(-1) of L. monocytogenes were detected in infant formula and lettuce after 16 h postinfection by real-time PCR. Internal positive PCR controls were utilized to eliminate the possibility of false-negative results. Co-inoculation with Listeria innocua did not reduce the L. monocytogenes detection sensitivity. Intracellular L. monocytogenes could also be isolated on Listeria selective media from infected macrophage lysates for subsequent confirmation. The detection method is highly sensitive and specific for L. monocytogenes in infant formula and lettuce and establishes a rapid identification time of 20 and 48 h for presumptive and confirmatory identification, respectively. The method is a promising alternative to many currently used q-PCR detection methods which employ traditional selective media for enrichment of contaminated food samples. Macrophage enrichment of L. monocytogenes eliminates PCR inhibitory food elements and contaminating food microflora which produce cleaner samples that increase the rapidity and sensitivity of detection. Published 2014. This article is a U.S. Government work and is in the public domain in the USA.

  19. Uranium enrichment plans

    International Nuclear Information System (INIS)

    Thomas, D.C.; Gagne, R.W.

    1978-01-01

    The following topics are covered: the status of the Government's existing uranium enrichment services contracts, natural uranium requirements based on the latest contract information, uncertainty in predicting natural uranium requirements based on uranium enrichment contracts, and domestic and foreign demand assumed in enrichment planning

  20. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  1. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  2. Development of an enrichment method for endogenous phosphopeptide characterization in human serum.

    Science.gov (United States)

    La Barbera, Giorgia; Capriotti, Anna Laura; Cavaliere, Chiara; Ferraris, Francesca; Laus, Michele; Piovesana, Susy; Sparnacci, Katia; Laganà, Aldo

    2018-01-01

    The work describes the development of an enrichment method for the analysis of endogenous phosphopeptides in serum. Endogenous peptides can play significant biological roles, and some of them could be exploited as future biomarkers. In this context, blood is one of the most useful biofluids for screening, but a systematic investigation of the endogenous peptides, especially phosphorylated ones, is still lacking, mainly due to the lack of suitable analytical methods. Thus, in this paper, different phosphopeptide enrichment strategies were pursued, based either on metal oxide affinity chromatography (MOAC, in the form of commercial TiO 2 spin columns or magnetic graphitized carbon black-TiO 2 composite), or on immobilized metal ion affinity chromatography (IMAC, in the form of Ti 4+ -IMAC magnetic material or commercial Fe 3+ -IMAC spin columns). While MOAC strategies proved completely unsuccessful, probably due to interfering phospholipids displacing phosphopeptides, the IMAC materials performed very well. Different sample preparation strategies were tested, comprising direct dilution with the loading buffer, organic solvent precipitation, and lipid removal from the matrix, as well as the addition of phosphatase inhibitors during sample handling for maximized endogenous phosphopeptide enrichment. All data were acquired by a shotgun peptidomics approach, in which peptide samples were separated by reversed-phase nanoHPLC hyphenated with high-resolution tandem mass spectrometry. The devised method allowed the identification of 176 endogenous phosphopeptides in fresh serum added with inhibitors by the direct dilution protocol and the Ti 4+ -IMAC magnetic material enrichment, but good results could also be obtained from the commercial Fe 3+ -IMAC spin column adapted to the batch enrichment protocol.

  3. Oxidative stability of fish oil-enriched mayonnaise-based salads

    DEFF Research Database (Denmark)

    Sørensen, Ann-Dorit Moltke; Nielsen, Nina Skall; Jacobsen, Charlotte

    2010-01-01

    The oxidative stability of fish oil-enriched mayonnaise-based salads and the influence of different vegetables in shrimp and tuna salads were evaluated. Moreover, the lipid oxidation in the presence of 1% oregano, rosemary, or thyme in fish oil-enriched tuna salad was assessed. The results obtain......-oxidative effect of shrimp. The effect of ingredients in tuna salads was inconclusive, possibly due to a high content of volatiles in the vegetables themselves. However, the addition of spices increased the oxidative stability of tuna salad (oregano>rosemary>thyme)....

  4. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  5. Development of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-07-01

    The communication protocol, which provide overall communication rules and methods and give ways how to exchange information, is the most important part and it can affect the overall performance of communication network. Therefore, the first step of development of the communication network of an NPP is its own communication protocol design, which conforms to the requirements and characteristics of an NPP I and C. To manage the protocol development process, we establish development procedure and define detail substantive based on the procedure and we examine the adaptability of existing commercial communication protocols to the communication protocol of an NPP I and C. Existing commercial communication protocols based on Information Technology(IT) can be categorized into 3 groups: general commercial communication protocols, industrial communication protocols, military communication protocols. We analyze the design criteria and performance requirements of popular protocols in each group. And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications

  6. Comparison of Six DNA Extraction Procedures and the Application of Plastid DNA Enrichment Methods in Selected Non-photosynthetic Plants

    Directory of Open Access Journals (Sweden)

    Shin-Yi Shyu

    2013-12-01

    Full Text Available Genomic DNA was isolated using three DNA extraction commercial kits and three CTAB-based methods for two non-photosynthetic plants, Balanophora japonica and Mitrastemon kanehirai. The quality of the isolated DNA was evaluated and subjected to following restriction enzyme digestions. All six procedures yielded DNA of sufficient quality for PCR, and the method described by Barnwell et al. (1998 performed well in isolating DNA from both species for restriction enzyme digestion. In addition, we succeeded to enrich plastid DNA content by using the methods depending on a high salt buffer to deplete nuclear material. The ‘high salt’ methods based on protocol presented by Milligan (1989 were able to increase plastid DNA effectively and significantly reduce nuclear DNA from M. kanehirai. The plastid DNA enrichment protocols are inexpensive and not time-consuming, and may be applicable to other non-photosynthetic plants.

  7. Advanced flooding-based routing protocols for underwater sensor networks

    OpenAIRE

    Isufi, E.; Dol, H.; Leus, G.J.T.

    2016-01-01

    Flooding-based protocols are a reliable solution to deliver packets in underwater sensor networks. However, these protocols potentially involve all the nodes in the forwarding process. Thus, the performance and energy efficiency are not optimal. In this work, we propose some advances of a flooding-based protocol with the goal to improve the performance and the energy efficiency. The first idea considers the node position information in order to reduce the number of relays that may apply flood...

  8. A standard protocol for describing individual-based and agent-based models

    Science.gov (United States)

    Grimm, Volker; Berger, Uta; Bastiansen, Finn; Eliassen, Sigrunn; Ginot, Vincent; Giske, Jarl; Goss-Custard, John; Grand, Tamara; Heinz, Simone K.; Huse, Geir; Huth, Andreas; Jepsen, Jane U.; Jorgensen, Christian; Mooij, Wolf M.; Muller, Birgit; Pe'er, Guy; Piou, Cyril; Railsback, Steven F.; Robbins, Andrew M.; Robbins, Martha M.; Rossmanith, Eva; Ruger, Nadja; Strand, Espen; Souissi, Sami; Stillman, Richard A.; Vabo, Rune; Visser, Ute; DeAngelis, Donald L.

    2006-01-01

    Simulation models that describe autonomous individual organisms (individual based models, IBM) or agents (agent-based models, ABM) have become a widely used tool, not only in ecology, but also in many other disciplines dealing with complex systems made up of autonomous entities. However, there is no standard protocol for describing such simulation models, which can make them difficult to understand and to duplicate. This paper presents a proposed standard protocol, ODD, for describing IBMs and ABMs, developed and tested by 28 modellers who cover a wide range of fields within ecology. This protocol consists of three blocks (Overview, Design concepts, and Details), which are subdivided into seven elements: Purpose, State variables and scales, Process overview and scheduling, Design concepts, Initialization, Input, and Submodels. We explain which aspects of a model should be described in each element, and we present an example to illustrate the protocol in use. In addition, 19 examples are available in an Online Appendix. We consider ODD as a first step for establishing a more detailed common format of the description of IBMs and ABMs. Once initiated, the protocol will hopefully evolve as it becomes used by a sufficiently large proportion of modellers.

  9. Evaluation of the impact of density gradient centrifugation on fetal cell loss during enrichment from maternal peripheral blood.

    Science.gov (United States)

    Emad, Ahmed; Drouin, Régen

    2014-09-01

    Physical separation by density gradient centrifugation (DGC) is usually used as an initial step of multistep enrichment protocols for purification of fetal cells (FCs) from maternal blood. Many protocols were designed but no single approach was efficient enough to provide noninvasive prenatal diagnosis. Procedures and methods were difficult to compare because of the nonuniformity of protocols among different groups. Recovery of FCs is jeopardized by their loss during the process of enrichment. Any loss of FCs must be minimized because of the multiplicative effect of each step of the enrichment process. The main objective of this study was to evaluate FC loss caused by DGC. Fetal cells were quantified in peripheral blood samples obtained from both euploid and aneuploid pregnancies before and after enrichment by buoyant DGC using Histopaque 1.119 g/mL. Density gradient centrifugation results in major loss of 60% to 80% of rare FCs, which may further complicate subsequent enrichment procedures. Eliminating aggressive manipulations can significantly minimize FC loss. Data obtained raise questions about the appropriateness of the DGC step for the enrichment of rare FCs and argues for the use of the alternative nonaggressive version of the procedure presented here or prioritizing other methods of enrichments. © 2014 John Wiley & Sons, Ltd.

  10. An improved AODV routing protocol based on tower structure

    Directory of Open Access Journals (Sweden)

    Li Yong Qiang

    2016-01-01

    Full Text Available The paper proposed a new routing protocol(IAODV based on tower structure in the Ad Hoc network for the problem which Location Routing Protocol need hardware and Complex algorithm. By the simulation, The complexity of the new routing protocol is reduced without reducing the performance of the network.

  11. Study on Cloud Security Based on Trust Spanning Tree Protocol

    Science.gov (United States)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  12. Portable abdomen radiography. Moving to thickness-based protocols

    International Nuclear Information System (INIS)

    Sanchez, Adrian A.; Reiser, Ingrid; Baxter, Tina; Zhang, Yue; Finkle, Joshua H.; Lu, Zheng Feng; Feinstein, Kate A.

    2018-01-01

    Default pediatric protocols on many digital radiography systems are configured based on patient age. However, age does not adequately characterize patient size, which is the principal determinant of proper imaging technique. Use of default pediatric protocols by inexperienced technologists can result in patient overexposure, inadequate image quality, or repeated examinations. To ensure diagnostic image quality at a well-managed patient radiation exposure by transitioning to thickness-based protocols for pediatric portable abdomen radiography. We aggregated patient thickness data, milliamperes (mAs), kilovoltage peak (kVp), exposure index (EI), source-to-detector distance, and grid use for all portable abdomen radiographs performed in our pediatric hospital in a database with a combination of automated and manual data collection techniques. We then analyzed the database and used it as the basis to construct thickness-based protocols with consistent image quality across varying patient thicknesses, as determined by the EI. Retrospective analysis of pediatric portable exams performed at our adult-focused hospitals demonstrated substantial variability in EI relative to our pediatric hospital. Data collection at our pediatric hospital over 4 months accumulated roughly 800 portable abdomen exams, which we used to develop a thickness-based technique chart. Through automated retrieval of data in our systems' digital radiography exposure logs and recording of patient abdomen thickness, we successfully developed thickness-based techniques for portable abdomen radiography. (orig.)

  13. Portable abdomen radiography. Moving to thickness-based protocols

    Energy Technology Data Exchange (ETDEWEB)

    Sanchez, Adrian A.; Reiser, Ingrid; Baxter, Tina; Zhang, Yue; Finkle, Joshua H.; Lu, Zheng Feng; Feinstein, Kate A. [University of Chicago Medical Center, Department of Radiology, Chicago, IL (United States)

    2018-02-15

    Default pediatric protocols on many digital radiography systems are configured based on patient age. However, age does not adequately characterize patient size, which is the principal determinant of proper imaging technique. Use of default pediatric protocols by inexperienced technologists can result in patient overexposure, inadequate image quality, or repeated examinations. To ensure diagnostic image quality at a well-managed patient radiation exposure by transitioning to thickness-based protocols for pediatric portable abdomen radiography. We aggregated patient thickness data, milliamperes (mAs), kilovoltage peak (kVp), exposure index (EI), source-to-detector distance, and grid use for all portable abdomen radiographs performed in our pediatric hospital in a database with a combination of automated and manual data collection techniques. We then analyzed the database and used it as the basis to construct thickness-based protocols with consistent image quality across varying patient thicknesses, as determined by the EI. Retrospective analysis of pediatric portable exams performed at our adult-focused hospitals demonstrated substantial variability in EI relative to our pediatric hospital. Data collection at our pediatric hospital over 4 months accumulated roughly 800 portable abdomen exams, which we used to develop a thickness-based technique chart. Through automated retrieval of data in our systems' digital radiography exposure logs and recording of patient abdomen thickness, we successfully developed thickness-based techniques for portable abdomen radiography. (orig.)

  14. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  15. A VXI-GPIB protocol converter based on DSP

    International Nuclear Information System (INIS)

    Hu Yuanfeng; Yu Xiaoqi; Lu Jingping

    2006-01-01

    A VXI-GPIB protocol converter based on DSP is introduced. The word-serial protocol with the message-based interface is implemented by EPLD and DSP. The GPIB functions are implemented by programming to the GPIB control chip. The transfer from VXI messages to GPIB functions is implemented by DSP. As an example of application, the control functions for oscilloscopes have been implemented in a VXI-GPIB heterogeneous system using such modules. (authors)

  16. Protocols for pressure ulcer prevention: are they evidence-based?

    Science.gov (United States)

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  17. Clinical-scale elutriation as a means of enriching antigen-presenting cells and manipulating alloreactivity.

    Science.gov (United States)

    Micklethwaite, Kenneth P; Garvin, Frances M; Kariotis, Melina R; Yee, Leng L; Hansen, Anna M; Antonenas, Vicki; Sartor, Mary M; Turtle, Cameron J; Gottlieb, David J

    2009-01-01

    Clinical-scale elutriation using the Elutra(c) has been shown to enrich monocytes reliably for immunotherapy protocols. Until now, a detailed assessment of the four (F1-F4) non-monocyte fractions derived from this process has not been performed. Using fluorescence-activated cell sorting (FACS), we performed phenotypic analyses to investigate the possible enrichment of T, B, natural killer (NK) and dendritic cells (DC) or their subsets in one or more Elutra fractions. Blood DC were enriched up to 10-fold in some fractions (F3 and F4) compared with the pre-elutriation apheresis product. This increased the number of DC that could be isolated from a given cell number by immunomagnetic separation. It was also found that CD62L(-) effector memory CD4(+) T cells were enriched in later fractions. In four of five cases tested, cells from F3 demonstrated decreased alloreactive proliferation in a mixed lymphocyte reaction compared with cells from the apheresis product. B cells were enriched in F1 compared with the apheresis product. In addition to providing enrichment of monocytes for the generation of DC, the Elutra enriches cell subsets that may be incorporated into and enhance existing immunotherapy and stem cell transplantation protocols.

  18. Enriched Boron-Doped Amorphous Selenium Based Position-Sensitive Solid-State Thermal Neutron Detector for MPACT Applications

    International Nuclear Information System (INIS)

    Mandal, Krishna

    2017-01-01

    High-efficiency thermal neutron detectors with compact size, low power-rating and high spatial, temporal and energy resolution are essential to execute non-proliferation and safeguard protocols. The demands of such detector are not fully covered by the current detection system such as gas proportional counters or scintillator-photomultiplier tube combinations, which are limited by their detection efficiency, stability of response, speed of operation, and physical size. Furthermore, world-wide shortage of 3 He gas, required for widely used gas detection method, has further prompted to design an alternative system. Therefore, a solid-state neutron detection system without the requirement of 3 He will be very desirable. To address the above technology gap, we had proposed to develop new room temperature solidstate thermal neutron detectors based on enriched boron ( 10 B) and enriched lithium ( 6 Li) doped amorphous Se (As- 0.52%, Cl 5 ppm) semiconductor for MPACT applications. The proposed alloy materials have been identified for its many favorable characteristics - a wide bandgap (~2.2 eV at 300 K) for room temperature operation, high glass transition temperature (t g ~ 85°C), a high thermal neutron cross-section (for boron ~ 3840 barns, for lithium ~ 940 barns, 1 barn = 10 -24 cm 2 ), low effective atomic number of Se for small gamma ray sensitivity, and high radiation tolerance due to its amorphous structure.

  19. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  20. Isotope enrichment

    International Nuclear Information System (INIS)

    Lydtin, H-J.; Wilden, R.J.; Severin, P.J.W.

    1978-01-01

    The isotope enrichment method described is based on the recognition that, owing to mass diffusion and thermal diffusion in the conversion of substances at a heated substrate while depositing an element or compound onto the substrate, enrichment of the element, or a compound of the element, with a lighter isotope will occur. The cycle is repeated for as many times as is necessary to obtain the degree of enrichment required

  1. Highly specific purification of N-glycans using phosphate-based derivatization as an affinity tag in combination with Ti{sup 4+}-SPE enrichment for mass spectrometric analysis

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Ying [Shanghai Cancer Center and Institutes of Biomedical Sciences, Fudan University, Shanghai 200032 (China); Key Laboratory of Glycoconjugates Research Ministry of Public Health, Fudan University, Shanghai 200032 (China); Peng, Ye; Bin, Zhichao [Department of Chemistry, Fudan University, Shanghai 200032 (China); Wang, Huijie [Shanghai Cancer Center and Institutes of Biomedical Sciences, Fudan University, Shanghai 200032 (China); Lu, Haojie, E-mail: luhaojie@fudan.edu.cn [Shanghai Cancer Center and Institutes of Biomedical Sciences, Fudan University, Shanghai 200032 (China); Department of Chemistry, Fudan University, Shanghai 200032 (China); Key Laboratory of Glycoconjugates Research Ministry of Public Health, Fudan University, Shanghai 200032 (China)

    2016-08-31

    N-linked protein glycosylation is involved in regulation of a wide variety of cellular processes and associated with numerous diseases. Highly specific identification of N-glycome remains a challenge while its biological significance is acknowledged. The relatively low abundance of glycan in complex biological mixtures, lack of basic sites for protonation, and suppression by other highly abundant proteins/peptides lead to the particularly poor detection sensitivity of N-glycans in the MS analysis. Therefore, the highly specific purification procedure becomes a crucial step prior to MS analysis of the N-glycome. Herein, a novel N-glycans enrichment approach based on phosphate derivatization combined with Ti{sup 4+}-SPE (solid phase extraction) was developed. Briefly, in this strategy, N-glycans were chemically labeled with a phospho-group at their reducing ends, such that the Ti{sup 4+}-SPE microspheres were able to capture the phospho-containing glycans. The enrichment method was developed and optimized using model oligosaccharides (maltoheptaose DP7 and sialylated glycan A1) and also glycans from a standard glycoprotein (asialofetuin, ASF). This method experimentally showed high derivatization efficiency (almost 100%), excellent selectivity (analyzing DP7 in the digests of bovine serum albumin at a mass ratio of 1:100), high enriching recovery (90%), good reproducibility (CV<15%) as well as high sensitivity (LOD at fmol level). At last, the proposed method was successfully applied in the profiling of N-glycome in human serum, in which a total of 31 N-glycan masses were identified. - Graphical abstract: A selective enrichment method for the N-glycome is reported. N-glycans were chemically labeled with a phosphate derivatization reagent (AMS), then the phospho-containing glycans were enriched using Ti{sup 4+}-microspheres. - Highlights: • A highly specific N-glycans purification method based on phosphate derivatization combined with Ti{sup 4+}-SPE was developed

  2. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  3. Yersinia enterocolitica in slaughter pig tonsils: enumeration and detection by enrichment versus direct plating culture.

    Science.gov (United States)

    Van Damme, Inge; Habib, Ihab; De Zutter, Lieven

    2010-02-01

    Tonsil samples from 139 slaughter pigs were examined for the presence of pathogenic Yersinia enterocolitica by enrichment procedures based on the standard method ISO 10273:2003. In addition, samples were tested by direct plating method to evaluate its efficiency compared to the enrichment culture methods and to quantify the level of contamination in porcine tonsils. In total, 52 samples (37.4%) were positive for pathogenic Y. enterocolitica, all belonging to bioserotype 4/O:3. Fifty out of the 52 positive samples (96.2%) were detected by direct plating. Enumeration showed an average concentration of 4.5 log(10) CFU g(-1) and 4.4 log(10) CFU g(-1) tonsil on Salmonella-Shigella-desoxycholate-calcium chloride (SSDC) and cefsulodin-irgasan-novobiocin (CIN) agar plates, respectively. The enrichment procedures recommended by the ISO 10273:2003 method were not optimal for the isolation of pathogenic Y. enterocolitica from pig tonsils: two days enrichment in irgasan-ticarcillin-potassium chlorate (ITC) broth resulted in an isolation rate of 84.6%, while 5 days enrichment in peptone-sorbitol-bile (PSB) broth recovered only 59.6% of positive samples. Reducing the enrichment time in PSB from 5 to 2 days resulted in a significantly higher recovery rate (94.2%) and might serve as an appropriate enrichment protocol for the isolation of pathogenic Y. enterocolitica from pig tonsils. Compared to enrichment culture methods, results based on direct plating can be obtained in a shorter time course and provide quantitative data that might be needed for further risk assessment studies.

  4. Pathway enrichment analysis approach based on topological structure and updated annotation of pathway.

    Science.gov (United States)

    Yang, Qian; Wang, Shuyuan; Dai, Enyu; Zhou, Shunheng; Liu, Dianming; Liu, Haizhou; Meng, Qianqian; Jiang, Bin; Jiang, Wei

    2017-08-16

    Pathway enrichment analysis has been widely used to identify cancer risk pathways, and contributes to elucidating the mechanism of tumorigenesis. However, most of the existing approaches use the outdated pathway information and neglect the complex gene interactions in pathway. Here, we first reviewed the existing widely used pathway enrichment analysis approaches briefly, and then, we proposed a novel topology-based pathway enrichment analysis (TPEA) method, which integrated topological properties and global upstream/downstream positions of genes in pathways. We compared TPEA with four widely used pathway enrichment analysis tools, including database for annotation, visualization and integrated discovery (DAVID), gene set enrichment analysis (GSEA), centrality-based pathway enrichment (CePa) and signaling pathway impact analysis (SPIA), through analyzing six gene expression profiles of three tumor types (colorectal cancer, thyroid cancer and endometrial cancer). As a result, we identified several well-known cancer risk pathways that could not be obtained by the existing tools, and the results of TPEA were more stable than that of the other tools in analyzing different data sets of the same cancer. Ultimately, we developed an R package to implement TPEA, which could online update KEGG pathway information and is available at the Comprehensive R Archive Network (CRAN): https://cran.r-project.org/web/packages/TPEA/. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  5. Authentication Test-Based the RFID Authentication Protocol with Security Analysis

    Directory of Open Access Journals (Sweden)

    Minghui Wang

    2014-08-01

    Full Text Available To the problem of many recently proposed RFID authentication protocol was soon find security holes, we analyzed the main reason, which is that protocol design is not rigorous, and the correctness of the protocol cannot be guaranteed. To this end, authentication test method was adopted in the process of the formal analysis and strict proof to the proposed RFID protocol in this paper. Authentication Test is a new type of analysis and design method of security protocols based on Strand space model, and it can be used for most types of the security protocols. After analysis the security, the proposed protocol can meet the RFID security demand: information confidentiality, data integrity and identity authentication.

  6. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  7. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Directory of Open Access Journals (Sweden)

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  8. On-Line Enrichment Monitor for UF{sub 6} Gas Centrifuge Enrichment Plant

    Energy Technology Data Exchange (ETDEWEB)

    Ianakiev, K. D.; Boyer, B.; Favalli, A.; Goda, J. M.; Hill, T.; Keller, C.; Lombardi, M.; Paffett, M.; MacArthur, D. W.; McCluskey, C.; Moss, C. E.; Parker, R.; Smith, M. K.; Swinhoe, M. T. [Los Alamos National Laboratory, Los Alamos (United States)

    2012-06-15

    This paper is a continuation of the Advanced Enrichment Monitoring Technology for UF{sub 6} Gas Centrifuge Enrichment Plant (GCEP) work, presented in the 2010 IAEA Safeguards Symposium. Here we will present the system architecture for a planned side-by-side field trial test of passive (186-keV line spectroscopy and pressure-based correction for UF{sub 6} gas density) and active (186-keV line spectroscopy and transmission measurement based correction for UF{sub 6} gas density) enrichment monitoring systems in URENCO's enrichment plant in Capenhurst. Because the pressure and transmission measurements of UF{sub 6} are complementary, additional information on the importance of the presence of light gases and the UF{sub 6} gas temperature can be obtained by cross-correlation between simultaneous measurements of transmission, pressure and 186-keV intensity. We will discuss the calibration issues and performance in the context of accurate, on-line enrichment measurement. It is hoped that a simple and accurate on-line enrichment monitor can be built using the UF{sub 6} gas pressure provided by the Operator, based on online mass spectrometer calibration, assuming a negligible (a small fraction of percent) contribution of wall deposits. Unaccounted-for wall deposits present at the initial calibration will lead to unwanted sensitivity to changes in theUF{sub 6} gas pressure and thus to error in the enrichment results. Because the accumulated deposits in the cascade header pipe have been identified as an issue for Go/No Go measurements with the Cascade Header Enrichment Monitor (CHEM) and Continuous Enrichment Monitor (CEMO), it is important to explore their effect. Therefore we present the expected uncertainty on enrichment measurements obtained by propagating the errors introduced by deposits, gas density, etc. and will discuss the options for a deposit correction during initial calibration of an On-Line Enrichment Monitor (OLEM).

  9. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  10. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    International Nuclear Information System (INIS)

    Van Atta, Angela J.; Baskin, Henry J.; Maves, Connie K.; Dansie, David M.; Rollins, Michael D.; Bolte, Robert G.; Mundorff, Michael B.; Andrews, Seth P.

    2015-01-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  11. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    Energy Technology Data Exchange (ETDEWEB)

    Van Atta, Angela J. [University of Utah School of Medicine, Salt Lake City, UT (United States); Baskin, Henry J.; Maves, Connie K.; Dansie, David M. [Primary Children' s Hospital, Department of Radiology, Salt Lake City, UT (United States); Rollins, Michael D. [University of Utah School of Medicine, Department of Surgery, Division of Pediatric Surgery, Salt Lake City, UT (United States); Bolte, Robert G. [University of Utah School of Medicine, Department of Pediatrics, Division of Pediatric Emergency Medicine, Salt Lake City, UT (United States); Mundorff, Michael B.; Andrews, Seth P. [Primary Children' s Hospital, Systems Improvement, Salt Lake City, UT (United States)

    2015-05-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  12. Nuclear material enrichment identification method based on cross-correlation and high order spectra

    International Nuclear Information System (INIS)

    Yang Fan; Wei Biao; Feng Peng; Mi Deling; Ren Yong

    2013-01-01

    In order to enhance the sensitivity of nuclear material identification system (NMIS) against the change of nuclear material enrichment, the principle of high order statistic feature is introduced and applied to traditional NMIS. We present a new enrichment identification method based on cross-correlation and high order spectrum algorithm. By applying the identification method to NMIS, the 3D graphs with nuclear material character are presented and can be used as new signatures to identify the enrichment of nuclear materials. The simulation result shows that the identification method could suppress the background noises, electronic system noises, and improve the sensitivity against enrichment change to exponential order with no system structure modification. (authors)

  13. Mercury release from deforested soils triggered by base cation enrichment

    International Nuclear Information System (INIS)

    Farella, N.; Lucotte, M.; Davidson, R.; Daigle, S.

    2006-01-01

    The Brazilian Amazon has experienced considerable colonization in the last few decades. Family agriculture based on slash-and-burn enables millions of people to live in that region. However, the poor nutrient content of most Amazonian soils requires cation-rich ashes from the burning of the vegetation biomass for cultivation to be successful, which leads to forest ecosystem degradation, soil erosion and mercury contamination. While recent studies have suggested that mercury present in soils was transferred towards rivers upon deforestation, little is known about the dynamics between agricultural land-use and mercury leaching. In this context, the present study proposes an explanation that illustrates how agricultural land-use triggers mercury loss from soils. This explanation lies in the competition between base cations and mercury in soils which are characterized by a low adsorption capacity. Since these soils are naturally very poor in base cations, the burning of the forest biomass suddenly brings high quantities of base cations to soils, destabilizing the previous equilibrium amongst cations. Base cation enrichment triggers mobility in soil cations, rapidly dislocating mercury atoms. This conclusion comes from principal component analyses illustrating that agricultural land-use was associated with base cation enrichment and mercury depletion. The overall conclusions highlight a pernicious cycle: while soil nutrient enrichment actually occurs through biomass burning, although on a temporary basis, there is a loss in Hg content, which is leached to rivers, entering the aquatic chain, and posing a potential health threat to local populations. Data presented here reflects three decades of deforestation activities, but little is known about the long-term impact of such a disequilibrium. These findings may have repercussions on our understanding of the complex dynamics of deforestation and agriculture worldwide

  14. Validation of IT-based Data Communication Protocol for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Jeong, K. I.; Kim, D. H.; Lee, J. C.

    2009-12-01

    The communication network designed to transmit control and processing signals in digital Instrument and Control (I and C) systems in Nuclear Power Plant (NPP), should provide a high level of safety and reliability. There are different features between the communication networks of NPPs and other commercial communication networks. Safety and reliability are the most important factors in the communication networks of an NPP rather than efficiency which are important factors of a commercial communication network design. To develop Data Communication Protocol for Nuclear Power Plant, We analyze the design criteria and performance requirements of existing commercial communication protocols based on Information Technology(IT). And also, we examine the adaptability to the communication protocol of an NPP. Based on these results, we developed our own protocol(Nuclear power plant Safety Communication Protocol : NSCP) for NPP I and C, which meet the required specifications through design overall protocol architecture and data frame format, definition of functional requirements and specifications. NSCP is the communication protocol designed for a safety-grade control network in the nuclear power plant. In this report, we had specified NSCP protocol by FDT(Formal Description Technique) and established validation procedures based on the validation methodology. It was confirmed specification error, major function's validity and reachability of NSCP by performing simulation and the validation process using Telelogic Tau tool

  15. Developing a yeast-based assay protocol to monitor total ...

    African Journals Online (AJOL)

    A yeast-based assay protocol developed for detecting oestrogenic activity in activated sludge (AS) supernatant is described. The protocol used Saccharomyces cerevisiae construct RMY/ER-ERE with human oestrogen receptor (ERα) and lacZ reporter genes, and was developed by modifying existing assays for use with AS ...

  16. Enriched Boron-Doped Amorphous Selenium Based Position-Sensitive Solid-State Thermal Neutron Detector for MPACT Applications

    Energy Technology Data Exchange (ETDEWEB)

    Mandal, Krishna [Univ. of South Carolina, Columbia, SC (United States)

    2017-09-29

    High-efficiency thermal neutron detectors with compact size, low power-rating and high spatial, temporal and energy resolution are essential to execute non-proliferation and safeguard protocols. The demands of such detector are not fully covered by the current detection system such as gas proportional counters or scintillator-photomultiplier tube combinations, which are limited by their detection efficiency, stability of response, speed of operation, and physical size. Furthermore, world-wide shortage of 3He gas, required for widely used gas detection method, has further prompted to design an alternative system. Therefore, a solid-state neutron detection system without the requirement of 3He will be very desirable. To address the above technology gap, we had proposed to develop new room temperature solidstate thermal neutron detectors based on enriched boron (10B) and enriched lithium (6Li) doped amorphous Se (As- 0.52%, Cl 5 ppm) semiconductor for MPACT applications. The proposed alloy materials have been identified for its many favorable characteristics - a wide bandgap (~2.2 eV at 300 K) for room temperature operation, high glass transition temperature (tg ~ 85°C), a high thermal neutron cross-section (for boron ~ 3840 barns, for lithium ~ 940 barns, 1 barn = 10-24 cm2), low effective atomic number of Se for small gamma ray sensitivity, and high radiation tolerance due to its amorphous structure.

  17. An efficient three-party password-based key agreement protocol using extended chaotic maps

    International Nuclear Information System (INIS)

    Shu Jian

    2015-01-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399–411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. (paper)

  18. Enriching semantic knowledge bases for opinion mining in big data applications.

    Science.gov (United States)

    Weichselbraun, A; Gindl, S; Scharl, A

    2014-10-01

    This paper presents a novel method for contextualizing and enriching large semantic knowledge bases for opinion mining with a focus on Web intelligence platforms and other high-throughput big data applications. The method is not only applicable to traditional sentiment lexicons, but also to more comprehensive, multi-dimensional affective resources such as SenticNet. It comprises the following steps: (i) identify ambiguous sentiment terms, (ii) provide context information extracted from a domain-specific training corpus, and (iii) ground this contextual information to structured background knowledge sources such as ConceptNet and WordNet. A quantitative evaluation shows a significant improvement when using an enriched version of SenticNet for polarity classification. Crowdsourced gold standard data in conjunction with a qualitative evaluation sheds light on the strengths and weaknesses of the concept grounding, and on the quality of the enrichment process.

  19. Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol

    International Nuclear Information System (INIS)

    Chen, I-C; Hwang Tzonelih; Li C-M

    2008-01-01

    On the basis of the modified four-coherent-state post-selection quantum key distribution protocol (Namiki and Hirano 2006 Preprint quant-ph/0608144v1), two 1-out-of-2 quantum oblivious transfer (QOT 2 1 ) protocols are proposed. The first proposed protocol (called the receiver-based QOT 2 1 protocol) requires the coherent states to be prepared by the receiver, whereas the second protocol (called the sender-based QOT 2 1 protocol) allows the coherent states to be generated by the sender. The main advantages of the proposed protocols are that (i) no quantum bit commitment schemes and the assumption of quantum memory are needed; (ii) less communication cost between participants is required, i.e. the receiver-based QOT 2 1 protocol requires only one quantum communication and one classical communication and the sender-based QOT 2 1 protocol requires only one quantum communication between participants during protocol execution; and (iii) the utilization of quantum states is very efficient, wherein the receiver-based and the sender-based QOT 2 1 protocols use only two coherent pulses and one coherent pulse respectively for sending the sender's two messages

  20. ADAPTIVE GOSSIP BASED PROTOCOL FOR ENERGY EFFICIENT MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    S. Rajeswari

    2012-03-01

    Full Text Available In Gossip Sleep Protocol, network performance is enhanced based on energy resource. But energy conservation is achieved with the reduced throughput. In this paper, it has been proposed a new Protocol for Mobile Ad hoc Network to achieve reliability with energy conservation. Based on the probability (p values, the value of sleep nodes is fixed initially. The probability value can be adaptively adjusted by Remote Activated Switch during the transmission process. The adaptiveness of gossiping probability is determined by the Packet Delivery Ratio. For performance comparison, we have taken Routing overhead, Packet Delivery Ratio, Number of dropped packets and Energy consumption with the increasing number of forwarding nodes. We used UDP based traffic models to analyze the performance of this protocol. We analyzed TCP based traffic models for average end to end delay. We have used the NS-2 simulator.

  1. Multi-Gateway-Based Energy Holes Avoidance Routing Protocol for WSN

    Directory of Open Access Journals (Sweden)

    Rohini Sharma

    2016-04-01

    Full Text Available In wireless sensor networks (WSNs, efficient energy conservation is required to prolong the lifetime of the network. In this work, we have given emphasis on balanced energy consumption and energy holes avoidance. This paper proposes a multi-gateway-based approach to reduce the transmission distance between the sender and the sink node. The area to be monitored is divided into regions and gateway nodes are deployed at optimal positions. We have designed a transmission scheme, in which sensors in the sink region communicate directly to the sink, sensors in the gateway region communicate directly to the gateway, and sensors in the cluster region transmit their data directly to their respective cluster head which transmits data to the gateway in its region. If the distance between a cluster head and the sink is less than the distance between the cluster head and the gateway node, the cluster head transmits data to the sink instead of the gateway node. We have compared the proposed protocol with Low-Energy Adaptive Clustering Hierarchy (LEACH, Gateway Based Energy Aware Multi-Hop Routing (M-GEAR, and Gateway Based Stable Election Protocol (GSEP protocols. The protocol performs better than other protocols in terms of throughput, stability period, lifetime, residual energy, and the packet transmitted to the sink.

  2. Simulation-Based Performance Evaluation of Predictive-Hashing Based Multicast Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Seonho Choi

    2012-12-01

    Full Text Available A predictive-hashing based Denial-of-Service (DoS resistant multicast authentication protocol was proposed based upon predictive-hashing, one-way key chain, erasure codes, and distillation codes techniques [4, 5]. It was claimed that this new scheme should be more resistant to various types of DoS attacks, and its worst-case resource requirements were derived in terms of coarse-level system parameters including CPU times for signature verification and erasure/distillation decoding operations, attack levels, etc. To show the effectiveness of our approach and to analyze exact resource requirements in various attack scenarios with different parameter settings, we designed and implemented an attack simulator which is platformindependent. Various attack scenarios may be created with different attack types and parameters against a receiver equipped with the predictive-hashing based protocol. The design of the simulator is explained, and the simulation results are presented with detailed resource usage statistics. In addition, resistance level to various types of DoS attacks is formulated with a newly defined resistance metric. By comparing these results to those from another approach, PRABS [8], we show that the resistance level of our protocol is greatly enhanced even in the presence of many attack streams.

  3. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without any...... type annotations or explicit type casts. We have implemented a protocol verifier SpiCa based on the algorithm, and confirmed its effectiveness....

  4. Evaluation of an app-based stress protocol

    Directory of Open Access Journals (Sweden)

    Noeh Claudius

    2016-09-01

    Full Text Available Stress is a major influence on the quality of life in our fast-moving society. This paper describes a standardized and contemporary protocol that is capable of inducing moderate psychological stress in a laboratory setting. Furthermore, it evaluates its effects on physiological biomarkers. The protocol called “THM-Stresstest” mainly consists of a rest period (30 min, an app-based stress test under the surveillance of an audience (4 min and a regeneration period (32 min. We investigated 12 subjects to evaluate the developed protocol. We could show significant changes in heart rate variability, electromyography, electro dermal activity and salivary cortisol and α-amylase. From this data we conclude that the THM-Stresstest can serve as a psychobiological tool for provoking responses in the cardiovascular-, the endocrine and exocrine system as well as the sympathetic part of the central nervous system.

  5. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    International Nuclear Information System (INIS)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua

    2010-01-01

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  6. Quantum deterministic key distribution protocols based on the authenticated entanglement channel

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Nanrun; Wang Lijun; Ding Jie; Gong Lihua [Department of Electronic Information Engineering, Nanchang University, Nanchang 330031 (China)], E-mail: znr21@163.com, E-mail: znr21@hotmail.com

    2010-04-15

    Based on the quantum entanglement channel, two secure quantum deterministic key distribution (QDKD) protocols are proposed. Unlike quantum random key distribution (QRKD) protocols, the proposed QDKD protocols can distribute the deterministic key securely, which is of significant importance in the field of key management. The security of the proposed QDKD protocols is analyzed in detail using information theory. It is shown that the proposed QDKD protocols can safely and effectively hand over the deterministic key to the specific receiver and their physical implementation is feasible with current technology.

  7. Nutrient enrichment differentially affects body sizes of primary consumers and predators in a detritus-based stream

    Science.gov (United States)

    John M. Davis; Amy D. Rosemond; Sue L. Eggert; Wyatt F. Cross; J. Bruce. Wallace

    2010-01-01

    We assessed how a 5-yr nutrient enrichment affected the responses of different size classes of primary consumers and predators in a detritus-based headwater stream. We hypothesized that alterations in detritus availability because of enrichment would decrease the abundance and biomass of large-bodied consumers. In contrast, we found that 2 yr of enrichment increased...

  8. Unattended Monitoring of HEU Production in Gaseous Centrifuge Enrichment Plants using Automated Aerosol Collection and Laser-based Enrichment Assay

    International Nuclear Information System (INIS)

    Anheier, Norman C.; Bushaw, Bruce A.

    2010-01-01

    Nuclear power is enjoying rapid growth as government energy policies and public demand shift toward low carbon energy production. Pivotal to the global nuclear power renaissance is the development and deployment of robust safeguards instrumentation that allows the limited resources of the IAEA to keep pace with the expansion of the nuclear fuel cycle. Undeclared production of highly enriched uranium (HEU) remains a primary proliferation concern for modern gaseous centrifuge enrichment plants (GCEPs), due to their massive separative work unit (SWU) processing power and comparably short cascade equilibrium timescale. The Pacific Northwest National Laboratory is developing an unattended safeguards instrument, combining continuous aerosol particulate collection with uranium isotope assay, to provide timely detection of HEU production within a GCEP. This approach is based on laser vaporization of aerosol particulates, followed by laser spectroscopy to characterize the uranium enrichment level. Our prior investigation demonstrated single-shot detection sensitivity approaching the femtogram range and relative isotope ratio uncertainty better than 10% using gadolinium as a surrogate for uranium. In this paper we present measurement results on standard samples containing traces of depleted, natural, and low enriched uranium, as well as measurements on aerodynamic size uranium particles mixed in background materials (e.g., dust, minerals, soils). Improvements and optimizations in the detection electronics, signal timing, calibration, and laser alignment have lead to significant improvements in detection sensitivity and enrichment accuracy, contributing to an overall reduction in the false alarm probability. The sample substrate media was also found to play a significant role in facilitating laser-induced vaporization and the production of energetic plasma conditions, resulting in ablation optimization and further improvements in the isotope abundance sensitivity.

  9. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    . Simulations show that the optimized ADV-MAC provides substantial energy gains (50% to 70% less than other MAC protocols for WSNs such as T-MAC and S-MAC for the scenarios investigated) while faring as well as T-MAC in terms of packet delivery ratio and latency. Although ADV-MAC provides substantial energy gains over S-MAC and T-MAC, it is not optimal in terms of energy savings because contention is done twice -- once in the Advertisement Period and once in the Data Period. In the next part of my research, the second contention in the Data Period is eliminated and the advantages of contention-based and TDMA-based protocols are combined to form Advertisement based Time-division Multiple Access (ATMA), a distributed TDMA-based MAC protocol for WSNs. ATMA utilizes the bursty nature of the traffic to prevent energy waste through advertisements and reservations for data slots. Extensive simulations and qualitative analysis show that with bursty traffic, ATMA outperforms contention-based protocols (S-MAC, T-MAC and ADV-MAC), a TDMA based protocol (TRAMA) and hybrid protocols (Z-MAC and IEEE 802.15.4). ATMA provides energy reductions of up to 80%, while providing the best packet delivery ratio (close to 100%) and latency among all the investigated protocols. Simulations alone cannot reflect many of the challenges faced by real implementations of MAC protocols, such as clock-drift, synchronization, imperfect physical layers, and irregular interference from other transmissions. Such issues may cripple a protocol that otherwise performs very well in software simulations. Hence, to validate my research, I conclude with a hardware implementation of the ATMA protocol on SORA (Software Radio), developed by Microsoft Research Asia. SORA is a reprogrammable Software Defined Radio (SDR) platform that satisfies the throughput and timing requirements of modern wireless protocols while utilizing the rich general purpose PC development environment. Experimental results obtained from the hardware

  10. Environmental enrichment in the absence of wheel running produces beneficial behavioural and anti-oxidative effects in rats.

    Science.gov (United States)

    Mármol, F; Sánchez, J; Torres, M N; Chamizo, V D

    2017-11-01

    The effects of early environmental enrichment (EE) when solving a simple spatial task in adult male rats were assessed. After weaning, rats were housed in pairs in enriched or standard cages (EE and control groups) for two and a half months. Then the rats were trained in a triangular-shaped pool to find a hidden platform whose location was defined in terms of two sources of information, a landmark outside the pool and a particular corner of the pool. As expected, enriched rats reached the platform faster than control animals. Enriched rats also performed better on a subsequent test trial without the platform with the geometry cue individually presented (in the absence of the landmark). Most importantly, the beneficial effects of the present protocol were obtained in the absence of wheel running. Additionally, the antioxidative effects in the hippocampus produced by the previous protocol are also shown. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Mung bean nuclease treatment increases capture specificity of microdroplet-PCR based targeted DNA enrichment.

    Directory of Open Access Journals (Sweden)

    Zhenming Yu

    Full Text Available Targeted DNA enrichment coupled with next generation sequencing has been increasingly used for interrogation of select sub-genomic regions at high depth of coverage in a cost effective manner. Specificity measured by on-target efficiency is a key performance metric for target enrichment. Non-specific capture leads to off-target reads, resulting in waste of sequencing throughput on irrelevant regions. Microdroplet-PCR allows simultaneous amplification of up to thousands of regions in the genome and is among the most commonly used strategies for target enrichment. Here we show that carryover of single-stranded template genomic DNA from microdroplet-PCR constitutes a major contributing factor for off-target reads in the resultant libraries. Moreover, treatment of microdroplet-PCR enrichment products with a nuclease specific to single-stranded DNA alleviates off-target load and improves enrichment specificity. We propose that nuclease treatment of enrichment products should be incorporated in the workflow of targeted sequencing using microdroplet-PCR for target capture. These findings may have a broad impact on other PCR based applications for which removal of template DNA is beneficial.

  12. Rheology, fatty acid profile and quality characteristics of nutrient enriched pizza base.

    Science.gov (United States)

    Gupta, Chaitali Sen; Milind; Jeyarani, T; Rajiv, Jyotsna

    2015-05-01

    Enrichment of thick bread type pizza base (PZB) was done by substituting wheat flour (WF) with 5, 10 and 15 % soya protein isolate (SPI). The rheological characteristics of WF showed that water absorption increased, extensibility and peak viscosity decreased when level of SPI increased from 5 to 15 %. Baking studies showed that spread ratio decreased and hardness values of PZB increased with the increase in amount of SPI from 5 to15 %. Beyond 10 % SPI, the overall quality of PZB was adversely affected. To the optimal blend of 10 % SPI, 5 % psyllium husk (PH) was added and the hydrogenated fat was replaced by canola oil (CAN) in enriched PZB. The enriched PZB treated with combination of additives had 1.7 and 1.6 times more protein and dietary fiber than the control PZB. Fatty acid analysis showed that the enriched PZB had 58.65 % oleic, 6.58 % linolenic acid and 31.28 % polyunsaturated fatty acid and no Trans fat was present.

  13. NetGen: a novel network-based probabilistic generative model for gene set functional enrichment analysis.

    Science.gov (United States)

    Sun, Duanchen; Liu, Yinliang; Zhang, Xiang-Sun; Wu, Ling-Yun

    2017-09-21

    High-throughput experimental techniques have been dramatically improved and widely applied in the past decades. However, biological interpretation of the high-throughput experimental results, such as differential expression gene sets derived from microarray or RNA-seq experiments, is still a challenging task. Gene Ontology (GO) is commonly used in the functional enrichment studies. The GO terms identified via current functional enrichment analysis tools often contain direct parent or descendant terms in the GO hierarchical structure. Highly redundant terms make users difficult to analyze the underlying biological processes. In this paper, a novel network-based probabilistic generative model, NetGen, was proposed to perform the functional enrichment analysis. An additional protein-protein interaction (PPI) network was explicitly used to assist the identification of significantly enriched GO terms. NetGen achieved a superior performance than the existing methods in the simulation studies. The effectiveness of NetGen was explored further on four real datasets. Notably, several GO terms which were not directly linked with the active gene list for each disease were identified. These terms were closely related to the corresponding diseases when accessed to the curated literatures. NetGen has been implemented in the R package CopTea publicly available at GitHub ( http://github.com/wulingyun/CopTea/ ). Our procedure leads to a more reasonable and interpretable result of the functional enrichment analysis. As a novel term combination-based functional enrichment analysis method, NetGen is complementary to current individual term-based methods, and can help to explore the underlying pathogenesis of complex diseases.

  14. A lightweight neighbor-info-based routing protocol for no-base-station taxi-call system.

    Science.gov (United States)

    Zhu, Xudong; Wang, Jinhang; Chen, Yunchao

    2014-01-01

    Since the quick topology change and short connection duration, the VANET has had unstable routing and wireless signal quality. This paper proposes a kind of lightweight routing protocol-LNIB for call system without base station, which is applicable to the urban taxis. LNIB maintains and predicts neighbor information dynamically, thus finding the reliable path between the source and the target. This paper describes the protocol in detail and evaluates the performance of this protocol by simulating under different nodes density and speed. The result of evaluation shows that the performance of LNIB is better than AODV which is a classic protocol in taxi-call scene.

  15. An efficient multi-carrier position-based packet forwarding protocol for wireless sensor networks

    KAUST Repository

    Bader, Ahmed

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. However, as the node density grows, the overhead incurred in the process of relay selection grows significantly. As such, end-to-end performance in terms of energy and latency is adversely impacted. With the motivation of developing a packet forwarding mechanism that is tolerant to variation in node density, an alternative position-based protocol is proposed in this paper. In contrast to existing beaconless protocols, the proposed protocol is designed such that it eliminates the need for potential relays to undergo a relay selection process. Rather, any eligible relay may decide to forward the packet ahead, thus significantly reducing the underlying overhead. The operation of the proposed protocol is empowered by exploiting favorable features of orthogonal frequency division multiplexing (OFDM) at the physical layer. The end-to-end performance of the proposed protocol is evaluated against existing beaconless position-based protocols analytically and as well by means of simulations. The proposed protocol is demonstrated in this paper to be more efficient. In particular, it is shown that for the same amount of energy the proposed protocol transports one bit from source to destination much quicker. © 2012 IEEE.

  16. Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs

    Directory of Open Access Journals (Sweden)

    Woo-Yong Choi

    2009-01-01

    Full Text Available We propose the efficient reliable multicast MAC protocol based on the connectivity information among the recipients. Enhancing the BMMM (Batch Mode Multicast MAC protocol, the reliable multicast MAC protocol significantly reduces the RAK (Request for ACK frame transmissions in a reasonable computational time and enhances the MAC performance. By the analytical performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived. Numerical examples show that our proposed MAC protocol increases the reliable multicast MAC performance for IEEE 802.11 wireless LANs.

  17. Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.

    Science.gov (United States)

    Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C

    Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.

  18. Weaknesses of a dynamic identity based authentication protocol for multi-server architecture

    OpenAIRE

    Han, Weiwei

    2012-01-01

    Recently, Li et al. proposed a dynamic identity based authentication protocol for multi-server architecture. They claimed their protocol is secure and can withstand various attacks. But we found some security loopholes in the protocol. Accordingly, the current paper demonstrates that Li et al.'s protocol is vulnerable to the replay attack, the password guessing attack and the masquerade attack.

  19. Aptamer based peptide enrichment for quantitative analysis of gonadotropin-releasing hormone by LC-MS/MS.

    Science.gov (United States)

    Richards, S L; Cawley, A T; Cavicchioli, R; Suann, C J; Pickford, R; Raftery, M J

    2016-04-01

    Over recent years threats to racing have expanded to include naturally occurring biological molecules, such as peptides and proteins, and their synthetic analogues. Traditionally, antibodies have been used to enable detection of these compounds as they allow purification and concentration of the analyte of interest. The rapid expansion of peptide-based therapeutics necessitates a similarly rapid development of suitable antibodies or other means of enrichment. Potential alternative enrichment strategies include the use of aptamers, which offer the significant advantage of chemical synthesis once the nucleic acid sequence is known. A method was developed for the enrichment, detection and quantitation of gonadotropin-releasing hormone (GnRH) in equine urine using aptamer-based enrichment and LC-MS/MS. The method achieved comparable limits of detection (1 pg/mL) and quantification (2.5 pg/mL) to previously published antibody-based enrichment methods. The intra- and inter-assay precision achieved was less than 10% at both 5 and 20 pg/mL, and displayed a working dynamic range of 2.5-100 pg/mL. Significant matrix enhancement (170 ± 8%) and low analytical recovery (29 ± 15%) was observed, although the use of an isotopically heavy labelled GnRH peptide, GnRH (Pro(13)C5,(15)N), as the internal standard provides compensation for these parameters. Within the current limits of detection GnRH was detectable up to 1h post administration in urine and identification of a urinary catabolite extended this detection window to 4h. Based on the results of this preliminary investigation we propose the use of aptamers as a viable alternative to antibodies in the enrichment of peptide targets from equine urine. Copyright © 2016 Elsevier B.V. All rights reserved.

  20. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    Science.gov (United States)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  1. Studying protocol-based pain management in the emergency department

    Directory of Open Access Journals (Sweden)

    Akkamahadevi Patil

    2017-01-01

    Full Text Available Background: Majority of the patients presenting to emergency department (ED have pain. ED oligoanalgesia remains a challenge. Aims: This study aims to study the effect of implementing a protocol-based pain management in the ED on (1 time to analgesia and (2 adequacy of analgesia obtained. Settings and Design: Cross-sectional study in the ED. Methods: Patients aged 18–65 years of age with pain of numeric rating scale (NRS ≥4 were included. A series of 100 patients presenting before introduction of the protocol-based pain management were grouped “pre-protocol,” and managed as per existing practice. Following this, a protocol for management of all patients presenting to ED with pain was implemented. Another series of 100 were grouped as “post-protocol” and managed as per the new pain management protocol. The data of patients from both the groups were collected and analyzed. Statistical Analysis Used: Descriptive statistical tests such as percentage, mean and standard deviation and inferential statistical tests such as Pearson coefficient, Student's t-test were applied. Differences were interpreted as significant when P < 0.05. Results: Mean time to administer analgesic was significantly lesser in the postprotocol group (preprotocol 20.30 min vs. postprotocol 13.05 min; P < 0.001. There was significant difference in the pain relief achieved (change in NRS between the two groups, with greater pain relief achieved in the postprotocol group (preprotocol group 4.6800 vs. postprotocol group 5.3600; P < 0.001. Patients' rating of pain relief (assessed on E5 scale was significantly higher in the postprotocol group (preprotocol 3.91 vs. postprotocol 4.27; P = 0.001. Patients' satisfaction (North American Spine Society scale with the overall treatment was also compared and found to be significantly higher in postprotocol group (mean: preprotocol 1.59 vs. postprotocol 1.39; P = 0.008. Conclusion: Protocol-based pain management provided timely and

  2. Laser and gas centrifuge enrichment

    Energy Technology Data Exchange (ETDEWEB)

    Heinonen, Olli [Senior Fellow, Belfer Center for Science and International Affairs, Harvard Kennedy School, Cambridge, Massachusetts (United States)

    2014-05-09

    Principles of uranium isotope enrichment using various laser and gas centrifuge techniques are briefly discussed. Examples on production of high enriched uranium are given. Concerns regarding the possibility of using low end technologies to produce weapons grade uranium are explained. Based on current assessments commercial enrichment services are able to cover the global needs of enriched uranium in the foreseeable future.

  3. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    Science.gov (United States)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  4. Language pathway tracking: comparing nTMS-based DTI fiber tracking with a cubic ROIs-based protocol.

    Science.gov (United States)

    Negwer, Chiara; Sollmann, Nico; Ille, Sebastian; Hauck, Theresa; Maurer, Stefanie; Kirschke, Jan S; Ringel, Florian; Meyer, Bernhard; Krieg, Sandro M

    2017-03-01

    OBJECTIVE Diffusion tensor imaging (DTI) fiber tracking (FT) has been widely used in glioma surgery in recent years. It can provide helpful information about subcortical structures, especially in patients with eloquent space-occupying lesions. This study compared the newly developed navigated transcranial magnetic stimulation (nTMS)-based DTI FT of language pathways with the most reproducible protocol for language pathway tractography, using cubic regions of interest (ROIs) for the arcuate fascicle. METHODS Thirty-seven patients with left-sided perisylvian lesions underwent language mapping by repetitive nTMS. DTI FT was performed using the cubic ROIs-based protocol and the authors' nTMS-based DTI FT approach. The same minimal fiber length and fractional anisotropy were chosen (50 mm and 0.2, respectively). Both protocols were performed with standard clinical tractography software. RESULTS Both methods visualized language-related fiber tracts (i.e., corticonuclear tract, arcuate fascicle, uncinate fascicle, superior longitudinal fascicle, inferior longitudinal fascicle, arcuate fibers, commissural fibers, corticothalamic fibers, and frontooccipital fascicle) in all 37 patients. Using the cubic ROIs-based protocol, 39.9% of these language-related fiber tracts were detected in the examined patients, as opposed to 76.0% when performing nTMS-based DTI FT. For specifically tracking the arcuate fascicle, however, the cubic ROIs-based approach showed better results (97.3% vs 75.7% with nTMS-based DTI FT). CONCLUSIONS The cubic ROIs-based protocol was designed for arcuate fascicle tractography, and this study shows that it is still useful for this intention. However, superior results were obtained using the nTMS-based DTI FT for visualization of other language-related fiber tracts.

  5. Management of Energy Consumption on Cluster Based Routing Protocol for MANET

    Science.gov (United States)

    Hosseini-Seno, Seyed-Amin; Wan, Tat-Chee; Budiarto, Rahmat; Yamada, Masashi

    The usage of light-weight mobile devices is increasing rapidly, leading to demand for more telecommunication services. Consequently, mobile ad hoc networks and their applications have become feasible with the proliferation of light-weight mobile devices. Many protocols have been developed to handle service discovery and routing in ad hoc networks. However, the majority of them did not consider one critical aspect of this type of network, which is the limited of available energy in each node. Cluster Based Routing Protocol (CBRP) is a robust/scalable routing protocol for Mobile Ad hoc Networks (MANETs) and superior to existing protocols such as Ad hoc On-demand Distance Vector (AODV) in terms of throughput and overhead. Therefore, based on this strength, methods to increase the efficiency of energy usage are incorporated into CBRP in this work. In order to increase the stability (in term of life-time) of the network and to decrease the energy consumption of inter-cluster gateway nodes, an Enhanced Gateway Cluster Based Routing Protocol (EGCBRP) is proposed. Three methods have been introduced by EGCBRP as enhancements to the CBRP: improving the election of cluster Heads (CHs) in CBRP which is based on the maximum available energy level, implementing load balancing for inter-cluster traffic using multiple gateways, and implementing sleep state for gateway nodes to further save the energy. Furthermore, we propose an Energy Efficient Cluster Based Routing Protocol (EECBRP) which extends the EGCBRP sleep state concept into all idle member nodes, excluding the active nodes in all clusters. The experiment results show that the EGCBRP decreases the overall energy consumption of the gateway nodes up to 10% and the EECBRP reduces the energy consumption of the member nodes up to 60%, both of which in turn contribute to stabilizing the network.

  6. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed

    2012-04-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network\\'s transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  7. What does it cost to deliver information using position-based beaconless forwarding protocols?

    KAUST Repository

    Bader, Ahmed; Abed-Meraim, Karim; Alouini, Mohamed-Slim

    2012-01-01

    Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance is still necessary. In this paper, we shed light on the end-to-end performance of beaconless position-based protocols along three distinct dimensions: energy, latency, and back-off probability. The latter is used as a direct indicator of the network's transport capacity. Consequently, we are able to provide an elaborate response to the question: what does it really cost to deliver a packet in a wireless sensor network using position-based beaconless forwarding protocols? In responding to this question, we highlighted the different performance tradeoffs inherent to beaconless position-based protocols. Furthermore, some operational recommendations are also provided. © 2012 IEEE.

  8. Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus

    OpenAIRE

    Abraham, Ittai; Malkhi, Dahlia; Nayak, Kartik; Ren, Ling; Spiegelman, Alexander

    2018-01-01

    The decentralized cryptocurrency Bitcoin has experienced great success but also encountered many challenges. One of the challenges has been the long confirmation time. Another chal- lenge is the lack of incentives at certain steps of the protocol, raising concerns for transaction withholding, selfish mining, etc. To address these challenges, we propose Solida, a decentralized blockchain protocol based on reconfigurable Byzantine consensus augmented by proof-of-work. Solida improves on Bitcoin...

  9. Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus

    OpenAIRE

    Abraham, Ittai; Malkhi, Dahlia; Nayak, Kartik; Ren, Ling; Spiegelman, Alexander

    2016-01-01

    The decentralized cryptocurrency Bitcoin has experienced great success but also encountered many challenges. One of the challenges has been the long confirmation time. Another challenge is the lack of incentives at certain steps of the protocol, raising concerns for transaction withholding, selfish mining, etc. To address these challenges, we propose Solida, a decentralized blockchain protocol based on reconfigurable Byzantine consensus augmented by proof-of-work. Solida improves on Bitcoin i...

  10. Experimental eavesdropping attack against Ekert's protocol based on Wigner's inequality

    International Nuclear Information System (INIS)

    Bovino, F. A.; Colla, A. M.; Castagnoli, G.; Castelletto, S.; Degiovanni, I. P.; Rastello, M. L.

    2003-01-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution

  11. BiNChE: a web tool and library for chemical enrichment analysis based on the ChEBI ontology.

    Science.gov (United States)

    Moreno, Pablo; Beisken, Stephan; Harsha, Bhavana; Muthukrishnan, Venkatesh; Tudose, Ilinca; Dekker, Adriano; Dornfeldt, Stefanie; Taruttis, Franziska; Grosse, Ivo; Hastings, Janna; Neumann, Steffen; Steinbeck, Christoph

    2015-02-21

    Ontology-based enrichment analysis aids in the interpretation and understanding of large-scale biological data. Ontologies are hierarchies of biologically relevant groupings. Using ontology annotations, which link ontology classes to biological entities, enrichment analysis methods assess whether there is a significant over or under representation of entities for ontology classes. While many tools exist that run enrichment analysis for protein sets annotated with the Gene Ontology, there are only a few that can be used for small molecules enrichment analysis. We describe BiNChE, an enrichment analysis tool for small molecules based on the ChEBI Ontology. BiNChE displays an interactive graph that can be exported as a high-resolution image or in network formats. The tool provides plain, weighted and fragment analysis based on either the ChEBI Role Ontology or the ChEBI Structural Ontology. BiNChE aids in the exploration of large sets of small molecules produced within Metabolomics or other Systems Biology research contexts. The open-source tool provides easy and highly interactive web access to enrichment analysis with the ChEBI ontology tool and is additionally available as a standalone library.

  12. Invariant-based reasoning about parameterized security protocols

    NARCIS (Netherlands)

    Mooij, A.J.

    2010-01-01

    We explore the applicability of the programming method of Feijen and van Gasteren to the domain of security protocols. This method addresses the derivation of concurrent programs from a formal specification, and it is based on common notions like invariants and pre- and post-conditions. We show that

  13. Telemetry Standards, IRIG Standard 106-17, Chapter 22, Network Based Protocol Suite

    Science.gov (United States)

    2017-07-01

    requirements. 22.2 Network Access Layer 22.2.1 Physical Layer Connectors and cable media should meet the electrical or optical properties required by the...Telemetry Standards, IRIG Standard 106-17 Chapter 22, July 2017 i CHAPTER 22 Network -Based Protocol Suite Acronyms...iii Chapter 22. Network -Based Protocol Suite

  14. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  15. Radiometric enrichment of nonradioactive ores

    International Nuclear Information System (INIS)

    Mokrousov, V.A.; Lileev, V.A.

    1979-01-01

    Considered are the methods of mineral enrichment based on the use of the radioation of various types. The physical essence of enrichment processes is presented, their classification is given. Described are the ore properties influencing the efficiency of radiometric enrichment, methods of the properties study and estimation of ore enrichment. New possibilities opened by radiometric enrichment in the technology of primary processing of mineral raw materials are elucidated. A considerable attention is paid to the main and auxiliary equipment for radiometric enrichment. The foundations of the safety engineering are presented in a brief form. Presented are also results of investigations and practical works in the field of enrichment of ores of non-ferrous, ferrous and non-metallic minerals with the help of radiometric methods

  16. Development of pig welfare assessment protocol integrating animal-, environment-, and management-based measures.

    Science.gov (United States)

    Renggaman, Anriansyah; Choi, Hong L; Sudiarto, Sartika Ia; Alasaarela, Laura; Nam, Ok S

    2015-01-01

    Due to increased interest in animal welfare, there is now a need for a comprehensive assessment protocol to be used in intensive pig farming systems. There are two current welfare assessment protocols for pigs: Welfare Quality® Assessment Protocols (applicable in the Europe Union), that mostly focuses on animal-based measures, and the Swine Welfare Assurance Program (applicable in the United States), that mostly focuses on management- and environment-based measures. In certain cases, however, animal-based measures might not be adequate for properly assessing pig welfare status. Similarly, welfare assessment that relies only on environment- and management-based measures might not represent the actual welfare status of pigs. Therefore, the objective of this paper was to develop a new welfare protocol by integrating animal-, environment-, and management-based measures. The background for selection of certain welfare criteria and modification of the scoring systems from existing welfare assessment protocols are described. The developed pig welfare assessment protocol consists of 17 criteria that are related to four main principles of welfare (good feeding, good housing, good health, and appropriate behavior). Good feeding, good housing, and good health were assessed using a 3-point scale: 0 (good welfare), 1 (moderate welfare), and 2 (poor welfare). In certain cases, only a 2-point scale was used: 0 (certain condition is present) or 2 (certain condition is absent). Appropriate behavior was assessed by scan sampling of positive and negative social behaviors based on qualitative behavior assessment and human-animal relationship tests. Modification of the body condition score into a 3-point scale revealed pigs with a moderate body condition (score 1). Moreover, additional criteria such as feed quality confirmed that farms had moderate (score 1) or poor feed quality (score 2), especially those farms located in a high relative humidity region. The developed protocol can be

  17. The Project Based Mechanisms of the Kyoto Protocol. Credible Instruments or Challenges to the Integrity of the Kyoto Protocol?

    Energy Technology Data Exchange (ETDEWEB)

    Takeuchi Waldegren, Linn

    2006-03-15

    The project based mechanisms of the Kyoto Protocol are innovative instruments which allow projects to earn credits for reducing greenhouse gas (GHG) emissions. The credits can in turn be used by countries to reach their emissions targets according to the Kyoto Protocol. The Project based mechanisms are known as the Clean Development Mechanism (CDM) and the Joint Implementation (JI). If the project based mechanisms are to be effective policy instruments they must ensure the integrity of the Kyoto Protocol, and their ability to promote and prove real emission reductions is critical. The environmental credibility of the project based mechanisms will also ensure their ability to promote cost effectiveness. Key concepts in this context are environmental and project additionality, and their role and value for the project based mechanisms are analyzed. Environmental additionality is established by comparing a project's emissions to a baseline. The baseline's credibility is thus vital. The concept of project additionality is somewhat controversial, but is nonetheless of equal importance. The case studies of CDM approved methodologies (AMs) and proposed projects suggest that there are credibility issues that need to be addressed if the project based mechanisms are to promote real emissions reductions.

  18. Uranium enrichment. Enrichment processes

    International Nuclear Information System (INIS)

    Alexandre, M.; Quaegebeur, J.P.

    2009-01-01

    Despite the remarkable progresses made in the diversity and the efficiency of the different uranium enrichment processes, only two industrial processes remain today which satisfy all of enriched uranium needs: the gaseous diffusion and the centrifugation. This article describes both processes and some others still at the demonstration or at the laboratory stage of development: 1 - general considerations; 2 - gaseous diffusion: physical principles, implementation, utilisation in the world; 3 - centrifugation: principles, elementary separation factor, flows inside a centrifuge, modeling of separation efficiencies, mechanical design, types of industrial centrifuges, realisation of cascades, main characteristics of the centrifugation process; 4 - aerodynamic processes: vortex process, nozzle process; 5 - chemical exchange separation processes: Japanese ASAHI process, French CHEMEX process; 6 - laser-based processes: SILVA process, SILMO process; 7 - electromagnetic and ionic processes: mass spectrometer and calutron, ion cyclotron resonance, rotating plasmas; 8 - thermal diffusion; 9 - conclusion. (J.S.)

  19. A proportional integral estimator-based clock synchronization protocol for wireless sensor networks.

    Science.gov (United States)

    Yang, Wenlun; Fu, Minyue

    2017-11-01

    Clock synchronization is an issue of vital importance in applications of WSNs. This paper proposes a proportional integral estimator-based protocol (EBP) to achieve clock synchronization for wireless sensor networks. As each local clock skew gradually drifts, synchronization accuracy will decline over time. Compared with existing consensus-based approaches, the proposed synchronization protocol improves synchronization accuracy under time-varying clock skews. Moreover, by restricting synchronization error of clock skew into a relative small quantity, it could reduce periodic re-synchronization frequencies. At last, a pseudo-synchronous implementation for skew compensation is introduced as synchronous protocol is unrealistic in practice. Numerical simulations are shown to illustrate the performance of the proposed protocol. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.

  20. Insecurity of position-based quantum-cryptography protocols against entanglement attacks

    International Nuclear Information System (INIS)

    Lau, Hoi-Kwan; Lo, Hoi-Kwong

    2011-01-01

    Recently, position-based quantum cryptography has been claimed to be unconditionally secure. On the contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate of at most 85%. We prove the modified protocol is secure when the shared quantum resource between the adversaries is a two- or three-level system.

  1. Residual urinary extracellular vesicles in ultracentrifugation supernatants after hydrostatic filtration dialysis enrichment.

    Science.gov (United States)

    Musante, Luca; Tataruch-Weinert, Dorota; Kerjaschki, Dontscho; Henry, Michael; Meleady, Paula; Holthofer, Harry

    2017-01-01

    Urinary extracellular vesicles (UEVs) appear an ideal source of biomarkers for kidney and urogenital diseases. The majority of protocols designed for their isolation are based on differential centrifugation steps. However, little is still known of the type and amount of vesicles left in the supernatant. Here we used an isolation protocol for UEVs which uses hydrostatic filtration dialysis as first pre-enrichment step, followed by differential centrifugation. Transmission electron microscopy (TEM), mass spectrometry (MS), western blot, ELISA assays and tuneable resistive pulse sensing (TRPS) were used to characterise and quantify UEVs in the ultracentrifugation supernatant. TEM showed the presence of a variety of small size vesicles in the supernatant while protein identification by MS matched accurately with the protein list available in Vesiclepedia. Screening and relative quantification for specific vesicle markers showed that the supernatant was preferentially positive for CD9 and TSG101. ELISA tests for quantification of exosome revealed that 14%, was left in the supernatant with a particle diameter of 110 nm and concentration of 1.54 × 10 10 /ml. Here we show a comprehensive characterisation of exosomes and other small size urinary vesicles which the conventional differential centrifugation protocol may lose.

  2. A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions

    Directory of Open Access Journals (Sweden)

    Nabil Sabor

    2017-01-01

    Full Text Available Introducing mobility to Wireless Sensor Networks (WSNs puts new challenges particularly in designing of routing protocols. Mobility can be applied to the sensor nodes and/or the sink node in the network. Many routing protocols have been developed to support the mobility of WSNs. These protocols are divided depending on the routing structure into hierarchical-based, flat-based, and location-based routing protocols. However, the hierarchical-based routing protocols outperform the other routing types in saving energy, scalability, and extending lifetime of Mobile WSNs (MWSNs. Selecting an appropriate hierarchical routing protocol for specific applications is an important and difficult task. Therefore, this paper focuses on reviewing some of the recently hierarchical-based routing protocols that are developed in the last five years for MWSNs. This survey divides the hierarchical-based routing protocols into two broad groups, namely, classical-based and optimized-based routing protocols. Also, we present a detailed classification of the reviewed protocols according to the routing approach, control manner, mobile element, mobility pattern, network architecture, clustering attributes, protocol operation, path establishment, communication paradigm, energy model, protocol objectives, and applications. Moreover, a comparison between the reviewed protocols is investigated in this survey depending on delay, network size, energy-efficiency, and scalability while mentioning the advantages and drawbacks of each protocol. Finally, we summarize and conclude the paper with future directions.

  3. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    Science.gov (United States)

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  4. Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhi Chen

    2015-01-01

    Full Text Available Accurate and reliable routing protocols with Quality of Service (QoS support determine the mission-critical application efficiency in WSNs. This paper proposes a model-checking design driven framework for designing the QoS-based routing protocols of WSNs, which involves the light-weight design process, the timed automata model, and the alternative QoS verification properties. The accurate feedback of continually model checking in the iterative design process effectively stimulates the parameter tuning of the protocols. We demonstrate the straightforward and modular characteristics of the proposed framework in designing a prototype QoS-based routing protocol. The prototype study shows that the model-checking design framework may complement other design methods and ensure the QoS implementation of the QoS-based routing protocol design for WSNs.

  5. An approach to enrich online medical Problem-Based Learning with tacit healthcare knowledge.

    Science.gov (United States)

    Cheah, Yu-N; Rashid, Faridah Abdul; Abidi, Syed Sibte Raza

    2003-01-01

    Existing Problem-Based Learning (PBL) problems, though suitable in their own right for teaching purposes, are limited in their potential to evolve by themselves and to create new knowledge. Presently, they are based on textbook examples of past cases and/or cases that have been transcribed by a clinician. In this paper, we present (a) a tacit healthcare knowledge representation formalism called Healthcare Scenarios, (b) the relevance of healthcare scenarios in PBL in healthcare and medicine, (c) a novel PBL-Scenario-based tacit knowledge explication strategy and (d) an online PBL Problem Composer and Presenter (PBL-Online) to facilitate the acquisition and utilisation of expert-quality tacit healthcare knowledge to enrich online PBL. We employ a confluence of healthcare knowledge management tools and Internet technologies to bring tacit healthcare knowledge-enriched PBL to a global and yet more accessible level.

  6. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    Science.gov (United States)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  7. Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method

    Directory of Open Access Journals (Sweden)

    Hanane Houmani

    2012-01-01

    Full Text Available Most applications in the Internet such as e-banking and e-commerce use the SET and the NSL protocols to protect the communication channel between the client and the server. Then, it is crucial to ensure that these protocols respect some security properties such as confidentiality, authentication, and integrity. In this paper, we analyze the SET and the NSL protocols with respect to the confidentiality (secrecy property. To perform this analysis, we use the interpretation functions-based method. The main idea behind the interpretation functions-based technique is to give sufficient conditions that allow to guarantee that a cryptographic protocol respects the secrecy property. The flexibility of the proposed conditions allows the verification of daily-life protocols such as SET and NSL. Also, this method could be used under different assumptions such as a variety of intruder abilities including algebraic properties of cryptographic primitives. The NSL protocol, for instance, is analyzed with and without the homomorphism property. We show also, using the SET protocol, the usefulness of this approach to correct weaknesses and problems discovered during the analysis.

  8. Cluster Based Hierarchical Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, Md. Golam; Kabir, M. Hasnat; Rahim, Muhammad Sajjadur; Ullah, Shaikh Enayet

    2012-01-01

    The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. In this paper, we propose a two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP). We introduce a new concept called head-set, consists of one active cluster head and some other associate cluster heads within a cluster. The head-set members are responsible for control and management of the network. Results show that t...

  9. Huntahan* vocab assessment toward enriching mother tongue-based classroom practices

    Directory of Open Access Journals (Sweden)

    Cacho Reynald M.

    2015-01-01

    Full Text Available This two-phase action research examined the profile and knowledge level of Grade III pupils about their knowledge on the distinct local vocabularies in order to formulate enrichment or intervention, to address any deficiency or lack of, and to assess whether such enrichment programs are effective for authentic, localized implementation of the MTB-MLE. The research instruments used in the first phase included survey and vocabulary assessment test. The researchers initially employed descriptive statistics to interpret the result. Majority of the respondents have established residency in Lopez, Quezon for at least four years. All of the pupils speak Tagalog only at home. The first phase of the research revealed that the pupils of Lopez West Elementary School Bldg. 1 performed satisfactorily in the language test. Most of them found that the most difficult words are generally content words. The initial results of this study serve as baseline information implying that the pupils’ level of understanding of the Lopezeños words needs enhancement and/or reinforcements; hence, there is an urgent need to implement the 2nd cycle of this action research. The second phase once implemented seeks to evaluate the effectiveness of the intervention and/or enrichment activities that may guide language teachers in the conduct of classroom-based, culturally sensitive, contextualized language instruction.

  10. Evaluation of Methyl-Binding Domain Based Enrichment Approaches Revisited.

    Directory of Open Access Journals (Sweden)

    Karolina A Aberg

    Full Text Available Methyl-binding domain (MBD enrichment followed by deep sequencing (MBD-seq, is a robust and cost efficient approach for methylome-wide association studies (MWAS. MBD-seq has been demonstrated to be capable of identifying differentially methylated regions, detecting previously reported robust associations and producing findings that replicate with other technologies such as targeted pyrosequencing of bisulfite converted DNA. There are several kits commercially available that can be used for MBD enrichment. Our previous work has involved MethylMiner (Life Technologies, Foster City, CA, USA that we chose after careful investigation of its properties. However, in a recent evaluation of five commercially available MBD-enrichment kits the performance of the MethylMiner was deemed poor. Given our positive experience with MethylMiner, we were surprised by this report. In an attempt to reproduce these findings we here have performed a direct comparison of MethylMiner with MethylCap (Diagenode Inc, Denville, NJ, USA, the best performing kit in that study. We find that both MethylMiner and MethylCap are two well performing MBD-enrichment kits. However, MethylMiner shows somewhat better enrichment efficiency and lower levels of background "noise". In addition, for the purpose of MWAS where we want to investigate the majority of CpGs, we find MethylMiner to be superior as it allows tailoring the enrichment to the regions where most CpGs are located. Using targeted bisulfite sequencing we confirmed that sites where methylation was detected by either MethylMiner or by MethylCap indeed were methylated.

  11. Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation

    Science.gov (United States)

    Xiao, Xin; Shi, Yuanchun; Tang, Yun; Zhang, Nan

    During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases.

  12. Comparison of Different Sample Preparation Protocols Reveals Lysis Buffer-Specific Extraction Biases in Gram-Negative Bacteria and Human Cells.

    Science.gov (United States)

    Glatter, Timo; Ahrné, Erik; Schmidt, Alexander

    2015-11-06

    We evaluated different in-solution and FASP-based sample preparation strategies for absolute protein quantification. Label-free quantification (LFQ) was employed to compare different sample preparation strategies in the bacterium Pseudomonas aeruginosa and human embryonic kidney cells (HEK), and organismal-specific differences in general performance and enrichment of specific protein classes were noted. The original FASP protocol globally enriched for most proteins in the bacterial sample, whereas the sodium deoxycholate in-solution strategy was more efficient with HEK cells. Although detergents were found to be highly suited for global proteome analysis, higher intensities were obtained for high-abundant nucleic acid-associated protein complexes, like the ribosome and histone proteins, using guanidine hydrochloride. Importantly, we show for the first time that the observable total proteome mass of a sample strongly depends on the sample preparation protocol, with some protocols resulting in a significant underestimation of protein mass due to incomplete protein extraction of biased protein groups. Furthermore, we demonstrate that some of the observed abundance biases can be overcome by incorporating a nuclease treatment step or, alternatively, a correction factor for complementary sample preparation approaches.

  13. An Adaptive Information Quantity-Based Broadcast Protocol for Safety Services in VANET

    Directory of Open Access Journals (Sweden)

    Wenjie Wang

    2016-01-01

    Full Text Available Vehicle-to-vehicle communication plays a significantly important role in implementing safe and efficient road traffic. When disseminating safety messages in the network, the information quantity on safety packets changes over time and space. However, most of existing protocols view each packet the same to disseminate, preventing vehicles from collecting more recent and precise safety information. Hence, an information quantity-based broadcast protocol is proposed in this paper to ensure the efficiency of safety messages dissemination. In particular, we propose the concept of emergency-degree to evaluate packets’ information quantity. Then we present EDCast, an emergency-degree-based broadcast protocol. EDCast differentiates each packet’s priority for accessing the channel based on its emergency-degree so as to provide vehicles with more safety information timely and accurately. In addition, an adaptive scheme is presented to ensure fast dissemination of messages in different network condition. We compare the performance of EDCast with those of three other representative protocols in a typical highway scenario. Simulation results indicate that EDCast achieves higher broadcast efficiency and less redundancy with less delivery delay. What we found demonstrates that it is feasible and necessary for incorporating information quantity of messages in designing an efficient safety message broadcast protocol.

  14. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  15. A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jian Wang

    2017-05-01

    Full Text Available This article proposes a protocol layer trust-based intrusion detection scheme for wireless sensor networks. Unlike existing work, the trust value of a sensor node is evaluated according to the deviations of key parameters at each protocol layer considering the attacks initiated at different protocol layers will inevitably have impacts on the parameters of the corresponding protocol layers. For simplicity, the paper mainly considers three aspects of trustworthiness, namely physical layer trust, media access control layer trust and network layer trust. The per-layer trust metrics are then combined to determine the overall trust metric of a sensor node. The performance of the proposed intrusion detection mechanism is then analyzed using the t-distribution to derive analytical results of false positive and false negative probabilities. Numerical analytical results, validated by simulation results, are presented in different attack scenarios. It is shown that the proposed protocol layer trust-based intrusion detection scheme outperforms a state-of-the-art scheme in terms of detection probability and false probability, demonstrating its usefulness for detecting cross-layer attacks.

  16. A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks

    Science.gov (United States)

    Naeimi, Soroush; Ghafghazi, Hamidreza; Chow, Chee-Onn; Ishii, Hiroshi

    2012-01-01

    The past few years have witnessed increased interest among researchers in cluster-based protocols for homogeneous networks because of their better scalability and higher energy efficiency than other routing protocols. Given the limited capabilities of sensor nodes in terms of energy resources, processing and communication range, the cluster-based protocols should be compatible with these constraints in either the setup state or steady data transmission state. With focus on these constraints, we classify routing protocols according to their objectives and methods towards addressing the shortcomings of clustering process on each stage of cluster head selection, cluster formation, data aggregation and data communication. We summarize the techniques and methods used in these categories, while the weakness and strength of each protocol is pointed out in details. Furthermore, taxonomy of the protocols in each phase is given to provide a deeper understanding of current clustering approaches. Ultimately based on the existing research, a summary of the issues and solutions of the attributes and characteristics of clustering approaches and some open research areas in cluster-based routing protocols that can be further pursued are provided. PMID:22969350

  17. Recovery of the Decorin-Enriched Fraction, Extract (D, From Human Skin: An Accelerated Protocol

    Directory of Open Access Journals (Sweden)

    Denys N. Wheatley

    2004-01-01

    Full Text Available The original extraction procedure of Engel and Catchpole [1] has often been used to recover decorin-enriched material from the skin. This material has a strong inhibitory effect on fibroblast proliferation, and clearly suppresses it in skin except after the first 5–6 days of wounding when new scaffold material is required. The aim of our present study has been to find and evaluate the product of a faster recovery method, and to check its consistency as a more reliable means of regularly obtaining sufficient material for topical application in wounds that might become hypertrophic. Modifications of the original Toole and Lowther [2] extraction procedure have been carefully evaluated in an attempt to cut preparation time without compromising biological activity of the inhibitory extract. We have devised a faster recovery procedure without compromising biological activity, even if initial recovery has been somewhat reduced. The latter problem could be offset by repeated cycles of the final extraction step. The main inhibitory activity is shown to be within the decorin-enriched “extract D,” as the core protein and DSPG II. Adjustment of the extract towards neutrality after dialysis against water keeps most of the extracted protein in solution and yielded a decorin-enriched preparation that had a specific activity equivalent to that of the old method. It also yielded a fraction that was readily lyophilised to give a small amount of material that could be stored indefinitely without loss of activity and readily redissolved in aqueous solution. A reliable and relatively quick method is presented for the production, from human skin, of a decorin-enriched preparation that has strong fibroblast inhibitory action. The value of the procedure is that it is inexpensive and can produce the quantities that might be used topically in reducing hypertrophic scarring of wounds.

  18. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco

    2015-01-01

    We present ParTypes, a type-based methodology for the verification of Message Passing Interface (MPI) programs written in the C programming language. The aim is to statically verify programs against protocol specifications, enforcing properties such as fidelity and absence of deadlocks. We develo...

  19. A Concurrent Multiple Negotiation Protocol Based on Colored Petri Nets.

    Science.gov (United States)

    Niu, Lei; Ren, Fenghui; Zhang, Minjie; Bai, Quan

    2017-11-01

    Concurrent multiple negotiation (CMN) provides a mechanism for an agent to simultaneously conduct more than one negotiation. There may exist different interdependency relationships among these negotiations and these interdependency relationships can impact the outcomes of these negotiations. The outcomes of these concurrent negotiations contribute together for the agent to achieve an overall negotiation goal. Handling a CMN while considering interdependency relationships among multiple negotiations is a challenging research problem. This paper: 1) comprehensively highlights research problems of negotiations at concurrent negotiation level; 2) provides a graph-based CMN model with consideration of the interdependency relationships; and 3) proposes a colored Petri net-based negotiation protocol for conducting CMNs. With the proposed protocol, a CMN can be efficiently and concurrently processed and negotiation agreements can be efficiently achieved. Experimental results indicate the effectiveness and efficiency of the proposed protocol in terms of the negotiation success rate, the negotiation time and the negotiation outcome.

  20. Quorum system and random based asynchronous rendezvous protocol for cognitive radio ad hoc networks

    Directory of Open Access Journals (Sweden)

    Sylwia Romaszko

    2013-12-01

    Full Text Available This paper proposes a rendezvous protocol for cognitive radio ad hoc networks, RAC2E-gQS, which utilizes (1 the asynchronous and randomness properties of the RAC2E protocol, and (2 channel mapping protocol, based on a grid Quorum System (gQS, and taking into account channel heterogeneity and asymmetric channel views. We show that the combination of the RAC2E protocol with the grid-quorum based channel mapping can yield a powerful RAC2E-gQS rendezvous protocol for asynchronous operation in a distributed environment assuring a rapid rendezvous between the cognitive radio nodes having available both symmetric and asymmetric channel views. We also propose an enhancement of the protocol, which uses a torus QS for a slot allocation, dealing with the worst case scenario, a large number of channels with opposite ranking lists.

  1. A Novel UDT-Based Transfer Speed-Up Protocol for Fog Computing

    Directory of Open Access Journals (Sweden)

    Zhijie Han

    2018-01-01

    Full Text Available Fog computing is a distributed computing model as the middle layer between the cloud data center and the IoT device/sensor. It provides computing, network, and storage devices so that cloud based services can be closer to IOT devices and sensors. Cloud computing requires a lot of bandwidth, and the bandwidth of the wireless network is limited. In contrast, the amount of bandwidth required for “fog computing” is much less. In this paper, we improved a new protocol Peer Assistant UDT-Based Data Transfer Protocol (PaUDT, applied to Iot-Cloud computing. Furthermore, we compared the efficiency of the congestion control algorithm of UDT with the Adobe’s Secure Real-Time Media Flow Protocol (RTMFP, based on UDP completely at the transport layer. At last, we built an evaluation model of UDT in RTT and bit error ratio which describes the performance. The theoretical analysis and experiment result have shown that UDT has good performance in IoT-Cloud computing.

  2. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Sabin Bhandari

    2016-03-01

    Full Text Available In wireless body area networks (WBANs, various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  3. A Priority-Based Adaptive MAC Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Bhandari, Sabin; Moh, Sangman

    2016-03-18

    In wireless body area networks (WBANs), various sensors and actuators are placed on/inside the human body and connected wirelessly. WBANs have specific requirements for healthcare and medical applications, hence, standard protocols like the IEEE 802.15.4 cannot fulfill all the requirements. Consequently, many medium access control (MAC) protocols, mostly derived from the IEEE 802.15.4 superframe structure, have been studied. Nevertheless, they do not support a differentiated quality of service (QoS) for the various forms of traffic coexisting in a WBAN. In particular, a QoS-aware MAC protocol is essential for WBANs operating in the unlicensed Industrial, Scientific, and Medical (ISM) bands, because different wireless services like Bluetooth, WiFi, and Zigbee may coexist there and cause severe interference. In this paper, we propose a priority-based adaptive MAC (PA-MAC) protocol for WBANs in unlicensed bands, which allocates time slots dynamically, based on the traffic priority. Further, multiple channels are effectively utilized to reduce access delays in a WBAN, in the presence of coexisting systems. Our performance evaluation results show that the proposed PA-MAC outperforms the IEEE 802.15.4 MAC and the conventional priority-based MAC in terms of the average transmission time, throughput, energy consumption, and data collision ratio.

  4. A two-hop based adaptive routing protocol for real-time wireless sensor networks.

    Science.gov (United States)

    Rachamalla, Sandhya; Kancherla, Anitha Sheela

    2016-01-01

    One of the most important and challenging issues in wireless sensor networks (WSNs) is to optimally manage the limited energy of nodes without degrading the routing efficiency. In this paper, we propose an energy-efficient adaptive routing mechanism for WSNs, which saves energy of nodes by removing the much delayed packets without degrading the real-time performance of the used routing protocol. It uses the adaptive transmission power algorithm which is based on the attenuation of the wireless link to improve the energy efficiency. The proposed routing mechanism can be associated with any geographic routing protocol and its performance is evaluated by integrating with the well known two-hop based real-time routing protocol, PATH and the resulting protocol is energy-efficient adaptive routing protocol (EE-ARP). The EE-ARP performs well in terms of energy consumption, deadline miss ratio, packet drop and end-to-end delay.

  5. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  6. Backpressure-based control protocols: design and computational aspects

    NARCIS (Netherlands)

    Miretskiy, D.I.; Scheinhardt, Willem R.W.; Mandjes, M.R.H.

    2009-01-01

    Congestion control in packet-based networks is often realized by feedback protocols. In this paper we assess their performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. In such a mechanism the service rate of an upstream queue is

  7. Backpressure-based control protocols: Design and computational aspects

    NARCIS (Netherlands)

    Miretskiy, D.I.; Scheinhardt, W.R.W.; Mandjes, M.R.H.

    2009-01-01

    Congestion control in packet-based networks is often realized by feedback protocols. In this paper we assess their performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. In such a mechanism the service rate of an upstream queue is

  8. Communication protocol in chassis detecting wireless transmission system based on WiFi

    Science.gov (United States)

    In chassis detecting wireless transmission system, the wireless network communication protocol plays a key role in the information exchange and synchronization between the host and chassis PDA. This paper presents a wireless network transmission protocol based on TCP/IP which makes the rules of info...

  9. EpSoc: Social-Based Epidemic-Based Routing Protocol in Opportunistic Mobile Social Network

    Directory of Open Access Journals (Sweden)

    Halikul Lenando

    2018-01-01

    Full Text Available In opportunistic networks, the nature of intermittent and disruptive connections degrades the efficiency of routing. Epidemic routing protocol is used as a benchmark for most of routing protocols in opportunistic mobile social networks (OMSNs due to its high message delivery and latency. However, Epidemic incurs high cost in terms of overhead and hop count. In this paper, we propose a hybrid routing protocol called EpSoc which utilizes the Epidemic routing forwarding strategy and exploits an important social feature, that is, degree centrality. Two techniques are used in EpSoc. Messages’ TTL is adjusted based on the degree centrality of nodes, and the message blocking mechanism is used to control replication. Simulation results show that EpSoc increases the delivery ratio and decreases the overhead ratio, the average latency, and the hop counts as compared to Epidemic and Bubble Rap.

  10. A Protocol for Content-Based Communication in Disconnected Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Julien Haillot

    2010-01-01

    Full Text Available In content-based communication, information flows towards interested hosts rather than towards specifically set destinations. This new style of communication perfectly fits the needs of applications dedicated to information sharing, news distribution, service advertisement and discovery, etc. In this paper we address the problem of supporting content-based communication in partially or intermittently connected mobile ad hoc networks (MANETs. The protocol we designed leverages on the concepts of opportunistic networking and delay-tolerant networking in order to account for the absence of end-to-end connectivity in disconnected MANETs. The paper provides an overview of the protocol, as well as simulation results that show how this protocol can perform in realistic conditions.

  11. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    International Nuclear Information System (INIS)

    Xie Qi; Hu Bin; Chen Ke-Fei; Liu Wen-Hao; Tan Xiao

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. (paper)

  12. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  13. Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures

    Directory of Open Access Journals (Sweden)

    Christian M. Mueller

    2010-12-01

    Full Text Available Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown attacks. In this paper, we present an extension to known Support Vector Machine (SVM based anomaly detection algorithms for the Session Initiation Protocol (SIP. Our contribution is to extend the amount of different features used for classification (feature space by exploiting the structure of SIP messages, which reduces the false positive rate. Additionally, we show how combining our approach with attribute reduction significantly improves throughput.

  14. The Use of the Puzzle Box as a Means of Assessing the Efficacy of Environmental Enrichment

    Science.gov (United States)

    O'Connor, Angela M.; Burton, Thomas J.; Leamey, Catherine A.; Sawatari, Atomu

    2014-01-01

    Environmental enrichment can dramatically influence the development and function of neural circuits. Further, enrichment has been shown to successfully delay the onset of symptoms in models of Huntington’s disease 1-4, suggesting environmental factors can evoke a neuroprotective effect against the progressive, cellular level damage observed in neurodegenerative disorders. The ways in which an animal can be environmentally enriched, however, can vary considerably. Further, there is no straightforward manner in which the effects of environmental enrichment can be assessed: most methods require either fairly complicated behavioral paradigms and/or postmortem anatomical/physiological analyses. This protocol describes the use of a simple and inexpensive behavioral assay, the Puzzle Box 5-7 as a robust means of determining the efficacy of increased social, sensory and motor stimulation on mice compared to cohorts raised in standard laboratory conditions. This simple problem solving task takes advantage of a rodent’s innate desire to avoid open enclosures by seeking shelter. Cognitive ability is assessed by adding increasingly complex impediments to the shelter’s entrance. The time a given subject takes to successfully remove the obstructions and enter the shelter serves as the primary metric for task performance. This method could provide a reliable means of rapidly assessing the efficacy of different enrichment protocols on cognitive function, thus paving the way for systematically determining the role specific environmental factors play in delaying the onset of neurodevelopmental and neurodegenerative disease. PMID:25590345

  15. Legal and regulatory framework of Uranium's enrichment

    International Nuclear Information System (INIS)

    Antelo, Josefina; Figueredo, Micaela S.; Mangone, Gisela P.; Manin, Maria L.; Pota, Luciana F.

    2009-01-01

    The object of this paper is to develop the legal aspects referred to the activities of uranium's enrichment, in order to achieve the pacific use of nuclear energy and to obey treatments, agreements and international conventions in which Argentine is party and through them assumes the non proliferation's commitment. In this context, we will develop the rights and obligations established in those legal instruments, as well as the juridical concerns of the eventual subscription of Argentine to the Additional Protocol approved by the Board of Governors in 1997. (author)

  16. A hash based mutual RFID tag authentication protocol in telecare medicine information system.

    Science.gov (United States)

    Srivastava, Keerti; Awasthi, Amit K; Kaul, Sonam D; Mittal, R C

    2015-01-01

    Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.

  17. SNP-based pathway enrichment analysis for genome-wide association studies

    Directory of Open Access Journals (Sweden)

    Potkin Steven G

    2011-04-01

    Full Text Available Abstract Background Recently we have witnessed a surge of interest in using genome-wide association studies (GWAS to discover the genetic basis of complex diseases. Many genetic variations, mostly in the form of single nucleotide polymorphisms (SNPs, have been identified in a wide spectrum of diseases, including diabetes, cancer, and psychiatric diseases. A common theme arising from these studies is that the genetic variations discovered by GWAS can only explain a small fraction of the genetic risks associated with the complex diseases. New strategies and statistical approaches are needed to address this lack of explanation. One such approach is the pathway analysis, which considers the genetic variations underlying a biological pathway, rather than separately as in the traditional GWAS studies. A critical challenge in the pathway analysis is how to combine evidences of association over multiple SNPs within a gene and multiple genes within a pathway. Most current methods choose the most significant SNP from each gene as a representative, ignoring the joint action of multiple SNPs within a gene. This approach leads to preferential identification of genes with a greater number of SNPs. Results We describe a SNP-based pathway enrichment method for GWAS studies. The method consists of the following two main steps: 1 for a given pathway, using an adaptive truncated product statistic to identify all representative (potentially more than one SNPs of each gene, calculating the average number of representative SNPs for the genes, then re-selecting the representative SNPs of genes in the pathway based on this number; and 2 ranking all selected SNPs by the significance of their statistical association with a trait of interest, and testing if the set of SNPs from a particular pathway is significantly enriched with high ranks using a weighted Kolmogorov-Smirnov test. We applied our method to two large genetically distinct GWAS data sets of schizophrenia, one

  18. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-01-01

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed. PMID:27128923

  19. Streetlight Control System Based on Wireless Communication over DALI Protocol.

    Science.gov (United States)

    Bellido-Outeiriño, Francisco José; Quiles-Latorre, Francisco Javier; Moreno-Moreno, Carlos Diego; Flores-Arias, José María; Moreno-García, Isabel; Ortiz-López, Manuel

    2016-04-27

    Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  20. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  1. Enrichment of skin-derived neural precursor cells from dermal cell populations by altering culture conditions.

    Science.gov (United States)

    Bayati, Vahid; Gazor, Rohoullah; Nejatbakhsh, Reza; Negad Dehbashi, Fereshteh

    2016-01-01

    As stem cells play a critical role in tissue repair, their manipulation for being applied in regenerative medicine is of great importance. Skin-derived precursors (SKPs) may be good candidates for use in cell-based therapy as the only neural stem cells which can be isolated from an accessible tissue, skin. Herein, we presented a simple protocol to enrich neural SKPs by monolayer adherent cultivation to prove the efficacy of this method. To enrich neural SKPs from dermal cell populations, we have found that a monolayer adherent cultivation helps to increase the numbers of neural precursor cells. Indeed, we have cultured dermal cells as monolayer under serum-supplemented (control) and serum-supplemented culture, followed by serum free cultivation (test) and compared. Finally, protein markers of SKPs were assessed and compared in both experimental groups and differentiation potential was evaluated in enriched culture. The cells of enriched culture concurrently expressed fibronectin, vimentin and nestin, an intermediate filament protein expressed in neural and skeletal muscle precursors as compared to control culture. In addition, they possessed a multipotential capacity to differentiate into neurogenic, glial, adipogenic, osteogenic and skeletal myogenic cell lineages. It was concluded that serum-free adherent culture reinforced by growth factors have been shown to be effective on proliferation of skin-derived neural precursor cells (skin-NPCs) and drive their selective and rapid expansion.

  2. Minimal sampling protocol for accurate estimation of urea production: a study with oral [13C]urea in fed and fasted piglets

    NARCIS (Netherlands)

    Oosterveld, Michiel J. S.; Gemke, Reinoud J. B. J.; Dainty, Jack R.; Kulik, Willem; Jakobs, Cornelis; de Meer, Kees

    2005-01-01

    An oral [13C]urea protocol may provide a simple method for measurement of urea production. The validity of single pool calculations in relation to a reduced sampling protocol was assessed. In eight fed and five fasted piglets, plasma urea enrichments from a 10 h sampling protocol were measured

  3. Perturbation based Monte Carlo criticality search in density, enrichment and concentration

    International Nuclear Information System (INIS)

    Li, Zeguang; Wang, Kan; Deng, Jingkang

    2015-01-01

    Highlights: • A new perturbation based Monte Carlo criticality search method is proposed. • The method could get accurate results with only one individual criticality run. • The method is used to solve density, enrichment and concentration search problems. • Results show the feasibility and good performances of this method. • The relationship between results’ accuracy and perturbation order is discussed. - Abstract: Criticality search is a very important aspect in reactor physics analysis. Due to the advantages of Monte Carlo method and the development of computer technologies, Monte Carlo criticality search is becoming more and more necessary and feasible. Existing Monte Carlo criticality search methods need large amount of individual criticality runs and may have unstable results because of the uncertainties of criticality results. In this paper, a new perturbation based Monte Carlo criticality search method is proposed and discussed. This method only needs one individual criticality calculation with perturbation tallies to estimate k eff changing function using initial k eff and differential coefficients results, and solves polynomial equations to get the criticality search results. The new perturbation based Monte Carlo criticality search method is implemented in the Monte Carlo code RMC, and criticality search problems in density, enrichment and concentration are taken out. Results show that this method is quite inspiring in accuracy and efficiency, and has advantages compared with other criticality search methods

  4. Effects of exercise and enrichment on behaviour in CD-1 mice.

    Science.gov (United States)

    Aujnarain, Amiirah B; Luo, Owen D; Taylor, Natalie; Lai, Jonathan K Y; Foster, Jane A

    2018-04-16

    A host of scholarly work has characterized the positive effects of exercise and environmental enrichment on behaviour and cognition in animal studies. The purpose of this study was to investigate the uptake and longitudinal impact of exercise and enrichment on the behavioural phenotype of male and female CD-1 mice. CD-1 mice housed in standard (STD) or exercise and enrichment (EE) conditions post-weaning were tested in the 3-chamber sociability test, open field, and elevated plus maze and exercise activity was monitored throughout the enrichment protocol. Male and female EE mice both showed reduced anxiety and activity in the open field and elevated plus maze relative to sex-matched STD mice. EE altered social behaviours in a sex-specific fashion, with only female EE mice showing increased social preference relative to female STD mice and a preference for social novelty only present in male EE mice. This sexual dimorphism was not observed to be a product of exercise uptake, as CD-1 mice of both sexes demonstrated a consistent trend of wheel rotation frequencies. These findings suggest the importance of considering variables such as sex and strain on experimental design variables in future work on environmental enrichment. Copyright © 2018 Elsevier B.V. All rights reserved.

  5. Implementation of an Evidence-Based Protocol for Surgical Infection Prophylaxis

    National Research Council Canada - National Science Library

    Savino, John A; Smeland, Jane; Flink, Ellen L; Ruperto, Angelo; Hines, Amanda; Sullivan, Thomas; Galvin, Kerri; Risucci, Donald A

    2005-01-01

    An evidence-based surgical antimicrobial prophylaxis (AMP) protocol was implemented in multiple facilities to determine if compliance led to a decrease in New York State reportable surgical site infections (SSIs...

  6. Marine sediment sample pre-processing for macroinvertebrates metabarcoding: mechanical enrichment and homogenization

    Directory of Open Access Journals (Sweden)

    Eva Aylagas

    2016-10-01

    Full Text Available Metabarcoding is an accurate and cost-effective technique that allows for simultaneous taxonomic identification of multiple environmental samples. Application of this technique to marine benthic macroinvertebrate biodiversity assessment for biomonitoring purposes requires standardization of laboratory and data analysis procedures. In this context, protocols for creation and sequencing of amplicon libraries and their related bioinformatics analysis have been recently published. However, a standardized protocol describing all previous steps (i.e. processing and manipulation of environmental samples for macroinvertebrate community characterization is lacking. Here, we provide detailed procedures for benthic environmental sample collection, processing, enrichment for macroinvertebrates, homogenization, and subsequent DNA extraction for metabarcoding analysis. Since this is the first protocol of this kind, it should be of use to any researcher in this field, having the potential for improvement.

  7. Gene-ontology enrichment analysis in two independent family-based samples highlights biologically plausible processes for autism spectrum disorders.

    LENUS (Irish Health Repository)

    Anney, Richard J L

    2012-02-01

    Recent genome-wide association studies (GWAS) have implicated a range of genes from discrete biological pathways in the aetiology of autism. However, despite the strong influence of genetic factors, association studies have yet to identify statistically robust, replicated major effect genes or SNPs. We apply the principle of the SNP ratio test methodology described by O\\'Dushlaine et al to over 2100 families from the Autism Genome Project (AGP). Using a two-stage design we examine association enrichment in 5955 unique gene-ontology classifications across four groupings based on two phenotypic and two ancestral classifications. Based on estimates from simulation we identify excess of association enrichment across all analyses. We observe enrichment in association for sets of genes involved in diverse biological processes, including pyruvate metabolism, transcription factor activation, cell-signalling and cell-cycle regulation. Both genes and processes that show enrichment have previously been examined in autistic disorders and offer biologically plausibility to these findings.

  8. Researches on the Security of Cluster-based Communication Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanhong Sun

    2014-08-01

    Full Text Available Along with the in-depth application of sensor networks, the security issues have gradually become the bottleneck of wireless sensor applications. To provide a solution for security scheme is a common concern not only of researchers but also of providers, integrators and users of wireless sensor networks. Based on this demand, this paper focuses on the research of strengthening the security of cluster-based wireless sensor networks. Based on the systematic analysis of the clustering protocol and its security enhancement scheme, the paper introduces the broadcast authentication scheme, and proposes an SA-LEACH network security enhancement protocol. The performance analysis and simulation experiments prove that the protocol consumes less energy with the same security requirements, and when the base station is comparatively far from the network deployment area, it is more advantageous in terms of energy consumption and t more suitable for wireless sensor networks.

  9. Two-Dimensional MoS2-Based Zwitterionic Hydrophilic Interaction Liquid Chromatography Material for the Specific Enrichment of Glycopeptides.

    Science.gov (United States)

    Xia, Chaoshuang; Jiao, Fenglong; Gao, Fangyuan; Wang, Heping; Lv, Yayao; Shen, Yehua; Zhang, Yangjun; Qian, Xiaohong

    2018-06-05

    Mass spectrometry (MS)-based glycoproteomics research requires highly efficient sample preparation to eliminate interference from non-glycopeptides and to improve the efficiency of glycopeptide detection. In this work, a novel MoS 2 /Au-NP (gold nanoparticle)-L-cysteine nanocomposite was prepared for glycopeptide enrichment. The two-dimensional (2D) structured MoS 2 nanosheets served as a matrix that could provide a large surface area for immobilizing hydrophilic groups (such as L-cysteine) with low steric hindrance between the materials and the glycopeptides. As a result, the novel nanomaterial possessed an excellent ability to capture glycopeptides. Compared to commercial zwitterionic hydrophilic interaction liquid chromatography (ZIC-HILIC) materials, the novel nanomaterials exhibited excellent enrichment performance with ultrahigh selectivity and sensitivity (approximately 10 fmol), high binding capacity (120 mg g -1 ), high enrichment recovery (more than 93%), satisfying batch-to-batch reproducibility, and good universality for glycopeptide enrichment. In addition, its outstanding specificity and efficiency for glycopeptide enrichment was confirmed by the detection of glycopeptides from an human serum immunoglobulin G (IgG) tryptic digest in quantities as low as a 1:1250 molar ratio of IgG tryptic digest to bovine serum albumin tryptic digest. The novel nanocomposites were further used for the analysis of complex samples, and 1920 glycopeptide backbones from 775 glycoproteins were identified in three replicate analyses of 50 μg of proteins extracted from HeLa cell exosomes. The resulting highly informative mass spectra indicated that this multifunctional nanomaterial-based enrichment method could be used as a promising tool for the in-depth and comprehensive characterization of glycoproteomes in MS-based glycoproteomics.

  10. Streetlight Control System Based on Wireless Communication over DALI Protocol

    Directory of Open Access Journals (Sweden)

    Francisco José Bellido-Outeiriño

    2016-04-01

    Full Text Available Public lighting represents a large part of the energy consumption of towns and cities. Efficient management of public lighting can entail significant energy savings. This work presents a smart system for managing public lighting networks based on wireless communication and the DALI protocol. Wireless communication entails significant economic savings, as there is no need to install new wiring and visual impacts and damage to the facades of historical buildings in city centers are avoided. The DALI protocol uses bidirectional communication with the ballast, which allows its status to be controlled and monitored at all times. The novelty of this work is that it tackles all aspects related to the management of public lighting: a standard protocol, DALI, was selected to control the ballast, a wireless node based on the IEEE 802.15.4 standard with a DALI interface was designed, a network layer that considers the topology of the lighting network has been developed, and lastly, some user-friendly applications for the control and maintenance of the system by the technical crews of the different towns and cities have been developed.

  11. Design of Bus Protocol Intelligent Initiation System Based On RS485

    Directory of Open Access Journals (Sweden)

    Li Liming

    2017-01-01

    Full Text Available In order to design an effective and reliable RS485 bus protocol based on RS485 bus, this paper introduces the structure and transmission mode of the command frame and the response frame, and also introduce four control measures and the communication in order to process quality of this system. The communication protocol is open, tolerant, reliable and fast, and can realize ignition more reliable and accurate in the intelligent initiation system.

  12. Highly selective enrichment of phosphorylated peptides using titanium dioxide

    DEFF Research Database (Denmark)

    Thingholm, Tine; Jørgensen, Thomas J D; Jensen, Ole N

    2006-01-01

    -column. Although phosphopeptide enrichment can be achieved by using TFA and acetonitrile alone, the selectivity is dramatically enhanced by adding DHB or phthalic acid since these compounds, in conjunction with the low pH caused by TFA, prevent binding of nonphosphorylated peptides to TiO2. Using an alkaline...... a protocol for selective phosphopeptide enrichment using titanium dioxide (TiO2) chromatography. The selectivity toward phosphopeptides is obtained by loading the sample in a 2,5-dihydroxybenzoic acid (DHB) or phthalic acid solution containing acetonitrile and trifluoroacetic acid (TFA) onto a TiO2 micro...... solution (pH > or = 10.5) both monophosphorylated and multiphosphorylated peptides are eluted from the TiO2 beads. This highly efficient method for purification of phosphopeptides is well suited for the characterization of phosphoproteins from both in vitro and in vivo studies in combination with mass...

  13. Continuous monitoring of variations in the 235U enrichment of uranium in the header pipework of a centrifuge enrichment plant

    International Nuclear Information System (INIS)

    Packer, T.W.

    1991-01-01

    Non-destructive assay equipment, based on gamma-ray spectrometry and x-ray fluorescence analysis has previously been developed for confirming the presence of low enriched uranium in the header pipework of UF 6 gas centrifuge enrichment plants. However inspections can only be carried out occasionally on a limited number of pipes. With the development of centrifuge enrichment technology it has been suggested that more frequent, or ideally, continuous measurements should be made in order to improve safeguards assurance between inspections. For this purpose we have developed non-destructive assay equipment based on continuous gamma-ray spectrometry and x-ray transmission measurements. This equipment is suitable for detecting significant changes in the 235 U enrichment of uranium in the header pipework of new centrifuge enrichment plants. Results are given in this paper of continuous measurements made in the laboratory and also on header pipework of a centrifuge enrichment plant at Capenhurst

  14. An XML-Based Protocol for Distributed Event Services

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    This viewgraph presentation provides information on the application of an XML (extensible mark-up language)-based protocol to the developing field of distributed processing by way of a computational grid which resembles an electric power grid. XML tags would be used to transmit events between the participants of a transaction, namely, the consumer and the producer of the grid scheme.

  15. Cryptanalysis of Wang et al.’s lattice-based key exchange protocol

    Directory of Open Access Journals (Sweden)

    Daya Sagar Gupta

    2016-09-01

    Full Text Available Wang et al. proposed a new hard problem on lattices which is an extension of the small integer solution (SIS on lattices. This new generated hard problem is named to be bilateral in-homogeneous small integer solution (Bi-ISIS. Using the hardness of Bi-ISIS, Wang et al. proposed a new key exchange protocol, which is based on the lattice-based cryptography. In this paper, we signalize that Wang et al.’s lattice-based key exchange protocol is vulnerable to an attack, namely, man-in-the-middle (MITM attack. Through this attack, Eavesdropper can intercept the authenticated messages and communicate the unauthentic messages among the communicating parties.

  16. World enrichment requirements to 2005

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    The primary enrichment suppliers-Eurodif, Techsnabexport, Urenco, and the US DOE - are positioning themselves to take advantage of the post - 1995 market. Overall, unfilled requirements represent about 40 percent of world requirements in the year 2000. The USA will be the primary market, as US utilities' unfilled enrichment requirements account for over 60 percent of the world's total unfilled requirements. The enrichment market is moving toward more global competition, as each supplier tries to maintain its current regional market base and then to capture additional market share in other regions

  17. Preoperative magnetic resonance imaging protocol for endoscopic cranial base image-guided surgery.

    Science.gov (United States)

    Grindle, Christopher R; Curry, Joseph M; Kang, Melissa D; Evans, James J; Rosen, Marc R

    2011-01-01

    Despite the increasing utilization of image-guided surgery, no radiology protocols for obtaining magnetic resonance (MR) imaging of adequate quality are available in the current literature. At our institution, more than 300 endonasal cranial base procedures including pituitary, extended pituitary, and other anterior skullbase procedures have been performed in the past 3 years. To facilitate and optimize preoperative evaluation and assessment, there was a need to develop a magnetic resonance protocol. Retrospective Technical Assessment was performed. Through a collaborative effort between the otolaryngology, neurosurgery, and neuroradiology departments at our institution, a skull base MR image-guided (IGS) protocol was developed with several ends in mind. First, it was necessary to generate diagnostic images useful for the more frequently seen pathologies to improve work flow and limit the expense and inefficiency of case specific MR studies. Second, it was necessary to generate sequences useful for IGS, preferably using sequences that best highlight that lesion. Currently, at our institution, all MR images used for IGS are obtained using this protocol as part of preoperative planning. The protocol that has been developed allows for thin cut precontrast and postcontrast axial cuts that can be used to plan intraoperative image guidance. It also obtains a thin cut T2 axial series that can be compiled separately for intraoperative imaging, or may be fused with computed tomographic images for combined modality. The outlined protocol obtains image sequences effective for diagnostic and operative purposes for image-guided surgery using both T1 and T2 sequences. Copyright © 2011 Elsevier Inc. All rights reserved.

  18. The Groningen Protocol - the Jewish perspective.

    Science.gov (United States)

    Gesundheit, Benjamin; Steinberg, Avraham; Blazer, Shraga; Jotkowitz, Alan

    2009-01-01

    Despite significant advances in neonatology, there will always be newborns with serious life-threatening conditions creating most difficult bioethical dilemmas. Active euthanasia for adult patients is one of the most controversial bioethical questions; for severely ill neonates, the issue is even more complex, due to their inability to take part in any decision concerning their future. The Groningen Protocol introduced in 2005 by P.J. Sauer proposes criteria allowing active euthanasia for severely ill, not necessarily terminal, newborns with incurable conditions and poor quality of life in order to spare them unbearable suffering. We discuss the ethical dilemma and ideological foundations of the protocol, the opinions of its defenders and critics, and the dangers involved. The Jewish perspective relating to the subject is presented based on classical Jewish sources, which we trust may enrich modern bioethical debates. In Jewish law, the fetus acquires full legal status only after birth. However, while the lives of terminally ill neonates must in no way be actively destroyed or shortened, there is no obligation to make extraordinary efforts to prolong their lives. Accurate preimplantation or prenatal diagnosis might significantly reduce the incidence of nonviable births, but active killing of infants violates the basic foundations of Jewish law, and opens the 'slippery slope' for uncontrolled abuse. Therefore, we call upon the international medical and bioethical community to reject the Groningen Protocol that permits euthanization and to develop ethical guidelines for the optimal care of severely compromised neonates. Copyright 2009 S. Karger AG, Basel.

  19. An Individualized, Perception-Based Protocol to Investigate Human Physiological Responses to Cooling

    Science.gov (United States)

    Coolbaugh, Crystal L.; Bush, Emily C.; Galenti, Elizabeth S.; Welch, E. Brian; Towse, Theodore F.

    2018-01-01

    Cold exposure, a known stimulant of the thermogenic effects of brown adipose tissue (BAT), is the most widely used method to study BAT physiology in adult humans. Recently, individualized cooling has been recommended to standardize the physiological cold stress applied across participants, but critical experimental details remain unclear. The purpose of this work was to develop a detailed methodology for an individualized, perception-based protocol to investigate human physiological responses to cooling. Participants were wrapped in two water-circulating blankets and fitted with skin temperature probes to estimate BAT activity and peripheral vasoconstriction. We created a thermoesthesia graphical user interface (tGUI) to continuously record the subject's perception of cooling and shivering status during the cooling protocol. The protocol began with a 15 min thermoneutral phase followed by a series of 10 min cooling phases and concluded when sustained shivering (>1 min duration) occurred. Researchers used perception of cooling feedback (tGUI ratings) to manually adjust and personalize the water temperature at each cooling phase. Blanket water temperatures were recorded continuously during the protocol. Twelve volunteers (ages: 26.2 ± 1.4 years; 25% female) completed a feasibility study to evaluate the proposed protocol. Water temperature, perception of cooling, and shivering varied considerably across participants in response to cooling. Mean clavicle skin temperature, a surrogate measure of BAT activity, decreased (−0.99°C, 95% CI: −1.7 to −0.25°C, P = 0.16) after the cooling protocol, but an increase in supraclavicular skin temperature was observed in 4 participants. A strong positive correlation was also found between thermoesthesia and peripheral vasoconstriction (ρ = 0.84, P < 0.001). The proposed individualized, perception-based protocol therefore has potential to investigate the physiological responses to cold stress applied across populations with

  20. An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2017-01-01

    Full Text Available The Neighbor Discovery Protocol (NDP is one of the main protocols in the Internet Protocol version 6 (IPv6 suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN, such as address autoconfiguration and address resolution. However, it has many vulnerabilities that can be used by malicious nodes to launch attacks, because the NDP messages are easily spoofed without protection. Surrounding this problem, many solutions have been proposed for securing NDP, but these solutions either proposed new protocols that need to be supported by all nodes or built mechanisms that require the cooperation of all nodes, which is inevitable in the traditional distributed networks. Nevertheless, Software-Defined Networking (SDN provides a new perspective to think about protecting NDP. In this paper, we proposed an SDN-based authentication mechanism to verify the identity of NDP packets transmitted in a LAN. Using the centralized control and programmability of SDN, it can effectively prevent the spoofing attacks and other derived attacks based on spoofing. In addition, this mechanism needs no additional protocol supporting or configuration at hosts and routers and does not introduce any dedicated devices.

  1. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    Science.gov (United States)

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  2. A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huifang Chen

    2013-11-01

    Full Text Available Due to the characteristics of underwater acoustic channel, media access control (MAC protocols designed for underwater acoustic sensor networks (UWASNs are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA CDMA MAC (POCA-CDMA-MAC, is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA or receiver-oriented code assignment (ROCA. Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  3. Comparison of PCR-Based Diagnosis with Centrifuged-Based Enrichment Method for Detection of Borrelia persica in Animal Blood Samples.

    Science.gov (United States)

    Naddaf, S R; Kishdehi, M; Siavashi, Mr

    2011-01-01

    The mainstay of diagnosis of relapsing fever (RF) is demonstration of the spirochetes in Giemsa-stained thick blood smears, but during non fever periods the bacteria are very scanty and rarely detected in blood smears by microscopy. This study is aimed to evaluate the sensitivity of different methods developed for detection of low-grade spirochetemia. Animal blood samples with low degrees of spirochetemia were tested with two PCRs and a nested PCR targeting flaB, GlpQ, and rrs genes. Also, a centrifuged-based enrichment method and Giemsa staining were performed on blood samples with various degrees of spirochetemia. The flaB-PCR and nested rrs-PCR turned positive with various degrees of spirochetemia including the blood samples that turned negative with dark-field microscopy. The GlpQ-PCR was positive as far as at least one spirochete was seen in 5-10 microscopic fields. The sensitivity of GlpQ-PCR increased when DNA from Buffy Coat Layer (BCL) was used as template. The centrifuged-based enrichment method turned positive with as low concentration as 50 bacteria/ml blood, while Giemsa thick staining detected bacteria with concentrations ≥ 25000 bacteria/ml. Centrifuged-based enrichment method appeared as much as 500-fold more sensitive than thick smears, which makes it even superior to some PCR assays. Due to simplicity and minimal laboratory requirements, this method can be considered a valuable tool for diagnosis of RF in rural health centers.

  4. Enriching semantic knowledge bases for opinion mining in big data applications

    OpenAIRE

    Weichselbraun, A.; Gindl, S.; Scharl, A.

    2014-01-01

    This paper presents a novel method for contextualizing and enriching large semantic knowledge bases for opinion mining with a focus on Web intelligence platforms and other high-throughput big data applications. The method is not only applicable to traditional sentiment lexicons, but also to more comprehensive, multi-dimensional affective resources such as SenticNet. It comprises the following steps: (i) identify ambiguous sentiment terms, (ii) provide context information extracted from a doma...

  5. Three-dimensional ordered titanium dioxide-zirconium dioxide film-based microfluidic device for efficient on-chip phosphopeptide enrichment.

    Science.gov (United States)

    Zhao, De; He, Zhongyuan; Wang, Gang; Wang, Hongzhi; Zhang, Qinghong; Li, Yaogang

    2016-09-15

    Microfluidic technology plays a significant role in separating biomolecules, because of its miniaturization, integration, and automation. Introducing micro/nanostructured functional materials can improve the properties of microfluidic devices, and extend their application. Inverse opal has a three-dimensional ordered net-like structure. It possesses a large surface area and exhibits good mass transport, making it a good candidate for bio-separation. This study exploits inverse opal titanium dioxide-zirconium dioxide films for on-chip phosphopeptide enrichment. Titanium dioxide-zirconium dioxide inverse opal film-based microfluidic devices were constructed from templates of 270-, 340-, and 370-nm-diameter poly(methylmethacrylate) spheres. The phosphopeptide enrichments of these devices were determined by matrix-assisted laser desorption/ionization time-of-flight (MALDI-TOF) mass spectrometry. The device constructed from the 270-nm-diameter sphere template exhibited good comprehensive phosphopeptide enrichment, and was the best among these three devices. Because the size of opal template used in construction was the smallest, the inverse opal film therefore had the smallest pore sizes and the largest surface area. Enrichment by this device was also better than those of similar devices based on nanoparticle films and single component films. The titanium dioxide-zirconium dioxide inverse opal film-based device provides a promising approach for the efficient separation of various biomolecules. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. Lightweight UDP Pervasive Protocol in Smart Home Environment Based on Labview

    Science.gov (United States)

    Kurniawan, Wijaya; Hannats Hanafi Ichsan, Mochammad; Rizqika Akbar, Sabriansyah; Arwani, Issa

    2017-04-01

    TCP (Transmission Control Protocol) technology in a reliable environment was not a problem, but not in an environment where the entire Smart Home network connected locally. Currently employing pervasive protocols using TCP technology, when data transmission is sent, it would be slower because they have to perform handshaking process in advance and could not broadcast the data. On smart home environment, it does not need large size and complex data transmission between monitoring site and monitoring center required in Smart home strain monitoring system. UDP (User Datagram Protocol) technology is quick and simple on data transmission process. UDP can broadcast messages because the UDP did not require handshaking and with more efficient memory usage. LabVIEW is a programming language software for processing and visualization of data in the field of data acquisition. This paper proposes to examine Pervasive UDP protocol implementations in smart home environment based on LabVIEW. UDP coded in LabVIEW and experiments were performed on a PC and can work properly.

  7. An XML-based communication protocol for accelerator distributed controls

    International Nuclear Information System (INIS)

    Catani, L.

    2008-01-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding

  8. An XML-based communication protocol for accelerator distributed controls

    Energy Technology Data Exchange (ETDEWEB)

    Catani, L. [INFN-Roma Tor Vergata, Rome (Italy)], E-mail: luciano.catani@roma2.infn.it

    2008-03-01

    This paper presents the development of XMLvRPC, an RPC-like communication protocol based, for this particular application, on the TCP/IP and XML (eXtensible Markup Language) tools built-in in LabVIEW. XML is used to format commands and data passed between client and server while socket interface for communication uses either TCP or UDP transmission protocols. This implementation extends the features of these general purpose libraries and incorporates solutions that might provide, with limited modifications, full compatibility with well established and more general communication protocol, i.e. XML-RPC, while preserving portability to different platforms supported by LabVIEW. The XMLvRPC suite of software has been equipped with specific tools for its deployment in distributed control systems as, for instance, a quasi-automatic configuration and registration of the distributed components and a simple plug-and-play approach to the installation of new services. Key feature is the management of large binary arrays that allow coding of large binary data set, e.g. raw images, more efficiently with respect to the standard XML coding.

  9. Foraging-Based Enrichment Promotes More Varied Behaviour in Captive Australian Fur Seals (Arctocephalus pusillus doriferus)

    Science.gov (United States)

    Hocking, David P.; Salverson, Marcia; Evans, Alistair R.

    2015-01-01

    During wild foraging, Australian fur seals (Arctocephalus pusillus doriferus) encounter many different types of prey in a wide range of scenarios, yet in captive environments they are typically provided with a narrower range of opportunities to display their full repertoire of behaviours. This study aimed to quantitatively explore the effect of foraging-based enrichment on the behaviour and activity patterns displayed by two captive Australian fur seals at Melbourne Zoo, Australia. Food was presented as a scatter in open water, in a free-floating ball device, or in a static box device, with each treatment separated by control trials with no enrichment. Both subjects spent more time interacting with the ball and static box devices than the scatter feed. The total time spent pattern swimming was reduced in the enrichment treatments compared to the controls, while the time spent performing random swimming behaviours increased. There was also a significant increase in the total number of bouts of behaviour performed in all three enrichment treatments compared to controls. Each enrichment method also promoted a different suit of foraging behaviours. Hence, rather than choosing one method, the most effective way to increase the diversity of foraging behaviours, while also increasing variation in general activity patterns, is to provide seals with a wide range of foraging scenarios where food is encountered in different ways. PMID:25946412

  10. ABORt: Acknowledgement-Based Opportunistic Routing Protocol for High Data Rate Multichannel WSNs

    Directory of Open Access Journals (Sweden)

    Hamadoun Tall

    2017-10-01

    Full Text Available The ease of deployment and the auto-configuration capabilities of Wireless Sensor Networks (WSNs make them very attractive in different domains like environmental, home automation or heath care applications. The use of multichannel communications in WSNs helps to improve the overall performance of the network. However, in heavy traffic scenarios, routing protocols should be adapted to allow load balancing and to avoid losing data packets due to congestion and queue overflow. In this paper, we present an Acknowledgement-Based Opportunistic Routing (ABORt protocol designed for high data rate multichannel WSNs. It is a low overhead protocol that does not rely on synchronization for control traffic exchange during the operational phase of the network. ABORt is an opportunistic protocol that relies on link layer acknowledgements to disseminate routing metrics, which helps to reduce overhead. The performance of ABORt is evaluated using the Cooja simulator and the obtained results show that ABORt has a high packet delivery ratio with reduced packet end-to-end delay compared to two single channel routing protocols and two multichannel routing protocols that use number of hops and expected transmission count as routing metrics.

  11. Optimization of PWR fuel assembly radial enrichment and burnable poison location based on adaptive simulated annealing

    International Nuclear Information System (INIS)

    Rogers, Timothy; Ragusa, Jean; Schultz, Stephen; St Clair, Robert

    2009-01-01

    The focus of this paper is to present a concurrent optimization scheme for the radial pin enrichment and burnable poison location in PWR fuel assemblies. The methodology is based on the Adaptive Simulated Annealing (ASA) technique, coupled with a neutron lattice physics code to update the cost function values. In this work, the variations in the pin U-235 enrichment are variables to be optimized radially, i.e., pin by pin. We consider the optimization of two categories of fuel assemblies, with and without Gadolinium burnable poison pins. When burnable poisons are present, both the radial distribution of enrichment and the poison locations are variables in the optimization process. Results for 15 x 15 PWR fuel assembly designs are provided.

  12. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  13. Centrifuge enrichment program

    International Nuclear Information System (INIS)

    Astley, E.R.

    1976-01-01

    Exxon Nuclear has been active in privately funded research and development of centrifuge enrichment technology since 1972. In October of 1975, Exxon Nuclear submitted a proposal to design, construct, and operate a 3000-MT SWU/yr centrifuge enrichment plant, under the provisions of the proposed Nuclear Fuel Assurance Act of 1975. The U.S. Energy Research and Development Administration (ERDA) accepted the proposal as a basis for negotiation. It was proposed to build a 1000-MT SWU/yr demonstration increment to be operational in 1982; and after successful operation for about one year, expand the facilities into a 3000-MT SWU/yr plant. As part of the overall centrifuge enrichment plant, a dedicated centrifuge manufacturing plant would be constructed; sized to support the full 3000-MT SWU/yr plant. The selection of the centrifuge process by Exxon Nuclear was based on an extremely thorough evaluation of current and projected enrichment technology; results show that the technology is mature and the process will be cost effective. The substantial savings in energy (about 93%) from utilization of the centrifuge option rather than gaseous diffusion is a compelling argument. As part of this program, Exxon Nuclear has a large hardware R and D program, plus a prototype centrifuge manufacturing capability in Malta, New York. To provide a full-scale machine and limited cascade test capability, Exxon Nuclear is constructing a $4,000,000 Centrifuge Test Facility in Richland, Washington. This facility was to initiate operations in the Fall of 1976. Exxon Nuclear is convinced that the centrifuge enrichment process is the rational selection for emergence of a commercial enrichment industry

  14. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    OpenAIRE

    Wei, Songjie; Li, Shuai; Liu, Peilong; Liu, Meilin

    2018-01-01

    LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively...

  15. A Summary of Actinide Enrichment Technologies and Capability Gaps

    Energy Technology Data Exchange (ETDEWEB)

    Patton, Bradley D. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Robinson, Sharon M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-01-01

    The evaluation performed in this study indicates that a new program is needed to efficiently provide a national actinide radioisotope enrichment capability to produce milligram-to-gram quantities of unique materials for user communities. This program should leverage past actinide enrichment, the recent advances in stable isotope enrichment, and assessments of the future requirements to cost effectively develop this capability while establishing an experience base for a new generation of researchers in this vital area. Preliminary evaluations indicate that an electromagnetic isotope separation (EMIS) device would have the capability to meet the future needs of the user community for enriched actinides. The EMIS technology could be potentially coupled with other enrichment technologies, such as irradiation, as pre-enrichment and/or post-enrichment systems to increase the throughput, reduce losses of material, and/or reduce operational costs of the base EMIS system. Past actinide enrichment experience and advances in the EMIS technology applied in stable isotope separations should be leveraged with this new evaluation information to assist in the establishment of a domestic actinide radioisotope enrichment capability.

  16. Leader-Following Consensus Stability of Discrete-Time Linear Multiagent Systems with Observer-Based Protocols

    Directory of Open Access Journals (Sweden)

    Bingbing Xu

    2013-01-01

    Full Text Available We consider the leader-following consensus problem of discrete-time multiagent systems on a directed communication topology. Two types of distributed observer-based consensus protocols are considered to solve such a problem. The observers involved in the proposed protocols include full-order observer and reduced-order observer, which are used to reconstruct the state variables. Two algorithms are provided to construct the consensus protocols, which are based on the modified discrete-time algebraic Riccati equation and Sylvester equation. In light of graph and matrix theory, some consensus conditions are established. Finally, a numerical example is provided to illustrate the obtained result.

  17. Specific Affinity Enrichment of Electrochemically Cleaved Peptides Based on Cu(II)-Mediated Spirolactone Tagging

    NARCIS (Netherlands)

    Zhang, Tao; de Vries, Marcel P.; Permentier, Hjalmar P.; Bischoff, Rainer

    2017-01-01

    Specific digestion of proteins is an essential step for mass spectrometry-based proteomics, and the chemical labeling of the resulting peptides is often used for peptide enrichment or the introduction of desirable tags. Electrochemical oxidation yielding specific cleavage C-terminal to tyrosine

  18. Omega-3 Polyunsaturated Fatty Acids Enriched Hen Eggs Consumption Enhances Microvascular Reactivity in Young Healthy Individuals.

    Science.gov (United States)

    Stupin, Ana; Rasic, Lidija; Matic, Anita; Stupin, Marko; Kralik, Zlata; Kralik, Gordana; Grcevic, Manuela; Drenjancevic, Ines

    2018-04-10

    Whilst the beneficial effect of omega-3 polyunsaturated fatty acids (PUFAs) supplementation on cardiovascular (CV) system is well supported in CV patients, the effect of consumption of omega-3 PUFAs enriched functional food in healthy individuals is still not fully elucidated. This study aimed to determine the effect of consumption of omega-3 PUFAs enriched hen eggs on microvascular reactivity (primary outcome), blood pressure (BP) and serum lipid profile in young healthy individuals. Control group (N=16) ate three ordinary hen eggs (277 mg omega-3 PUFAs/day), and OMEGA-3 group (N=20) ate three omega-3 PUFAs enriched eggs containing 259 mg of omega-3 PUFAs/egg daily (ALA 167 mg/egg, EPA 7 mg/egg, DHA 84 mg/egg) for 3 weeks (777 mg omega-3 PUFAs/day). Post-occlusive reactive hyperemia (PORH) in skin microcirculation assessed by laser Doppler flowmetry, serum lipid profile, fasting blood glucose, high-sensitivity C-reactive protein (hsCRP) and arterial BP were measured in all subjects before and after the protocol. PORH was significantly enhanced, and triglycerides, hsCRP and BP were significantly decreased in OMEGA-3 group compared to baseline measurement, while there was no significant difference in Control group after the protocol compared to baseline. This is the first study to demonstrate that consumption of a mixture of omega-3 PUFAs (ALA+EPA+DHA), provided via enriched hen eggs, elicits changes in microvascular reactivity, BP and triglycerides level in healthy subjects that are associated with CV benefits, thus suggesting that daily consumption of omega-3 PUFAs enriched eggs in healthy individuals may potentially contribute to CV risk factors attenuation and disease prevention.

  19. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Osama Moh’d Alia

    2014-01-01

    Full Text Available Energy conservation in wireless sensor networks (WSNs is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network’s lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  20. A decentralized fuzzy C-means-based energy-efficient routing protocol for wireless sensor networks.

    Science.gov (United States)

    Alia, Osama Moh'd

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols.

  1. A Decentralized Fuzzy C-Means-Based Energy-Efficient Routing Protocol for Wireless Sensor Networks

    Science.gov (United States)

    2014-01-01

    Energy conservation in wireless sensor networks (WSNs) is a vital consideration when designing wireless networking protocols. In this paper, we propose a Decentralized Fuzzy Clustering Protocol, named DCFP, which minimizes total network energy dissipation to promote maximum network lifetime. The process of constructing the infrastructure for a given WSN is performed only once at the beginning of the protocol at a base station, which remains unchanged throughout the network's lifetime. In this initial construction step, a fuzzy C-means algorithm is adopted to allocate sensor nodes into their most appropriate clusters. Subsequently, the protocol runs its rounds where each round is divided into a CH-Election phase and a Data Transmission phase. In the CH-Election phase, the election of new cluster heads is done locally in each cluster where a new multicriteria objective function is proposed to enhance the quality of elected cluster heads. In the Data Transmission phase, the sensing and data transmission from each sensor node to their respective cluster head is performed and cluster heads in turn aggregate and send the sensed data to the base station. Simulation results demonstrate that the proposed protocol improves network lifetime, data delivery, and energy consumption compared to other well-known energy-efficient protocols. PMID:25162060

  2. Pros and cons of methylation-based enrichment methods for ancient DNA

    Science.gov (United States)

    Seguin-Orlando, Andaine; Gamba, Cristina; Sarkissian, Clio Der; Ermini, Luca; Louvel, Guillaume; Boulygina, Eugenia; Sokolov, Alexey; Nedoluzhko, Artem; Lorenzen, Eline D.; Lopez, Patricio; McDonald, H. Gregory; Scott, Eric; Tikhonov, Alexei; Stafford,, Thomas W.; Alfarhan, Ahmed H.; Alquraishi, Saleh A.; Al-Rasheid, Khaled A. S.; Shapiro, Beth; Willerslev, Eske; Prokhortchouk, Egor; Orlando, Ludovic

    2015-01-01

    The recent discovery that DNA methylation survives in fossil material provides an opportunity for novel molecular approaches in palaeogenomics. Here, we apply to ancient DNA extracts the probe-independent Methylated Binding Domains (MBD)-based enrichment method, which targets DNA molecules containing methylated CpGs. Using remains of a Palaeo-Eskimo Saqqaq individual, woolly mammoths, polar bears and two equine species, we confirm that DNA methylation survives in a variety of tissues, environmental contexts and over a large temporal range (4,000 to over 45,000 years before present). MBD enrichment, however, appears principally biased towards the recovery of CpG-rich and long DNA templates and is limited by the fast post-mortem cytosine deamination rates of methylated epialleles. This method, thus, appears only appropriate for the analysis of ancient methylomes from very well preserved samples, where both DNA fragmentation and deamination have been limited. This work represents an essential step toward the characterization of ancient methylation signatures, which will help understanding the role of epigenetic changes in past environmental and cultural transitions. PMID:26134828

  3. Performance Evaluation of a Cluster-Based Service Discovery Protocol for Heterogeneous Wireless Sensor Networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2006-01-01

    Abstract—This paper evaluates the performance in terms of resource consumption of a service discovery protocol proposed for heterogeneous Wireless Sensor Networks (WSNs). The protocol is based on a clustering structure, which facilitates the construction of a distributed directory. Nodes with higher

  4. Intervention mapping protocol for developing a theory-based diabetes self-management education program.

    Science.gov (United States)

    Song, Misoon; Choi, Suyoung; Kim, Se-An; Seo, Kyoungsan; Lee, Soo Jin

    2015-01-01

    Development of behavior theory-based health promotion programs is encouraged with the paradigm shift from contents to behavior outcomes. This article describes the development process of the diabetes self-management program for older Koreans (DSME-OK) using intervention mapping (IM) protocol. The IM protocol includes needs assessment, defining goals and objectives, identifying theory and determinants, developing a matrix to form change objectives, selecting strategies and methods, structuring the program, and planning for evaluation and pilot testing. The DSME-OK adopted seven behavior objectives developed by the American Association of Diabetes Educators as behavioral outcomes. The program applied an information-motivation-behavioral skills model, and interventions were targeted to 3 determinants to change health behaviors. Specific methods were selected to achieve each objective guided by IM protocol. As the final step, program evaluation was planned including a pilot test. The DSME-OK was structured as the 3 determinants of the IMB model were intervened to achieve behavior objectives in each session. The program has 12 weekly 90-min sessions tailored for older adults. Using the IM protocol in developing a theory-based self-management program was beneficial in terms of providing a systematic guide to developing theory-based and behavior outcome-focused health education programs.

  5. Inquiry-Based Science and Technology Enrichment Program for Middle School-Aged Female Students

    Science.gov (United States)

    Kim, Hanna

    2016-01-01

    This study investigates the effects of an intensive 1-week Inquiry-Based Science and Technology Enrichment Program (InSTEP) designed for middle school-aged female students. InSTEP uses a guided/open inquiry approach that is deepened and redefined as eight sciences and engineering practices in the Next Generation Science Standards, which aimed at…

  6. A statistical frame based TDMA protocol for human body communication.

    Science.gov (United States)

    Nie, Zedong; Li, Zhao; Huang, Renwei; Liu, Yuhang; Li, Jingzhen; Wang, Lei

    2015-07-09

    Human body communication (HBC) using the human body as the transmission medium, which has been regarded as one of the most promising short-range communications in wireless body area networks (WBAN). Compared to the traditional wireless networks, two challenges are existed in HBC based WBAN. (1) Its sensor nodes should be energy saving since it is inconvenient to replace or recharge the battery on these sensor nodes; (2) the coordinator should be able to react dynamically and rapidly to the burst traffic triggered by sensing events. Those burst traffic conditions include vital physical signal (electrocardiogram, electroencephalogram etc.) monitoring, human motion detection (fall detection, activity monitoring, gesture recognition, motion sensing etc.) and so on. To cope with aforementioned challenges, a statistical frame based TDMA (S-TDMA) protocol with multi-constrained (energy, delay, transmission efficiency and emergency management) service is proposed in this paper. The scenarios where burst traffic is often triggered rapidly with low power consumption and low delay is handled in our proposed S-TDMA. A beacon frame with the contained synchronous and poll information is designed to reduce the possibility of collisions of request frames. A statistical frame which broadcasts the unified scheduling information is adopted to avoid packet collisions, idle listening and overhearing. Dynamic time slot allocation mechanism is presented to manage the burst traffic and reduce the active period in each beacon period. An emergency mechanism is proposed for vital signals to be transmitted. The theory analysis is proceed and the result is evaluated in the hardware platform. To verify its feasibility, S-TDMA was fully implemented on our independently-developed HBC platform where four sensor nodes and a coordinator are fastened on a human body. Experiment results show that S-TDMA costs 89.397 mJ every 20 s when the payload size is 122 bytes, 9.51% lower than Lightweight MAC

  7. Optimal CO2 Enrichment Considering Emission from Soil for Cucumber Greenhouses

    International Nuclear Information System (INIS)

    Lee, D.H.; Lee, K.S.; Cho, Y.J.; Kim, H.J.; Choi, J.M.; Chung, S.O.

    2012-01-01

    Reducing carbon dioxide (CO2) exhaust has become a major issue for society in the last few years, especially since the initial release of the Kyoto Protocol in 1997 that strictly limited the emissions of greenhouse gas for each country. One of the primary sectors affecting the levels of atmospheric greenhouse gases is agriculture where CO2 is not only consumed by plants but also produced from various types of soil and agricultural ecosystems including greenhouses. In greenhouse cultivation, CO2 concentration plays an essential role in the photosynthesis process of crops. Optimum control of greenhouse CO2 enrichment based on accurate monitoring of the added CO2 can improve profitability through efficient crop production and reduce environmental impact, compared to traditional management practices. In this study, a sensor-based control system that could estimate the required CO2 concentration considering emission from soil for cucumber greenhouses was developed and evaluated. The relative profitability index (RPI) was defined by the ratio of growth rate to supplied CO2. RPI for a greenhouse controlled at lower set point of CO2 concentration (500 μmol * mol -1 ) was greater than that of greenhouse at higher set point (800 μmol * mol -1 ). Evaluation tests to optimize CO2 enrichment concluded that the developed control system would be applicable not only to minimize over-exhaust of CO2 but also to maintain the crop profitability

  8. Selective enrichment of sialic acid-containing glycopeptides using titanium dioxide chromatography with analysis by HILIC and mass spectrometry

    DEFF Research Database (Denmark)

    Palmisano, Giuseppe; Lendal, Sara Eun; Engholm-Keller, Kasper

    2010-01-01

    -containing glycopeptides is achieved by using a low-pH buffer that contains a substituted acid such as glycolic acid to improve the binding efficiency and selectivity of SA-containing glycopeptides to the TiO(2) resin. By combining TiO(2) enrichment of sialylated glycopeptides with HILIC separation of deglycosylated...... of glycosylation sites and the characterization of glycan structures. In this paper, we describe a protocol for the selective enrichment of SA-containing glycopeptides using a combination of titanium dioxide (TiO(2)) and hydrophilic interaction liquid chromatography (HILIC). The selectivity of TiO(2) toward SA...... peptides, a more comprehensive analysis of formerly sialylated glycopeptides by MS can be achieved. Here we illustrate the efficiency of the method by the identification of 1,632 unique formerly sialylated glycopeptides from 817 sialylated glycoproteins. The TiO(2)/HILIC protocol requires 2 d...

  9. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  10. A Gossip-based Energy Efficient Protocol for Robust In-network Aggregation in Wireless Sensor Networks

    Science.gov (United States)

    Fauji, Shantanu

    We consider the problem of energy efficient and fault tolerant in--network aggregation for wireless sensor networks (WSNs). In-network aggregation is the process of aggregation while collecting data from sensors to the base station. This process should be energy efficient due to the limited energy at the sensors and tolerant to the high failure rates common in sensor networks. Tree based in--network aggregation protocols, although energy efficient, are not robust to network failures. Multipath routing protocols are robust to failures to a certain degree but are not energy efficient due to the overhead in the maintenance of multiple paths. We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip--based protocol for in-network aggregation (GPIA) is based on the spreading of information via gossip. GPIA is not only adaptive to failures and changes in the network topology, but is also energy efficient. Energy efficiency of GPIA comes from all the nodes being capable of selective message reception and detecting convergence of the aggregation early. We experimentally show that GPIA provides significant improvement over some other competitors like the Ridesharing, Synopsis Diffusion and the pure version of gossip. GPIA shows ten fold, five fold and two fold improvement over the pure gossip, the synopsis diffusion and Ridesharing protocols in terms of network lifetime, respectively. Further, GPIA retains gossip's robustness to failures and improves upon the accuracy of synopsis diffusion and Ridesharing.

  11. Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks – Tabuk Flood Monitoring System Case Study

    Directory of Open Access Journals (Sweden)

    Ammar Babiker

    2017-10-01

    Full Text Available Energy efficiency has been considered as the most important issue in wireless sensor networks. As in many applications, wireless sensors are scattered in a wide harsh area, where the battery replacement or charging will be quite difficult and it is the most important challenge. Therefore, the design of energy saving mechanism becomes mandatory in most recent research. In this paper, a new energy efficient clustered routing protocol is proposed: the proposed protocol is based on analyzing the data collected from the sensors in a base-station. Based on this analysis the cluster head will be selected as the one with the most useful data. Then, a variable time slot is specified to each sensor to minimize the transmission of repetitive and un-useful data. The proposed protocol Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks (DCRP was compared with the famous energy efficient LEACH protocol and also with one of the recent energy efficient routing protocols named Position Responsive Routing Protocol (PRRP. DCRP has been used in monitoring the floods in Tabuk area –Saudi Arabia. It shows comparatively better results.

  12. A Secure Protocol Based on a Sedentary Agent for Mobile Agent Environments

    OpenAIRE

    Abdelmorhit E. Rhazi; Samuel Pierre; Hanifa Boucheneb

    2007-01-01

    The main challenge when deploying mobile agent environments pertains to security issues concerning mobile agents and their executive platform. This paper proposes a secure protocol which protects mobile agents against attacks from malicious hosts in these environments. Protection is based on the perfect cooperation of a sedentary agent running inside a trusted third host. Results show that the protocol detects several attacks, such as denial of service, incorrect execution and re-execution of...

  13. Environmental enrichment for aquatic animals.

    Science.gov (United States)

    Corcoran, Mike

    2015-05-01

    Aquatic animals are the most popular pets in the United States based on the number of owned pets. They are popular display animals and are increasingly used in research settings. Enrichment of captive animals is an important element of zoo and laboratory medicine. The importance of enrichment for aquatic animals has been slower in implementation. For a long time, there was debate over whether or not fish were able to experience pain or form long-term memories. As that debate has reduced and the consciousness of more aquatic animals is accepted, the need to discuss enrichment for these animals has increased. Copyright © 2015 Elsevier Inc. All rights reserved.

  14. A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network

    Science.gov (United States)

    Han, Zhao; Wu, Jie; Zhang, Jie; Liu, Liefeng; Tian, Kaiyun

    2014-04-01

    Wireless sensor network (WSN) is a system composed of a large number of low-cost micro-sensors. This network is used to collect and send various kinds of messages to a base station (BS). WSN consists of low-cost nodes with limited battery power, and the battery replacement is not easy for WSN with thousands of physically embedded nodes, which means energy efficient routing protocol should be employed to offer a long-life work time. To achieve the aim, we need not only to minimize total energy consumption but also to balance WSN load. Researchers have proposed many protocols such as LEACH, HEED, PEGASIS, TBC and PEDAP. In this paper, we propose a General Self-Organized Tree-Based Energy-Balance routing protocol (GSTEB) which builds a routing tree using a process where, for each round, BS assigns a root node and broadcasts this selection to all sensor nodes. Subsequently, each node selects its parent by considering only itself and its neighbors' information, thus making GSTEB a dynamic protocol. Simulation results show that GSTEB has a better performance than other protocols in balancing energy consumption, thus prolonging the lifetime of WSN.

  15. A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism

    Directory of Open Access Journals (Sweden)

    Zhicai Shi

    2017-07-01

    Full Text Available A Radio Frequency Identification (RFID grouping-proof protocol is to generate an evidence of the simultaneous existence of a group of tags and it has been applied to many different fields. For current grouping-proof protocols, there still exist some flaws such as low grouping-proof efficiency, being vulnerable to trace attack and information leakage. To improve the secure performance and efficiency, we propose a lightweight RFID grouping-proof protocol based on parallel mode and DHCP (Dynamic Host Configuration Protocol mechanism. Our protocol involves multiple readers and multiple tag groups. During the grouping-proof period, one reader and one tag group are chosen by the verifier by means of DHCP mechanism. When only a part of the tags of the chosen group exist, the protocol can also give the evidence of their co-existence. Our protocol utilizes parallel communication mode between reader and tags so as to ensure its grouping-proof efficiency. It only uses Hash function to complete the mutual authentication among verifier, readers and tags. It can preserve the privacy of the RFID system and resist the attacks such as eavesdropping, replay, trace and impersonation. Therefore the protocol is secure, flexible and efficient. It only uses some lightweight operations such as Hash function and a pseudorandom number generator. Therefore it is very suitable to some low-cost RFID systems.

  16. Filter-Adapted Fluorescent In Situ Hybridization (FA-FISH) for Filtration-Enriched Circulating Tumor Cells.

    Science.gov (United States)

    Oulhen, Marianne; Pailler, Emma; Faugeroux, Vincent; Farace, Françoise

    2017-01-01

    Circulating tumor cells (CTCs) may represent an easily accessible source of tumor material to assess genetic aberrations such as gene-rearrangements or gene-amplifications and screen cancer patients eligible for targeted therapies. As the number of CTCs is a critical parameter to identify such biomarkers, we developed fluorescent in situ hybridization (FISH) for CTCs enriched on filters (filter-adapted-FISH, FA-FISH). Here, we describe the FA-FISH protocol, the combination of immunofluorescent staining (DAPI/CD45) and FA-FISH techniques, as well as the semi-automated microscopy method that we developed to improve the feasibility and reliability of FISH analyses in filtration-enriched CTC.

  17. Civilian inventories of plutonium and highly enriched uranium

    International Nuclear Information System (INIS)

    Albright, D.

    1987-01-01

    In the future, commercial laser isotope enrichment technologies, currently under development, could make it easier for national to produce highly enriched uranium secretly. The head of a US firm that is developing a laser enrichment process predicts that in twenty years, major utilities and small countries will have relatively small, on-site, laser-based uranium enrichment facilities. Although these plants will be designed for the production of low enriched uranium, they could be modified to produce highly enriched uranium, an option that raises the possibility of countries producing highly enriched uranium in small, easily hidden facilities. Against this background, most of this report describes the current and future quantities of plutonium and highly enriched uranium in the world, their forms, the facilities in which they are produced, stored, and used, and the extent to which they are transported. 5 figures, 10 tables

  18. Individual differences in the forced swimming test and the effect of environmental enrichment: searching for an interaction.

    Science.gov (United States)

    Sequeira-Cordero, A; Mora-Gallegos, A; Cuenca-Berger, P; Fornaguera-Trías, J

    2014-04-18

    Animals with low and high immobility in the forced swimming test (FST) differ in a number of neurobehavioral factors. A growing body of evidence suggests that the exposure to enriched environments mediates a number of changes in the brain. Therefore, we studied if animals' individuality can somehow modulate the response to environmental stimuli. Male rats were classified according to their immobility time scores in the FST test session as animals with low, medium or high immobility. Then, rats from groups with low and high immobility were randomly distributed in two groups to be reared in different housing conditions (i.e., enriched and standard conditions) during 8weeks. Animals were subjected to the open field test (OFT) before and 6weeks after the start of housing protocol. Rats with high immobility in the FST also showed high ambulation and high rearing time in the first OFT. Such findings were not observed in the second OFT. Conversely, an effect of environmental enrichment was found in the second OFT where enriched animals showed lower ambulation and higher grooming time than the standard control group. Rats were sacrificed after the housing protocol and neurochemical content and/or gene expression were studied in three different brain regions: the prefrontal cortex, the hippocampus and the nucleus accumbens. Rats with low immobility showed significantly higher accumbal 5-HT levels than animals with high immobility, whereas no neurochemical differences were observed between enriched and standard animals. Regarding expression data, however, an effect of enrichment on accumbal corticotropin-releasing factor (CRF) and its receptor 1 (CRFR1) levels was observed, and such effect depended on immobility levels. Thus, our results not only allowed us to identify a number of differences between animals with low and high immobility or animals housed in standard and enriched conditions, but also suggested that animals' individuality modulated in some way the response to

  19. Botulinum toxin type a injections for cervical and shoulder girdle myofascial pain using an enriched protocol design.

    Science.gov (United States)

    Nicol, Andrea L; Wu, Irene I; Ferrante, F Michael

    2014-06-01

    Myofascial pain syndrome is a regional condition of muscle pain and stiffness and is classically characterized by the presence of trigger points in affected musculature. Botulinum toxin type A (BoNT-A) has been shown to have antinociceptive properties and elicit sustained muscle relaxation, thereby possibly affording even greater relief than traditional strategies. Our goal was to determine whether direct injection of BoNT-A into painful muscle groups is effective for cervical and shoulder girdle myofascial pain. An enriched protocol design was used, wherein 114 patients with cervical and shoulder girdle myofascial pain underwent injection of BoNT-A to determine their response to the drug. Fifty-four responders were then enrolled in a 12-week, randomized, double-blind, placebo-controlled trial. Pain scales and quality of life measures were assessed at baseline and at routine follow-up visits until completion of the study after 26 weeks. Injection of BoNT-A into painful muscle groups improved average visual numerical pain scores in subjects who received a second dose of BoNT-A compared to placebo (P = 0.019 [0.26, 2.78]). Subjects who received a second dose of BoNT-A had a reduced number of headaches per week (P = 0.04 [0.07, 4.55]). Brief Pain Inventory interference scores for general activity and sleep were improved (P = 0.046 [0.038, 3.700] and 0.02 [0.37, 4.33], respectively) in those who received a second dose of BoNT-A. BoNT-A injected directly into painful muscle groups improves average pain scores and certain aspects of quality of life in patients experiencing severe cervical and shoulder girdle myofascial pain.

  20. A Technology Based Program That Matches Enrichment Resources With Student Strengths

    Directory of Open Access Journals (Sweden)

    J.S. Renzulli

    2007-09-01

    Full Text Available Remarkable advances in instructionalcommunication technology (ICT have now made ispossible to provide high levels of enrichment and thekinds of curricular differentiation that facilitateadvanced learning services to students who have accessto a computer and the Internet. But in order tomaximize the potential if ICT it is necessary to constructprograms that are based on learning theory that goesbeyond the didactic and prescriptive models that haveresulted in too much worksheets-on-line and electronicencyclopedias. The Renzulli Learning System (RLSuses a strength-based learning theory called theEnrichment Triad Model that is purposefully designedto promote advanced level learning, creativeproductivity, and high levels of student engagement byfocusing on the application of knowledge rather than themere acquisition and storage of information.The Renzulli Learning System is acomprehensive program that begins by providing acomputer-generated profile of each student’s academicstrengths, interests, learning styles, and preferred modesof expression. A search engine then matches Internetresources to the student’s profile from fourteen carefullyscreened data bases that are categorized by subject area,grade level, state curricular standards, and degree ofcomplexity. There are also hundreds of enrichmentactivities that can be down loaded and reproduced forindividual or group learning activities. A managementsystem called the Wizard Project Maker guides studentsin the application of knowledge to teacher or studentselected assignments, independent research studies, orcreative projects that individuals or small groups wouldlike to pursue. Students and teachers can evaluate thequality of students’ products using a rubric called TheStudent Product Assessment Form. Students can rateeach site visited, conduct a self-assessment of what theyhave gained from the site, and place resources in theirown Total talent Portfolio for future use. RLS alsoincludes a

  1. Negative enrichment by immunomagnetic nanobeads for unbiased characterization of circulating tumor cells from peripheral blood of cancer patients

    Directory of Open Access Journals (Sweden)

    Tinhofer Ingeborg

    2011-05-01

    Full Text Available Abstract Background A limitation of positive selection strategies to enrich for circulating tumor cells (CTCs is that there might be CTCs with insufficient expression of the surface target marker which may be missed by the procedure. We optimized a method for enrichment, subsequent detection and characterization of CTCs based on depletion of the leukocyte fraction. Methods The 2-step protocol was developed for processing 20 mL blood and based on red blood cell lysis followed by leukocyte depletion. The remaining material was stained with the epithelial markers EpCAM and cytokeratin (CK 7/8 or for the melanoma marker HMW-MAA/MCSP. CTCs were detected by flow cytometry. CTCs enriched from blood of patients with carcinoma were defined as EpCAM+CK+CD45-. CTCs enriched from blood of patients with melanoma were defined as MCSP+CD45-. One-hundred-sixteen consecutive blood samples from 70 patients with metastatic carcinomas (n = 48 or metastatic melanoma (n = 22 were analyzed. Results CTCs were detected in 47 of 84 blood samples (56% drawn from carcinoma patients, and in 17 of 32 samples (53% from melanoma patients. CD45-EpCAM-CK+ was detected in pleural effusion specimens, as well as in peripheral blood samples of patients with NSCLC. EpCAM-CK+ cells have been successfully cultured and passaged longer than six months suggesting their neoplastic origin. This was confirmed by CGH. By defining CTCs in carcinoma patients as CD45-CK+ and/or EpCAM+, the detection rate increased to 73% (61/84. Conclusion Enriching CTCs using CD45 depletion allowed for detection of epithelial cancer cells not displaying the classical phenotype. This potentially leads to a more accurate estimation of the number of CTCs. If detection of CTCs without a classical epithelial phenotype has clinical relevance need to be determined.

  2. Automatic Traffic-Based Internet Control Message Protocol (ICMP) Model Generation for ns-3

    Science.gov (United States)

    2015-12-01

    more protocols (especially at different layers of the OSI model ), implementing an inference engine to extract inter- and intrapacket dependencies, and...ARL-TR-7543 ● DEC 2015 US Army Research Laboratory Automatic Traffic-Based Internet Control Message Protocol (ICMP) Model ...ICMP) Model Generation for ns-3 by Jaime C Acosta and Felipe Jovel Survivability/Lethality Analysis Directorate, ARL Felipe Sotelo and Caesar

  3. Compact Modbus TCP/IP protocol for data acquisition systems based on limited hardware resources

    Science.gov (United States)

    Bai, Q.; Jin, B.; Wang, D.; Wang, Y.; Liu, X.

    2018-04-01

    The Modbus TCP/IP has been a standard industry communication protocol and widely utilized for establishing sensor-cloud platforms on the Internet. However, numerous existing data acquisition systems built on traditional single-chip microcontrollers without sufficient resources cannot support it, because the complete Modbus TCP/IP protocol always works dependent on a full operating system which occupies abundant hardware resources. Hence, a compact Modbus TCP/IP protocol is proposed in this work to make it run efficiently and stably even on a resource-limited hardware platform. Firstly, the Modbus TCP/IP protocol stack is analyzed and the refined protocol suite is rebuilt by streamlining the typical TCP/IP suite. Then, specific implementation of every hierarchical layer is respectively presented in detail according to the protocol structure. Besides, the compact protocol is implemented in a traditional microprocessor to validate the feasibility of the scheme. Finally, the performance of the proposed scenario is assessed. The experimental results demonstrate that message packets match the frame format of Modbus TCP/IP protocol and the average bandwidth reaches to 1.15 Mbps. The compact protocol operates stably even based on a traditional microcontroller with only 4-kB RAM and 12-MHz system clock, and no communication congestion or frequent packet loss occurs.

  4. A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Jia Min; Chen Huimin; Yuan Yuhua

    2007-01-01

    This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel, broadcast channel and several data channels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol, the results show that the proposed mechanism improves the average throughput and limits the transmission delay efficiently.

  5. Comparison of PCR-Based Diagnosis with Centrifuged-Based Enrichment Method for Detection of Borrelia Persica in Animal Blood Samples

    Directory of Open Access Journals (Sweden)

    SR Naddaf

    2011-06-01

    Full Text Available Background: The mainstay of diagnosis of relapsing fever (RF is demonstration of the spirochetes in Giemsa-stained thick blood smears, but during non fever periods the bacteria are very scanty and rarely detected in blood smears by mi­cros­copy. This study is aimed to evaluate the sensitivity of different methods developed for detection of low-grade spi­ro­chetemia. Methods: Animal blood samples with low degrees of spirochetemia were tested with two PCRs and a nested PCR tar­get­ing flaB, GlpQ, and rrs genes. Also, a centrifuged-based enrichment method and Giemsa staining were per­formed on blood samples with various degrees of spirochetemia. Results: The flaB-PCR and nested rrs-PCR turned positive with various degrees of spirochetemia including the blood samples that turned negative with dark-field microscopy. The GlpQ-PCR was positive as far as at least one spi­ro­chete was seen in 5-10 microscopic fields. The sensitivity of GlpQ-PCR increased when DNA from Buffy Coat Layer (BCL was used as template. The centrifuged-based enrichment method turned positive with as low concentra­tion as 50 bacteria/ml blood, while Giemsa thick staining detected bacteria with concentrations ≥ 25000 bacteria/ml. Conclusion: Centrifuged-based enrichment method appeared as much as 500-fold more sensitive than thick smears, which makes it even superior to some PCR assays. Due to simplicity and minimal laboratory requirements, this method can be considered a valuable tool for diagnosis of RF in rural health centers.

  6. Comparison of PCR-Based Diagnosis with Centrifuged-Based Enrichment Method for Detection of Borrelia persica in Animal Blood Samples

    Directory of Open Access Journals (Sweden)

    SR Naddaf

    2011-06-01

    Background: The mainstay of diagnosis of relapsing fever (RF is demonstration of the spirochetes in Giemsa-stained thick blood smears, but during non fever periods the bacteria are very scanty and rarely detected in blood smears by mi­cros­copy. This study is aimed to evaluate the sensitivity of different methods developed for detection of low-grade spi­ro­chetemia. Methods: Animal blood samples with low degrees of spirochetemia were tested with two PCRs and a nested PCR tar­get­ing flaB, GlpQ, and rrs genes. Also, a centrifuged-based enrichment method and Giemsa staining were per­formed on blood samples with various degrees of spirochetemia. Results: The flaB-PCR and nested rrs-PCR turned positive with various degrees of spirochetemia including the blood samples that turned negative with dark-field microscopy. The GlpQ-PCR was positive as far as at least one spi­ro­chete was seen in 5-10 microscopic fields. The sensitivity of GlpQ-PCR increased when DNA from Buffy Coat Layer (BCL was used as template. The centrifuged-based enrichment method turned positive with as low concentra­tion as 50 bacteria/ml blood, while Giemsa thick staining detected bacteria with concentrations ≥ 25000 bacteria/ml.  Conclusion: Centrifuged-based enrichment method appeared as much as 500-fold more sensitive than thick smears, which makes it even superior to some PCR assays. Due to simplicity and minimal laboratory requirements, this method can be considered a valuable tool for diagnosis of RF in rural health centers.  

  7. Research and Implementation of Collision Detection Based on Modbus Protocol

    Directory of Open Access Journals (Sweden)

    Yinglan Fang

    2013-01-01

    Full Text Available In order to solve the communication errors resulted by traditional working condition multi-platform device communication using the custom protocol communication and link congestion malpractice brought by retransmission, it ensures network communication using time-sharing communication conflict detection based on mature Modbus protocol. Thereby it enhances the stability of the entire system during operation process, and provides simple, efficient, stable business specification interface for the future expansion of the system. After a comprehensive evaluation and analysis of system communication messages before and after improvement, system comprehensive evaluation target has improved. While the system is more flexible to modular design, develop transparent, structure open side and has a broad application prospects.

  8. Cluster chain based energy efficient routing protocol for moblie WSN

    Directory of Open Access Journals (Sweden)

    WU Ziyu

    2016-04-01

    Full Text Available With the ubiquitous smart devices acting as mobile sensor nodes in the wireless sensor networks(WSNs to sense and transmit physical information,routing protocols should be designed to accommodate the mobility issues,in addition to conventional considerations on energy efficiency.However,due to frequent topology change,traditional routing schemes cannot perform well.Moreover,existence of mobile nodes poses new challenges on energy dissipation and packet loss.In this paper,a novel routing scheme called cluster chain based routing protocol(CCBRP is proposed,which employs a combination of cluster and chain structure to accomplish data collection and transmission and thereafter selects qualified cluster heads as chain leaders to transmit data to the sink.Furthermore,node mobility is handled based on periodical membership update of mobile nodes.Simulation results demonstrate that CCBRP has a good performance in terms of network lifetime and packet delivery,also strikes a better balance between successful packet reception and energy consumption.

  9. In vivo protein quality of selected cereal-based staple foods enriched with soybean proteins

    Directory of Open Access Journals (Sweden)

    Laura Acevedo-Pacheco

    2016-10-01

    Full Text Available Background: One way to diminish protein malnutrition in children is by enriching cereal-based flours for the manufacturing of maize tortillas, wheat flour tortillas, and yeast-leavened breads, which are widely consumed among low socio-economic groups. Objective: The aim was to determine and compare the essential amino acid (EAA scores, protein digestibility corrected amino acid scores (PDCAAS, and in vivo protein quality (protein digestibility, protein efficiency ratio (PER, biological values (BV, and net protein utilization (NPU values of regular versus soybean-fortified maize tortillas, yeast-leavened bread, and wheat flour tortillas. Design: To comparatively assess differences in protein quality among maize tortillas, wheat flour tortillas, and yeast-leavened breads, EAA compositions and in vivo studies with weanling rats were performed. The experimental diets based on regular or soybean-fortified food products were compared with a casein-based diet. Food intake, weight gains, PER, dry matter and protein digestibility, BV, NPU, and PDCAAS were assessed. The soybean-fortified tortillas contained 6% of defatted soybean flour, whereas the yeast-leavened bread flour contained 4.5% of soybean concentrate. Results: The soybean-fortified tortillas and bread contained higher amounts of lysine and tryptophan, which improved their EAA scores and PDCAAS. Rats fed diets based on soybean-fortified maize or wheat tortillas gained considerably more weight and had better BV and NPU values compared with counterparts fed with respective regular products. As a result, fortified maize tortillas and wheat flour tortillas improved PER from 0.73 to 1.64 and 0.69 to 1.77, respectively. The PER improvement was not as evident in rats fed the enriched yeast-leavened bread because the formulation contained sugar that decreased lysine availability possibly to Maillard reactions. Conclusions: The proposed enrichment of cereal-based foods with soybean proteins greatly

  10. The Enriched Effect Calculus: Syntax and Semantics

    DEFF Research Database (Denmark)

    Møgelberg, Rasmus Ejlers; Simpson, Alex; Egger, Jeff

    2014-01-01

    This article introduces the enriched effect calculus, which extends established type theories for computational effects with primitives from linear logic. The new calculus provides a formalism for expressing linear aspects of computational effects; e.g. the linear usage of imperative features....... The second half of the article investigates models for the enriched effect calculus, based on enriched category theory. We give several examples of such models, relating them to models of standard effect calculi (such as those based on monads), and to models of intuitionistic linear logic. We also prove...

  11. IDMA-Based MAC Protocol for Satellite Networks with Consideration on Channel Quality

    Directory of Open Access Journals (Sweden)

    Gongliang Liu

    2014-01-01

    Full Text Available In order to overcome the shortcomings of existing medium access control (MAC protocols based on TDMA or CDMA in satellite networks, interleave division multiple access (IDMA technique is introduced into satellite communication networks. Therefore, a novel wide-band IDMA MAC protocol based on channel quality is proposed in this paper, consisting of a dynamic power allocation algorithm, a rate adaptation algorithm, and a call admission control (CAC scheme. Firstly, the power allocation algorithm combining the technique of IDMA SINR-evolution and channel quality prediction is developed to guarantee high power efficiency even in terrible channel conditions. Secondly, the effective rate adaptation algorithm, based on accurate channel information per timeslot and by the means of rate degradation, can be realized. What is more, based on channel quality prediction, the CAC scheme, combining the new power allocation algorithm, rate scheduling, and buffering strategies together, is proposed for the emerging IDMA systems, which can support a variety of traffic types, and offering quality of service (QoS requirements corresponding to different priority levels. Simulation results show that the new wide-band IDMA MAC protocol can make accurate estimation of available resource considering the effect of multiuser detection (MUD and QoS requirements of multimedia traffic, leading to low outage probability as well as high overall system throughput.

  12. BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys

    Directory of Open Access Journals (Sweden)

    Songjie Wei

    2018-01-01

    Full Text Available LEO constellation has received intensive research attention in the field of satellite communication. The existing centralized authentication protocols traditionally used for MEO/GEO satellite networks cannot accommodate LEO satellites with frequent user connection switching. This paper proposes a fast and efficient access verification protocol named BAVP by combining identity-based encryption and blockchain technology. Two different key management schemes with IBE and blockchain, respectively, are investigated, which further enhance the authentication reliability and efficiency in LEO constellation. Experiments on OPNET simulation platform evaluate and demonstrate the effectiveness, reliability, and fast-switching efficiency of the proposed protocol. For LEO networks, BAVP surpasses the well-known existing solutions with significant advantages in both performance and scalability which are supported by theoretical analysis and simulation results.

  13. AR-RBFS: Aware-Routing Protocol Based on Recursive Best-First Search Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farzad Kiani

    2016-01-01

    Full Text Available Energy issue is one of the most important problems in wireless sensor networks. They consist of low-power sensor nodes and a few base station nodes. They must be adaptive and efficient in data transmission to sink in various areas. This paper proposes an aware-routing protocol based on clustering and recursive search approaches. The paper focuses on the energy efficiency issue with various measures such as prolonging network lifetime along with reducing energy consumption in the sensor nodes and increasing the system reliability. Our proposed protocol consists of two phases. In the first phase (network development phase, the sensors are placed into virtual layers. The second phase (data transmission is related to routes discovery and data transferring so it is based on virtual-based Classic-RBFS algorithm in the lake of energy problem environments but, in the nonchargeable environments, all nodes in each layer can be modeled as a random graph and then begin to be managed by the duty cycle method. Additionally, the protocol uses new topology control, data aggregation, and sleep/wake-up schemas for energy saving in the network. The simulation results show that the proposed protocol is optimal in the network lifetime and packet delivery parameters according to the present protocols.

  14. Uranium enrichment

    International Nuclear Information System (INIS)

    1990-01-01

    This report looks at the following issues: How much Soviet uranium ore and enriched uranium are imported into the United States and what is the extent to which utilities flag swap to disguise these purchases? What are the U.S.S.R.'s enriched uranium trading practices? To what extent are utilities required to return used fuel to the Soviet Union as part of the enriched uranium sales agreement? Why have U.S. utilities ended their contracts to buy enrichment services from DOE?

  15. A Secure Cluster-Based Multipath Routing Protocol for WMSNs

    Directory of Open Access Journals (Sweden)

    Jamal N. Al-Karaki

    2011-04-01

    Full Text Available The new characteristics of Wireless Multimedia Sensor Network (WMSN and its design issues brought by handling different traffic classes of multimedia content (video streams, audio, and still images as well as scalar data over the network, make the proposed routing protocols for typical WSNs not directly applicable for WMSNs. Handling real-time multimedia data requires both energy efficiency and QoS assurance in order to ensure efficient utility of different capabilities of sensor resources and correct delivery of collected information. In this paper, we propose a Secure Cluster-based Multipath Routing protocol for WMSNs, SCMR, to satisfy the requirements of delivering different data types and support high data rate multimedia traffic. SCMR exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths to support timeliness and reliable high data rate multimedia communication with minimum energy dissipation. Also, we present a light-weight distributed security mechanism of key management in order to secure the communication between sensor nodes and protect the network against different types of attacks. Performance evaluation from simulation results demonstrates a significant performance improvement comparing with existing protocols (which do not even provide any kind of security feature in terms of average end-to-end delay, network throughput, packet delivery ratio, and energy consumption.

  16. Measurement of the enrichment of uranium in the pipework of a gas centrifuge enrichment plant

    International Nuclear Information System (INIS)

    Packer, T.W.; Lees, E.W.; Close, D.; Nixon, K.V.; Pratt, J.C.; Strittmatter, R.

    1985-01-01

    The US and UK have been separately working on the development of a NDA instrument to determine the enrichment of gaseous UF 6 at low pressures in cascade header pipework in line with the conclusions of the Hexapartite Safeguards Project viz. the instrument is capable of making a ''go/no go'' decision of whether the enrichment is less than/greater than 20%. Recently, there has been a series of very useful technical exchanges of ideas and information between the two countries. This has led to a technical formulation for such an instrumentation based on γ-ray spectrometry which, although plant-specific in certain features, nevertheless is based on the same physical principles. Experimental results from commercially operating enrichment plants are very encouraging and indicate that a complete measurement including set up time on the pipe should be attainable in about 30 minutes when measuring pipes of diameter around 110 mm. 5 refs., 4 figs

  17. A Third-Party E-Payment Protocol Based on Quantum Group Blind Signature

    Science.gov (United States)

    Zhang, Jian-Zhong; Yang, Yuan-Yuan; Xie, Shu-Cui

    2017-09-01

    A third-party E-payment protocol based on quantum group blind signature is proposed in this paper. Our E-payment protocol could protect user's anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems can not provide. To achieve that, quantum key distribution, one-time pad and quantum group blind signature are adopted in our scheme. Furthermore, if there were a dispute, the manager Trent can identify who tells a lie.

  18. Self-testing protocols based on the chained Bell inequalities

    International Nuclear Information System (INIS)

    Šupić, I; Augusiak, R; Salavrakos, A; Acín, A

    2016-01-01

    Self-testing is a device-independent technique based on non-local correlations whose aim is to certify the effective uniqueness of the quantum state and measurements needed to produce these correlations. It is known that the maximal violation of some Bell inequalities suffices for this purpose. However, most of the existing self-testing protocols for two devices exploit the well-known Clauser–Horne–Shimony–Holt Bell inequality or modifications of it, and always with two measurements per party. Here, we generalize the previous results by demonstrating that one can construct self-testing protocols based on the chained Bell inequalities, defined for two devices implementing an arbitrary number of two-output measurements. On the one hand, this proves that the quantum state and measurements leading to the maximal violation of the chained Bell inequality are unique. On the other hand, in the limit of a large number of measurements, our approach allows one to self-test the entire plane of measurements spanned by the Pauli matrices X and Z. Our results also imply that the chained Bell inequalities can be used to certify two bits of perfect randomness. (paper)

  19. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs.

    Science.gov (United States)

    Aslam, Muhammad; Hu, Xiaopeng; Wang, Fan

    2017-12-13

    Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN). Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs) utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR) routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR's routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS). This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR) to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime and stability

  20. SACFIR: SDN-Based Application-Aware Centralized Adaptive Flow Iterative Reconfiguring Routing Protocol for WSNs

    Directory of Open Access Journals (Sweden)

    Muhammad Aslam

    2017-12-01

    Full Text Available Smart reconfiguration of a dynamic networking environment is offered by the central control of Software-Defined Networking (SDN. Centralized SDN-based management architectures are capable of retrieving global topology intelligence and decoupling the forwarding plane from the control plane. Routing protocols developed for conventional Wireless Sensor Networks (WSNs utilize limited iterative reconfiguration methods to optimize environmental reporting. However, the challenging networking scenarios of WSNs involve a performance overhead due to constant periodic iterative reconfigurations. In this paper, we propose the SDN-based Application-aware Centralized adaptive Flow Iterative Reconfiguring (SACFIR routing protocol with the centralized SDN iterative solver controller to maintain the load-balancing between flow reconfigurations and flow allocation cost. The proposed SACFIR’s routing protocol offers a unique iterative path-selection algorithm, which initially computes suitable clustering based on residual resources at the control layer and then implements application-aware threshold-based multi-hop report transmissions on the forwarding plane. The operation of the SACFIR algorithm is centrally supervised by the SDN controller residing at the Base Station (BS. This paper extends SACFIR to SDN-based Application-aware Main-value Centralized adaptive Flow Iterative Reconfiguring (SAMCFIR to establish both proactive and reactive reporting. The SAMCFIR transmission phase enables sensor nodes to trigger direct transmissions for main-value reports, while in the case of SACFIR, all reports follow computed routes. Our SDN-enabled proposed models adjust the reconfiguration period according to the traffic burden on sensor nodes, which results in heterogeneity awareness, load-balancing and application-specific reconfigurations of WSNs. Extensive experimental simulation-based results show that SACFIR and SAMCFIR yield the maximum scalability, network lifetime

  1. Gas-phase UF6 enrichment monitor for enrichment plant safeguards

    International Nuclear Information System (INIS)

    Strittmatter, R.B.; Tape, J.W.

    1980-03-01

    An in-line enrichment monitor is being developed to provide real-time enrichment data for the gas-phase UF 6 feed stream of an enrichment plant. The nondestructive gamma-ray assay method can be used to determine the enrichment of natural UF 6 with a relative precision of better than 1% for a wide range of pressures

  2. Intelligent QoS routing algorithm based on improved AODV protocol for Ad Hoc networks

    Science.gov (United States)

    Huibin, Liu; Jun, Zhang

    2016-04-01

    Mobile Ad Hoc Networks were playing an increasingly important part in disaster reliefs, military battlefields and scientific explorations. However, networks routing difficulties are more and more outstanding due to inherent structures. This paper proposed an improved cuckoo searching-based Ad hoc On-Demand Distance Vector Routing protocol (CSAODV). It elaborately designs the calculation methods of optimal routing algorithm used by protocol and transmission mechanism of communication-package. In calculation of optimal routing algorithm by CS Algorithm, by increasing QoS constraint, the found optimal routing algorithm can conform to the requirements of specified bandwidth and time delay, and a certain balance can be obtained among computation spending, bandwidth and time delay. Take advantage of NS2 simulation software to take performance test on protocol in three circumstances and validate the feasibility and validity of CSAODV protocol. In results, CSAODV routing protocol is more adapt to the change of network topological structure than AODV protocol, which improves package delivery fraction of protocol effectively, reduce the transmission time delay of network, reduce the extra burden to network brought by controlling information, and improve the routing efficiency of network.

  3. The use of titanium dioxide for selective enrichment of phosphorylated peptides

    DEFF Research Database (Denmark)

    Thingholm, Tine E.; Larsen, Martin R.

    2016-01-01

    acid (DHB), phthalic acid, lactic acid, or glycolic acid has been shown to improve selectivity significantly by reducing unspecific binding of non-phosphorylated peptides. The phosphopeptides bound to the TiO2 are subsequently eluted from the chromatographic material using an alkaline buffer. TiO2......Titanium dioxide (TiO2) has very high affinity for phosphopeptides and in recent years it has become one of the most popular methods for phosphopeptide enrichment from complex biological samples. Peptide loading onto TiO2 resin in a highly acidic environment in the presence of 2,5-dihydroxybenzoic...... chromatography is extremely tolerant towards most buffers used in biological experiments, highly robust and as such it has become the method of choice in large-scale phosphoproteomics. Here we describe a batch mode protocol for phosphopeptide enrichment using TiO2 chromatographic material followed by desalting...

  4. A Rule-Based Data Transfer Protocol for On-Demand Data Exchange in Vehicular Environment

    Directory of Open Access Journals (Sweden)

    Liao Hsien-Chou

    2009-01-01

    Full Text Available The purpose of Intelligent Transport System (ITS is mainly to increase the driving safety and efficiency. Data exchange is an important way to achieve the purpose. An on-demand data exchange is especially useful to assist a driver avoiding some emergent events. In order to handle the data exchange under dynamic situations, a rule-based data transfer protocol is proposed in this paper. A set of rules is designed according to the principle of request-forward-reply (RFR. That is, they are used to determine the timing of data broadcasting, forwarding, and replying automatically. Two typical situations are used to demonstrate the operation of rules. One is the front view of a driver occluded by other vehicles. The other is the traffic jam. The proposed protocol is flexible and extensible for unforeseen situations. Three simulation tools were also implemented to demonstrate the feasibility of the protocol and measure the network transmission under high density of vehicles. The simulation results show that the rule-based protocol is efficient on data exchange to increase the driving safety.

  5. Low Cost ZigBee Protocol Based Laboratory Platforms

    Directory of Open Access Journals (Sweden)

    Alvaro Romero-Acero

    2013-11-01

    Full Text Available This paper presents a low cost wireless communication platform, based on the ZigBee protocol. It is designed with the purpose to strengthen the use of information technology in the classroom. Guides laboratory practices are focused on developing undergraduate engineering students to the area of telecommunications. The platform structure is composed of: Labs custom designed, web tools embedded wireless communication system for data acquisition in real time, and the Human Machine Interface (HMI, which records analog data and digital. 

  6. Timing of Environmental Enrichment Affects Memory in the House Cricket, Acheta domesticus.

    Directory of Open Access Journals (Sweden)

    Heather S Mallory

    Full Text Available Learning appears to be ubiquitous among animals, as it plays a key role in many behaviors including foraging and reproduction. Although there is some genetic basis for differences in learning ability and memory retention, environment also plays an important role, as it does for any other trait. For example, adult animals maintained in enriched housing conditions learn faster and remember tasks for longer than animals maintained in impoverished conditions. Such plasticity in adult learning ability has often been linked to plasticity in the brain, and studies aimed at understanding the mechanisms, stimuli, and consequences of adult behavioral and brain plasticity are numerous. However, the role of experiences during post-embryonic development in shaping plasticity in adult learning ability and memory retention remain relatively unexplored. Using the house cricket (Acheta domesticus as a model organism, we developed a protocol to allow the odor preference of a large number of crickets to be tested in a short period of time. We then used this new protocol to examine how enrichment or impoverishment at two developmental stages (either the last nymphal instar or young adult affected adult memory. Our results show that regardless of nymphal rearing conditions, crickets that experienced an enriched rearing condition as young adults performed better on a memory task than individuals that experienced an impoverished condition. Older adult crickets (more than 1 week post adult molt did not demonstrate differences in memory of the odor task, regardless of rearing condition as a young adult. Our results suggest that environmentally-induced plasticity in memory may be restricted to the young adult stage.

  7. On the security of a novel key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Xiang Tao; Wong, K.-W.; Liao Xiaofeng

    2009-01-01

    Recently, Xiao et al. proposed a novel key agreement protocol based on Chebyshev chaotic map. In this paper, the security of the protocol is analyzed, and two attack methods can be found in different scenarios. The essential principle of Xiao et al.'s scheme is summarized. It is also pointed out with proof that any attempt along this line to improve the security of Chebyshev map is redundant.

  8. A Practice-Based Evaluation of Distress Screening Protocol Adherence and Medical Service Utilization.

    Science.gov (United States)

    Zebrack, Brad; Kayser, Karen; Bybee, Deborah; Padgett, Lynne; Sundstrom, Laura; Jobin, Chad; Oktay, Julianne

    2017-07-01

    Background: This study examined the extent to which cancer programs demonstrated adherence to their own prescribed screening protocol, and whether adherence to that protocol was associated with medical service utilization. The hypothesis is that higher rates of service utilization are associated with lower rates of adherence to screening protocols. Methods: Oncology social workers at Commission on Cancer-accredited cancer programs reviewed electronic health records (EHRs) in their respective cancer programs during a 2-month period in 2014. Rates of overall adherence to a prescribed distress screening protocol were calculated based on documentation in the EHR that screening adherence and an appropriate clinical response had occurred. We examined documentation of emergency department (ED) use and hospitalization within 2 months after the screening visit. Results: Review of 8,409 EHRs across 55 cancer centers indicated that the overall adherence rate to screening protocols was 62.7%. The highest rates of adherence were observed in Community Cancer Programs (76.3%) and the lowest rates were in NCI-designated Cancer Centers (43.3%). Rates of medical service utilization were significantly higher than expected when overall protocol adherence was lacking. After controlling for patient and institutional characteristics, risk ratios for ED use (0.82) and hospitalization (0.81) suggest that when overall protocol adherence was documented, 18% to 19% fewer patients used these medical services. Conclusions: The observed associations between a mandated psychosocial care protocol and medical service utilization suggest opportunities for operational efficiencies and costs savings. Further investigations of protocol integrity, as well as the clinical care models by which psychosocial care is delivered, are warranted. Copyright © 2017 by the National Comprehensive Cancer Network.

  9. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  10. A uranium enrichment facility safeguards technology based on the separation nozzle process

    International Nuclear Information System (INIS)

    Bahm, W.; Weppner, J.; Didier, H.J.

    1979-01-01

    Under the Trilateral Agreement between Brazil, the Federal Republic of Germany and the IAEA an enrichment plant operating on the basis of the separation nozzle process, will be safeguarded under INFCIRC/66/Rev.2. For nuclear materials balancing purposes the plant has been subdivided into 17 key measuring points to assess the nuclear material flow and the nuclear material inventory. Preliminary studies have indicated that the balancing accuracy required for safeguards purposes cannot be achieved by only using the foreseen in-plant measuring systems, since considerable quantities of enriched uranium cannot be covered in this way. This fraction will merely be estimated by the operator and thus cannot be verified by the inspection authorities. The plant components, whose inventories could not be verified in the first estimate of the balancing accuracy referred to above by means of the in-plant measuring systems, also include the low-temperature separators of the cascade shoulder and the product. Assessing and verifying the inventories of these key measuring points is particularly important because of the enrichment (some 3% 235 U for the product) and the relatively large inventory and, hence, the considerable contribution to the balancing inaccuracy. An estimate of the balancing inaccuracy on the basis of the measuring uncertainties to be expected in the light of the present status of technology indicated values between 0.2 and 0.3% relative to the feed flow with semi-annual inventory-taking. However, this is based on the condition that the experiments planned to determine the inventories of cryogenic separators confirm the measuring uncertainties underlying the calculation

  11. Evaluation of the uranium enrichment demonstration plant project

    International Nuclear Information System (INIS)

    Sugitsue, Noritake

    2001-01-01

    In this report, the organization system of the uranium enrichment business is evaluated, based on the operation of the uranium enrichment demonstration plant. As a result, in uranium enrichment technology development or business, it was acknowledged that maintenance of the organization which has the Trinity of a research/engineering/operation was necessary in an industrialization stage by exceptional R and D cycle. Japan Nuclear Fuel Ltd. (JNFL) set up the Rokkashomura Aomori Uranium Enrichment Research and Development Center in November 2000. As a result, the system that company directly engaged in engineering development was prepared. And results obtained in this place is expected toward certain establishment of the uranium enrichment business of Japan. (author)

  12. Uranium enrichment

    International Nuclear Information System (INIS)

    Rae, H.K.; Melvin, J.G.

    1988-06-01

    Canada is the world's largest producer and exporter of uranium, most of which is enriched elsewhere for use as fuel in LWRs. The feasibility of a Canadian uranium-enrichment enterprise is therefore a perennial question. Recent developments in uranium-enrichment technology, and their likely impacts on separative work supply and demand, suggest an opportunity window for Canadian entry into this international market. The Canadian opportunity results from three particular impacts of the new technologies: 1) the bulk of the world's uranium-enrichment capacity is in gaseous diffusion plants which, because of their large requirements for electricity (more than 2000 kW·h per SWU), are vulnerable to competition from the new processes; 2) the decline in enrichment costs increases the economic incentive for the use of slightly-enriched uranium (SEU) fuel in CANDU reactors, thus creating a potential Canadian market; and 3) the new processes allow economic operation on a much smaller scale, which drastically reduces the investment required for market entry and is comparable with the potential Canadian SEU requirement. The opportunity is not open-ended. By the end of the century the enrichment supply industry will have adapted to the new processes and long-term customer/supplier relationships will have been established. In order to seize the opportunity, Canada must become a credible supplier during this century

  13. Uranium enrichment

    International Nuclear Information System (INIS)

    1991-08-01

    This paper reports that in 1990 the Department of Energy began a two-year project to illustrate the technical and economic feasibility of a new uranium enrichment technology-the atomic vapor laser isotope separation (AVLIS) process. GAO believes that completing the AVLIS demonstration project will provide valuable information about the technical viability and cost of building an AVLIS plant and will keep future plant construction options open. However, Congress should be aware that DOE still needs to adequately demonstrate AVLIS with full-scale equipment and develop convincing cost projects. Program activities, such as the plant-licensing process, that must be completed before a plant is built, could take many years. Further, an updated and expanded uranium enrichment analysis will be needed before any decision is made about building an AVLIS plant. GAO, which has long supported legislation that would restructure DOE's uranium enrichment program as a government corporation, encourages DOE's goal of transferring AVLIS to the corporation. This could reduce the government's financial risk and help ensure that the decision to build an AVLIS plant is based on commercial concerns. DOE, however, has no alternative plans should the government corporation not be formed. Further, by curtailing a planned public access program, which would have given private firms an opportunity to learn about the technology during the demonstration project, DOE may limit its ability to transfer AVLIS to the private sector

  14. Rapid extraction of genomic DNA from saliva for HLA typing on microarray based on magnetic nanobeads

    Energy Technology Data Exchange (ETDEWEB)

    Xie Xin; Zhang Xu E-mail: shinezhang@hotmail.com; Yu Bingbin; Gao Huafang; Zhang Huan; Fei Weiyang

    2004-09-01

    A series of simplified protocols are developed for extracting genomic DNA from saliva by using the magnetic nanobeads as absorbents. In these protocols, both the enrichment of the target cells and the adsorption of DNA can be achieved simultaneously by our functionally modified magnetic beads in one step, and the DNA-nanobeads complex can be used as PCR templates. HLA typing based on an oligonucleotide array was conducted by hybridization with the PCR products. The result shows that the protocols are robust and sensitive.

  15. Thermal profiles, crystallization behaviors and microstructure of diacylglycerol-enriched palm oil blends with diacylglycerol-enriched palm olein.

    Science.gov (United States)

    Xu, Yayuan; Zhao, Xiaoqing; Wang, Qiang; Peng, Zhen; Dong, Cao

    2016-07-01

    To elucidate the possible interaction mechanisms between DAG-enriched oils, this study investigated how mixtures of DAG-enriched palm-based oils influenced the phase behavior, thermal properties, crystallization behaviors and the microstructure in binary fat blends. DAG-enriched palm oil (PO-DAGE) was blended with DAG-enriched palm olein (POL-DAGE) in various percentages (0%, 10%, 30%, 50%, 70%, 90%, 100%). Based on the observation of iso-solid diagram and phase diagram, the binary mixture of PO-DAGE/POL-DAGE showed a better compatibility in comparison with their corresponding original blends. DSC thermal profiles exhibited that the melting and crystallization properties of PO-DAGE/POL-DAGE were distinctively different from corresponding original blends. Crystallization kinetics revealed that PO-DAGE/POL-DAGE blends displayed a rather high crystallization rate and exhibited no spherulitic crystal growth. From the results of polarized light micrographs, PO-DAGE/POL-DAGE blends showed more dense structure with very small needle-like crystals than PO/POL. X-ray diffraction evaluation revealed when POL-DAGE was added in high contents to PO-DAGE, above 30%, β-polymorph dominated, and the mount of β' forms crystals was decreasing. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. The Passive Neutron Enrichment Meter for Uranium Cylinder Assay

    Energy Technology Data Exchange (ETDEWEB)

    Miller, Karen A.; Menlove, Howard O.; Swinhoe, Martyn T.; Marlow, Johanna B. [Safeguards Science and Technology Group (N-1), Los Alamos National Laboratory, Los Alamos (United States)

    2011-12-15

    As fuel cycle technology becomes more prevalent around the world, international safeguards have become increasingly important in verifying that nuclear materials have not been diverted. Uranium enrichment technology is a critical pathway to nuclear weapons development, making safeguards of enrichment facilities especially important. Independently-verifiable material accountancy is a fundamental measure in detecting diversion of nuclear materials. This paper is about a new instrument for uranium cylinder assay for enrichment plant safeguards called the Passive Neutron Enrichment Meter (PNEM). The measurement objective is to simultaneously verify uranium mass and enrichment in Uf6 cylinders. It can be used with feed, product, and tails cylinders. Here, we consider the enrichment range up to 5% {sup 235}U. The concept is to use the Doubles-to-Singles count rate to give a measure of the {sup 235}U enrichment and the Singles count rate to provide a measure of the total uranium mass. The cadmium ratio is an additional signature for the enrichment that is especially useful for feed and tails cylinders. PNEM is a {sup 3}He-based system that consists of two portable detector pods. Uranium enrichment in UF{sub 6} cylinders is typically determined using a gamma-ray-based method that only samples a tiny volume of the cylinder's content and requires knowledge of the cylinder wall thickness. The PNEM approach has several advantages over gamma-ray-based methods including a deeper penetration depth into the cylinder, meaning it can be used with heterogeneous isotopic mixtures of UF{sub 6}. In this paper, we describe a Monte Carlo modelling study where we have examined the sensitivity of the system to systematic uncertainties such as the distribution of UF{sub 6} within the cylinder. We also compare characterization measurements of the PNEM prototype to the expected measurements calculated with Monte Carlo simulations.

  17. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  18. Strategy for Developing Expert-System-Based Internet Protocols (TCP/IP)

    Science.gov (United States)

    Ivancic, William D.

    1997-01-01

    The Satellite Networks and Architectures Branch of NASA's Lewis Research is addressing the issue of seamless interoperability of satellite networks with terrestrial networks. One of the major issues is improving reliable transmission protocols such as TCP over long latency and error-prone links. Many tuning parameters are available to enhance the performance of TCP including segment size, timers and window sizes. There are also numerous congestion avoidance algorithms such as slow start, selective retransmission and selective acknowledgment that are utilized to improve performance. This paper provides a strategy to characterize the performance of TCP relative to various parameter settings in a variety of network environments (i.e. LAN, WAN, wireless, satellite, and IP over ATM). This information can then be utilized to develop expert-system-based Internet protocols.

  19. An Improved Constraint-Based System for the Verification of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial

  20. An Improved Constraint-based system for the verification of security protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hermenegildo, Manuel V.; Puebla, German

    We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect aws associated to partial runs

  1. Low-resolution gamma-ray measurements of uranium enrichment

    International Nuclear Information System (INIS)

    Sprinkle, J.K. Jr.; Christiansen, A.; Cole, R.; Collins, M.L.

    1996-01-01

    Facilities that process special nuclear material perform periodic inventories. In bulk facilities that process low-enriched uranium, these inventories and their audits are based primarily on weight and enrichment measurements. Enrichment measurements determine the 211 U weight fraction of the uranium compound from the passive gamma-ray emissions of the sample. Both international inspectors and facility operators rely on the capability to make in-field gamma-ray measurements of uranium enrichment. These users require rapid, portable measurement capability. Some in-field measurements have been biased, forcing the inspectors to resort to high-resolution measurements or mass spectrometry to accomplish their goals

  2. Advanced enrichment techniques

    International Nuclear Information System (INIS)

    Johnson, A.

    1988-01-01

    BNFL is in a unique position in that it has commercial experience of diffusion enrichment, and of centrifuge enrichment through its associate company Urenco. In addition BNFL is developing laser enrichment techniques as part of a UK development programme in this area. The paper describes the development programme which led to the introduction of competitive centrifuge enrichment technology by Urenco and discusses the areas where improvements have and will continue to be made in the centrifuge process. It also describes the laser development programme currently being undertaken in the UK. The paper concludes by discussing the relative merits of the various methods of uranium enrichment, with particular reference to the enrichment market likely to obtain over the rest of the century

  3. Advanced enrichment techniques

    International Nuclear Information System (INIS)

    Johnson, A.

    1987-01-01

    BNFL is in a unique position in that it has commercial experience of diffusion enrichment, and of centrifuge enrichment through its associate company Urenco. In addition BNFL is developing laser enrichment techniques as part of a UK development programme in this area. The paper describes the development programme which led to the introduction of competitive centrifuge enrichment technology by Urenco and discusses the areas where improvements have and will continue to be made in the centrifuge process. It also describes the laser development programme currently being undertaken in the UK. The paper concludes by discussing the relative merits of the various methods of uranium enrichment, with particular reference to the enrichment market likely to obtain over the rest of the century. (author)

  4. Applications and theory of electrokinetic enrichment in micro-nanofluidic chips.

    Science.gov (United States)

    Chen, Xueye; Zhang, Shuai; Zhang, Lei; Yao, Zhen; Chen, Xiaodong; Zheng, Yue; Liu, Yanlin

    2017-09-01

    This review reports the progress on the recent development of electrokinetic enrichment in micro-nanofluidic chips. The governing equations of electrokinetic enrichment in micro-nanofluidic chips are given. Various enrichment applications including protein analysis, DNA analysis, bacteria analysis, viruses analysis and cell analysis are illustrated and discussed. The advantages and difficulties of each enrichment method are expatiated. This paper will provide a particularly convenient and valuable reference to those who intend to research the electrokinetic enrichment based on micro-nanofluidic chips.

  5. A comparison of sennosides-based bowel protocols with and without docusate in hospitalized patients with cancer.

    Science.gov (United States)

    Hawley, Philippa Helen; Byeon, Jai Jun

    2008-05-01

    Constipation is a common and distressing condition in patients with cancer, especially those taking opioid analgesics. Many institutions prevent and treat constipation with titrated laxatives, which is known as a bowel protocol. An effective and well-tolerated bowel protocol is a very important component of cancer care, and there is little evidence on which to base selection of the most appropriate agents. This study compares a protocol of the stimulant laxative sennosides alone with a protocol of sennosides plus the stool softener docusate, in hospitalized patients at an oncology center. The docusate-containing protocol had an initial docusate-only step for patients not taking opioids, and four to six 100-mg capsules of docusate sodium in addition to the sennosides for the rest of the protocol. Thirty patients received the sennosides-only (S) protocol and 30 the sennosides plus docusate (DS) protocol. The efficacy and adverse effects of the protocols were monitored for 5-12 days. The two protocols were used sequentially, creating two cohorts, one on each protocol. Eighty percent of patients were taking oral opioids and 72% were admitted for symptom control/supportive care. Over a total of 488 days of observation it was found that the S protocol produced more bowel movements than the DS protocol, and in the symptom control/supportive care patients this difference was statistically significant (p sennosides did not reduce bowel cramps, and was less effective in inducing laxation than the sennosides-only protocol. Further research into the appropriate use of docusate and into the details of bowel protocol design are required.

  6. Juvenile psittacine environmental enrichment.

    Science.gov (United States)

    Simone-Freilicher, Elisabeth; Rupley, Agnes E

    2015-05-01

    Environmental enrichment is of great import to the emotional, intellectual, and physical development of the juvenile psittacine and their success in the human home environment. Five major types of enrichment include social, occupational, physical, sensory, and nutritional. Occupational enrichment includes exercise and psychological enrichment. Physical enrichment includes the cage and accessories and the external home environment. Sensory enrichment may be visual, auditory, tactile, olfactory, or taste oriented. Nutritional enrichment includes variations in appearance, type, and frequency of diet, and treats, novelty, and foraging. Two phases of the preadult period deserve special enrichment considerations: the development of autonomy and puberty. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. Multipath Activity Based Routing Protocol for Mobile ‎Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Shereen Omar

    2017-01-01

    Full Text Available Cognitive radio networks improve spectrum utilization by ‎sharing licensed spectrum with cognitive radio devices. In ‎cognitive radio ad hoc networks the routing protocol is one ‎of the most challenging tasks due to the changes in ‎frequency spectrum and the interrupted connectivity ‎caused by the primary user activity. In this paper, a multi‎path activity based routing protocol for cognitive radio ‎network (MACNRP is proposed. The protocol utilizes ‎channel availability and creates multiple node-disjoint ‎routes between the source and destination nodes. The ‎proposed protocol is compared with D2CARP and FTCRP ‎protocols. The performance evaluation is conducted ‎through mathematical analysis and using OPNET ‎simulation. The performance of the proposed protocol ‎achieves an increase in network throughput; besides it ‎decreases the probability of route failure due to node ‎mobility and primary user activity. We have found that the ‎MACNRP scheme results in 50% to 75% reduction in ‎blocking probability and 33% to 78% improvement in ‎network throughput, with a reasonable additional routing ‎overhead and average packet delay. Due to the successful ‎reduction of collision between primary users and ‎cognitive users, the MACNRP scheme results in decreasing ‎the path failure rate by 50% to 87%.‎

  8. Uranium enrichment

    International Nuclear Information System (INIS)

    1989-01-01

    GAO was asked to address several questions concerning a number of proposed uranium enrichment bills introduced during the 100th Congress. The bill would have restructured the Department of Energy's uranium enrichment program as a government corporation to allow it to compete more effectively in the domestic and international markets. Some of GAO's findings discussed are: uranium market experts believe and existing market models show that the proposed DOE purchase of a $750 million of uranium from domestic producers may not significantly increase production because of large producer-held inventories; excess uranium enrichment production capacity exists throughout the world; therefore, foreign producers are expected to compete heavily in the United States throughout the 1990s as utilities' contracts with DOE expire; and according to a 1988 agreement between DOE's Offices of Nuclear Energy and Defense Programs, enrichment decommissioning costs, estimated to total $3.6 billion for planning purposes, will be shared by the commercial enrichment program and the government

  9. Uranium enrichment: investment options for the long term

    International Nuclear Information System (INIS)

    Anon.

    1983-01-01

    The US government supplies a major portion of the enriched uranium used to fuel most of the nuclear power plants that furnish electricity in the free world. As manager of the US uranium enrichment concern, the Department of Energy (DOE) is investigating a number of technological choices to improve enrichment service and remain a significant world supplier. The Congress will ultimately select a strategy for federal investment in the uranium enrichment enterprise. A fundamental policy choice between possible future roles - that of the free world's main supplier of enrichment services, and that of a mainly domestic supplier - will underlie any investment decision the Congress makes. The technological choices are gaseous diffusion, gas centrifuge, and atomic vapor laser isotope separation (AVLIS). A base plan and four alternatives were examined by DOE and the Congressional Budget Office. In terms of total enterprise costs, Option IV, ultimately relying on advanced gas centrifuges for enrichment services, would offer the most economic approach, with costs over the full projection period totaling $123.5 billion. Option III, ultimately relying on AVLIS without gas centrifuge enrichment or gaseous diffusion, falls next in the sequence, with costs of $128.2 billion. Options I and II, involving combinations of the gas centrifuge and AVLIS technologies, follow closely with costs of $128.7 and $129.6 billion. The base plan has costs of $136.8 billion over the projection period. 1 figure, 22 tables

  10. Data exchange technology based on handshake protocol for industrial automation system

    Science.gov (United States)

    Astafiev, A. V.; Shardin, T. O.

    2018-05-01

    In the article, questions of data exchange technology based on the handshake protocol for industrial automation system are considered. The methods of organizing the technology in client-server applications are analyzed. In the process of work, the main threats of client-server applications that arise during the information interaction of users are indicated. Also, a comparative analysis of analogue systems was carried out, as a result of which the most suitable option was chosen for further use. The basic schemes for the operation of the handshake protocol are shown, as well as the general scheme of the implemented application, which describes the entire process of interaction between the client and the server.

  11. Boron isotopic enrichment by displacement chromatography

    International Nuclear Information System (INIS)

    Mohapatra, K.K.; Bose, Arun

    2014-01-01

    10 B enriched boron is used in applications requiring high volumetric neutron absorption (absorption cross section- 3837 barn for thermal and 1 barn for 1 MeV fast neutron). It is used in fast breeder reactor (as control rod material), in neutron counter, in Boron Neutron Capture Therapy etc. Owing to very small separation factor, boron isotopic enrichment is a complex process requiring large number of separation stages. Heavy Water Board has ventured in industrial scale production of 10 B enriched boron using Exchange Distillation Process as well as Ion Displacement Chromatography Process. Ion Displacement Chromatography process is used in Boron Enrichment Plant at HWP, Manuguru. It is based on isotopic exchange between borate ions (B(OH) 4 - ) on anion exchange resin and boric acid passing through resin. The isotopic exchange takes place due to difference in zero point energy of 10 B and 11 B

  12. A novel tantalum-based sol-gel packed microextraction syringe for highly specific enrichment of phosphopeptides in MALDI-MS applications.

    Science.gov (United States)

    Çelikbıçak, Ömür; Atakay, Mehmet; Güler, Ülkü; Salih, Bekir

    2013-08-07

    A new tantalum-based sol-gel material was synthesized using a unique sol-gel synthesis pathway by PEG incorporation into the sol-gel structure without performing a calcination step. This improved its chemical and physical properties for the high capacity and selective enrichment of phosphopeptides from protein digests in complex biological media. The specificity of the tantalum-based sol-gel material for phosphopeptides was evaluated and compared with tantalum(V) oxide (Ta2O5) in different phosphopeptide enrichment applications. The tantalum-based sol-gel and tantalum(V) oxide were characterized in detail using FT-IR spectroscopy, X-ray diffraction (XRD) and scanning electron microscopy (SEM), and also using a surface area and pore size analyzer. In the characterization studies, the surface morphology, pore volume, crystallinity of the materials and PEG incorporation into the sol-gel structure to produce a more hydrophilic material were successfully demonstrated. The X-ray diffractograms of the two different materials were compared and it was noted that the broad signals of the tantalum-based sol-gel clearly represented the amorphous structure of the sol-gel material, which was more likely to create enough surface area and to provide more accessible tantalum atoms for phosphopeptides to be easily adsorbed when compared with the neat and more crystalline structure of Ta2O5. Therefore, the phosphopeptide enrichment performance of the tantalum-based sol-gels was found to be remarkably higher than the more crystalline Ta2O5 in our studies. Phosphopeptides at femtomole levels could be selectively enriched using the tantalum-based sol-gel and detected with a higher signal-to-noise ratio by matrix-assisted laser desorption/ionization-mass spectrometer (MALDI-MS). Moreover, phosphopeptides in a tryptic digest of non-fat bovine milk as a complex real-world biological sample were retained with higher yield using a tantalum-based sol-gel. Additionally, the sol-gel material

  13. Design and implementation of an intrusion detection system based on IPv6 protocol

    Science.gov (United States)

    Liu, Bin; Li, Zhitang; Li, Yao; Li, Zhanchun

    2005-11-01

    Network intrusion detection systems (NIDS) are important parts of network security architecture. Although many NIDS have been proposed, there is little effort to expand the current set of NIDS to support IPv6 protocol. This paper presents the design and implementation of a Network-based Intrusion Detection System that supports both IPv6 protocol and IPv4 protocol. It characters rules based logging to perform content pattern matching and detect a variety of attacks and probes from IPv4 and IPv6.There are four primary subsystems to make it up: packet capture, packet decoder, detection engine, and logging and alerting subsystem. A new approach to packet capture that combined NAPI with MMAP is proposed in this paper. The test results show that the efficiency of packet capture can be improved significantly by this method. Several new attack tools for IPv6 have been developed for intrusion detection evaluation. Test shows that more than 20 kinds of IPv6 attacks can be detected by this system and it also has a good performance under heavy traffic load.

  14. A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function.

    Science.gov (United States)

    Xu, He; Ding, Jie; Li, Peng; Zhu, Feng; Wang, Ruchuan

    2018-03-02

    With the fast development of the Internet of Things, Radio Frequency Identification (RFID) has been widely applied into many areas. Nevertheless, security problems of the RFID technology are also gradually exposed, when it provides life convenience. In particular, the appearance of a large number of fake and counterfeit goods has caused massive loss for both producers and customers, for which the clone tag is a serious security threat. If attackers acquire the complete information of a tag, they can then obtain the unique identifier of the tag by some technological means. In general, because there is no extra identifier of a tag, it is difficult to distinguish an original tag and its clone one. Once the legal tag data is obtained, attackers can be able to clone this tag. Therefore, this paper shows an efficient RFID mutual verification protocol. This protocol is based on the Physical Unclonable Function (PUF) and the lightweight cryptography to achieve efficient verification of a single tag. The protocol includes three process: tag recognition, mutual verification and update. The tag recognition is that the reader recognizes the tag; mutual verification is that the reader and tag mutually verify the authenticity of each other; update is supposed to maintain the latest secret key for the following verification. Analysis results show that this protocol has a good balance between performance and security.

  15. Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state

    International Nuclear Information System (INIS)

    Chen Xiubo; Yang Shuai; Su Yuan; Yang Yixian

    2012-01-01

    Recently, Liu et al (2011 Phys. Scr. 84045015) pointed out that the multiparty quantum secret sharing (MQSS) protocol based on the GHZ state (Hwang et al 2011 Phys. Scr. 83045004) is insecure. They found that an inside participant can deduce half of the sender's secret information directly just by his piece of the secret. In order to resist this attack, an improvement was put forward. However, in this paper, we find that Liu et al's improved protocol is still insecure. We give details of three attack strategies to steal the secret information. It is shown that the eavesdropper can steal half or all of the secret information. Furthermore, a simple and ingenious MQSS protocol is proposed. We perform explicit cryptanalysis to prove that our improved protocol can resist the attacks from both the outside attackers and the inside participants, even the collusion attack.

  16. Efficient clinical-scale enrichment of lymphocytes for use in adoptive immunotherapy using a modified counterflow centrifugal elutriation program.

    Science.gov (United States)

    Powell, Daniel J; Brennan, Andrea L; Zheng, Zhaohui; Huynh, Hong; Cotte, Julio; Levine, Bruce L

    2009-01-01

    Clinical-scale lymphocyte enrichment from a leukapheresis product has been performed most routinely using costly magnetic bead separation systems that deplete monocytes, but this procedure may leave behind residual beads or antibodies in the enriched cell product. Counterflow centrifugal elutriation has been demonstrated previously to enrich monocytes efficiently for generation of dendritic cells. This study describes a modified elutriation procedure for efficient bead-free economical enrichment of lymphocytes from leukapheresis products from healthy donors and study subjects with human immunodeficiency virus (HIV) infection or malignancy. Modified program settings and conditions for the CaridianBCT Elutra device were investigated to optimize lymphocyte enrichment and recovery. Lymphocyte enrichment was measured using a novel approach utilizing cell sizing analysis on a Beckman Coulter Multisizer and confirmed by flow cytometry phenotypic analysis. Efficient enrichment and recovery of lymphocytes from leukapheresis cell products was achieved using modified elutriation settings for flow rate and fraction volume. Elutriation allowed for enrichment of larger numbers of lymphocytes compared with depletion of monocytes by bead adherence, with a trend toward increased lymphocyte purity and yield via elutriation, resulting in a substantial reduction in the cost of enrichment per cell. Importantly, significant lymphocyte enrichment could be accomplished using leukapheresis samples from healthy donors (n=12) or from study subjects with HIV infection (n=15) or malignancy (n=12). Clinical-scale closed-system elutriation can be performed efficiently for the selective enrichment of lymphocytes for immunotherapy protocols. This represents an improvement in cost, yield and purity over current methods that require the addition of monocyte-depleting beads.

  17. Enriched glucose and dextrin mannitol-based media modulates fibroblast behavior on bacterial cellulose membranes

    Energy Technology Data Exchange (ETDEWEB)

    Stumpf, Taisa R.; Pértile, Renata A.N. [Integrated Technologies Laboratory, Department of Chemical and Food Engineering (Brazil); Rambo, Carlos R., E-mail: rambo@intelab.ufsc.br [Department of Electrical Engineering, Federal University of Santa Catarina, Florianópolis 88040-900 (Brazil); Porto, Luismar M. [Integrated Technologies Laboratory, Department of Chemical and Food Engineering (Brazil)

    2013-12-01

    Bacterial cellulose (BC) produced by Gluconacetobacter hansenii is a suitable biopolymer for biomedical applications. In order to modulate the properties of BC and expand its use as substrate for tissue engineering mainly in the form of biomembranes, glucose or dextrin were added into a BC fermentation mannitol-based medium (BCGl and BCDe, respectively) under static culture conditions. SEM images showed effects on fiber density and porosity on both sides of the BC membranes. Both enriched media decreased the BET surface area, water holding capacity, and rehydration rate. Fourier transform infrared (attenuated total reflectance mode) spectroscopy (FTIR-ATR) analysis revealed no change in the chemical structure of BC. L929 fibroblast cells were seeded on all BC-based membranes and evaluated in aspects of cell adhesion, proliferation and morphology. BCG1 membranes showed the highest biological performance and hold promise for the use in tissue engineering applications. - Highlights: • Glucose and dextrin were used to modify culture media for BC production. • Microarchitecture of BC was different depending on the enriching agent. • Fibroblasts adhered on the surface of BC modified microarchitectures. • Fibroblasts adhered on glucose modified BC exhibited healthy cell morphology.

  18. Enriched glucose and dextrin mannitol-based media modulates fibroblast behavior on bacterial cellulose membranes

    International Nuclear Information System (INIS)

    Stumpf, Taisa R.; Pértile, Renata A.N.; Rambo, Carlos R.; Porto, Luismar M.

    2013-01-01

    Bacterial cellulose (BC) produced by Gluconacetobacter hansenii is a suitable biopolymer for biomedical applications. In order to modulate the properties of BC and expand its use as substrate for tissue engineering mainly in the form of biomembranes, glucose or dextrin were added into a BC fermentation mannitol-based medium (BCGl and BCDe, respectively) under static culture conditions. SEM images showed effects on fiber density and porosity on both sides of the BC membranes. Both enriched media decreased the BET surface area, water holding capacity, and rehydration rate. Fourier transform infrared (attenuated total reflectance mode) spectroscopy (FTIR-ATR) analysis revealed no change in the chemical structure of BC. L929 fibroblast cells were seeded on all BC-based membranes and evaluated in aspects of cell adhesion, proliferation and morphology. BCG1 membranes showed the highest biological performance and hold promise for the use in tissue engineering applications. - Highlights: • Glucose and dextrin were used to modify culture media for BC production. • Microarchitecture of BC was different depending on the enriching agent. • Fibroblasts adhered on the surface of BC modified microarchitectures. • Fibroblasts adhered on glucose modified BC exhibited healthy cell morphology

  19. Exercise-based cardiac rehabilitation for adults after Heart valve surgery (protocol)

    DEFF Research Database (Denmark)

    Lærum Sibilitz, Kristine; Berg, Selina Kikkenborg; Tang, Lars Hermann

    2013-01-01

    This is the protocol for a review and there is no abstract. The objectives are as follows: To assess the benefits and harms of exercise-based intervention programmes (exercise-based interventions alone or in combination with psycho-educational components), compared to no intervention, or treatment...... as usual, in adults who have had heart valve surgery. In this review we will focus on programmes that include an exercise-based intervention with, or without, another rehabilitation component (such as a psycho-educational component)....

  20. An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

    International Nuclear Information System (INIS)

    Xu Shu-Jiang; Wang Lian-Hai; Ding Qing-Yan; Zhang Shu-Hui; Chen Xiu-Bo

    2016-01-01

    In 2011, Qu et al. proposed a quantum information hiding protocol based on the entanglement swapping of χ-type quantum states. Because a χ-type state can be described by the 4-particle cat states which have good symmetry, the possible output results of the entanglement swapping between a given χ-type state and all of the 16 χ-type states are divided into 8 groups instead of 16 groups of different results when the global phase is not considered. So it is difficult to read out the secret messages since each result occurs twice in each line (column) of the secret messages encoding rule for the original protocol. In fact, a 3-bit instead of a 4-bit secret message can be encoded by performing two unitary transformations on 2 particles of a χ-type quantum state in the original protocol. To overcome this defect, we propose an improved quantum information hiding protocol based on the general term formulas of the entanglement swapping among χ-type states. (paper)

  1. Device and method to enrich and process heavy water

    International Nuclear Information System (INIS)

    Hammerli, M.M.; Butler, J.P.

    1979-01-01

    A device to process and enrich heavy water is proposed which is based on a combined electrolysis catalyst exchange system in which a D 2 O enrichment of more than 99.8% is achieved in the end stage. Water partly enriched with D 2 -containing hydrogen gas from an electrolysis cell is brought into contact in a catalyst column. The water is further enriched here with deuterium. It is then fed to the electrolysis cell. Details of the apparatus are closely described. (UWI) [de

  2. A consideration on laser enrichment module

    International Nuclear Information System (INIS)

    Arisawa, Takashi; Shiba, Koreyuki

    1983-09-01

    Several problems are discussed for designing a simplified enrichment module based on Atomic Laser Isotope Separation Method, which involve the vaporization of metal, laser excitation, laser ionization and ion recovery. The conditions at which the consumed energy has the minimum value are obtained by calculating the specific energy consumption for producing unit amount of enriched products. It is found that there should be an appropriate relationship between the processing atomic density and the electrode gap in order to avoid the enrichment loss caused by the charge exchange during the ion recovery. Moreover it is also found that this relation depends on the electrode length measured along both the atomic beam direction and the laser beam direction. (author)

  3. Studies of hemidesmosomes in human amnion: the use of a detergent extraction protocol for compositional and ultrastructural analysis and preparation of a hemidesmosome-enriched fraction from tissue.

    Science.gov (United States)

    Behzad, F; Jones, C J; Ball, S; Alvares, T; Aplin, J D

    1995-01-01

    A method is described for the sequential detergent and high ionic strength extraction of human amnion with the progressive enrichment of the intermediate filament (IF) cytoskeleton and its associated structures including hemidesmosomes (HD). TEM of the extracted epithelium in situ reveals IF bundles beneath the apical cell surface, around the nucleus and at the lateral edges of the cells where association with desmosomes occurs. IF bundles are also very prominent within basal cell processes where they loop through the cytoplasm adjacent to the HDs. A novel connecting filament network is observed running between the IFs and the hemidesmosomal dense plaque. The adjacent IF network contains both cytokeratin and vimentin, the latter revealed much more fully as a result of the extraction protocol. The hemidesmosomal plasma membrane contains integrin subunits alpha 6 and beta 4 and these are quantitatively retained as the basal cell surface during extraction, while nonjunctional plasma membrane is solubilised. Integrin beta 1 is found at the basolateral cell surface but, like actin, is extracted quantitatively and is not present in HDs. The extracted epithelial cells may be recovered by scraping and the IF network depolymerised to produce a particulate fraction containing short residual IFs, associated thin filaments and plaque material. This fraction contains immunoreactive cytokeratin and vimentin. Integrin alpha 6 beta 4 has been used as a biochemical criterion of the presence of HD material in the fraction. Both subunits are highly enriched. The fraction also contains the hemidesmosomal components HD1, BP230 and BP180. This method is likely to be useful in further characterisation of the HD.

  4. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  5. New generation enrichment monitoring technology for gas centrifuge enrichment plants

    International Nuclear Information System (INIS)

    Ianakiev, Kiril D.; Alexandrov, Boian S.; Boyer, Brian D.; Hill, Thomas R.; Macarthur, Duncan W.; Marks, Thomas; Moss, Calvin E.; Sheppard, Gregory A.; Swinhoe, Martyn T.

    2008-01-01

    The continuous enrichment monitor, developed and fielded in the 1990s by the International Atomic Energy Agency, provided a go-no-go capability to distinguish between UF 6 containing low enriched (approximately 4% 235 U) and highly enriched (above 20% 235 U) uranium. This instrument used the 22-keV line from a 109 Cd source as a transmission source to achieve a high sensitivity to the UF 6 gas absorption. The 1.27-yr half-life required that the source be periodically replaced and the instrument recalibrated. The instrument's functionality and accuracy were limited by the fact that measured gas density and gas pressure were treated as confidential facility information. The modern safeguarding of a gas centrifuge enrichment plant producing low-enriched UF 6 product aims toward a more quantitative flow and enrichment monitoring concept that sets new standards for accuracy stability, and confidence. An instrument must be accurate enough to detect the diversion of a significant quantity of material, have virtually zero false alarms, and protect the operator's proprietary process information. We discuss a new concept for advanced gas enrichment assay measurement technology. This design concept eliminates the need for the periodic replacement of a radioactive source as well as the need for maintenance by experts. Some initial experimental results will be presented.

  6. A simple and effective protocol for fast isolation of human Tenon's fibroblasts from a single trabeculectomy biopsy - a comparison of cell behaviour in different culture media.

    Science.gov (United States)

    Przekora, Agata; Zarnowski, Tomasz; Ginalska, Grazyna

    2017-01-01

    Human Tenon's fibroblasts (HTFs) play a crucial role in wound healing. They cause postoperative scarring of the filtering bleb and are thus responsible for trabeculectomy failure. This study aimed to find an effective and fast protocol for HTF isolation from trabeculectomy biopsies. The protocol was compared with the commonly recommended HTF isolation procedure, which uses Dulbecco's modified Eagle's medium (DMEM). We used Eagle's minimum essential medium (EMEM) enriched with fibroblast growth factor (FGF), which selectively promoted the proliferation of HTF cells. A secondary goal was to compare HTF morphology, metabolism and growth during parallel cultivation of the isolated cells in FGF-enriched EMEM and DMEM. Standard procedures for HTF isolation from tissue biopsies require a 20- to 30-day culture of the explants to obtain the first monolayer. Our protocol yielded the first monolayer after approx. 15 days. More importantly, the majority of the cells were fibroblasts with only individual epithelium-derived cells present. Using FGF-enriched EMEM allowed 1.3 × 10 6 vimentin-positive fibroblasts to be obtained from a single biopsy within approx. 25 days. Using DMEM resulted in isolation failure and required exchange to FGF-enriched medium to recover the fibroblast culture. HTFs maintained in FGF-enriched EMEM also showed faster proliferation and a different type I collagen production ability compared to HTFs cultured in DMEM. Thus, FGF-enriched EMEM is recommended for fast propagation of HTFs unless the aim of the study is to assess the effect of a tested agent on proliferation ability or type I collagen production. Our fast protocol for HTF isolation allows easy setup of cell banks by researchers under laboratory conditions and could be very useful during testing of novel ophthalmologic anti-fibrotic agents in vitro. Molecular analysis of HTFs isolated from patients with known treatment histories may provide valuable information on the effects of some

  7. System-Aware Smart Network Management for Nano-Enriched Water Quality Monitoring

    Directory of Open Access Journals (Sweden)

    B. Mokhtar

    2016-01-01

    Full Text Available This paper presents a comprehensive water quality monitoring system that employs a smart network management, nano-enriched sensing framework, and intelligent and efficient data analysis and forwarding protocols for smart and system-aware decision making. The presented system comprises two main subsystems, a data sensing and forwarding subsystem (DSFS, and Operation Management Subsystem (OMS. The OMS operates based on real-time learned patterns and rules of system operations projected from the DSFS to manage the entire network of sensors. The main tasks of OMS are to enable real-time data visualization, managed system control, and secure system operation. The DSFS employs a Hybrid Intelligence (HI scheme which is proposed through integrating an association rule learning algorithm with fuzzy logic and weighted decision trees. The DSFS operation is based on profiling and registering raw data readings, generated from a set of optical nanosensors, as profiles of attribute-value pairs. As a case study, we evaluate our implemented test bed via simulation scenarios in a water quality monitoring framework. The monitoring processes are simulated based on measuring the percentage of dissolved oxygen and potential hydrogen (PH in fresh water. Simulation results show the efficiency of the proposed HI-based methodology at learning different water quality classes.

  8. CHIP: Commodity based Hazard Identification Protocol for emerging diseases in plants and animals

    NARCIS (Netherlands)

    Bremmer, J.; Swanenburg, M.; Galen, van M.A.; Hoek, Maarten; Rau, M.L.; Hennen, W.H.G.J.; Benninga, J.; Ge, L.; Breukers, M.L.H.

    2012-01-01

    This project comprised the development of a commodity-based hazard identification protocol for biological hazards in plants and animals as a decision support tree programmed in Excel. The content of the decision tree is based on the results of a systematic review of pest and pathogen

  9. Simplified Enrichment of Plasma Membrane Proteins from Arabidopsis thaliana Seedlings Using Differential Centrifugation and Brij-58 Treatment.

    Science.gov (United States)

    Collins, Carina A; Leslie, Michelle E; Peck, Scott C; Heese, Antje

    2017-01-01

    The plasma membrane (PM) forms a barrier between a plant cell and its environment. Proteins at this subcellular location play diverse and complex roles, including perception of extracellular signals to coordinate cellular changes. Analyses of PM proteins, however, are often limited by the relatively low abundance of these proteins in the total cellular protein pool. Techniques traditionally used for enrichment of PM proteins are time consuming, tedious, and require extensive optimization. Here, we provide a simple and reproducible enrichment procedure for PM proteins from Arabidopsis thaliana seedlings starting from total microsomal membranes isolated by differential centrifugation. To enrich for PM proteins, total microsomes are treated with the nonionic detergent Brij-58 to decrease the abundance of contaminating organellar proteins. This protocol combined with the genetic resources available in Arabidopsis provides a powerful tool that will enhance our understanding of proteins at the PM.

  10. A New QKD Protocol Based upon Authentication by EPR Entanglement State

    Science.gov (United States)

    Abushgra, Abdulbast A.

    Cryptographic world has faced multiple challenges that are included in encoding and decoding transmitting information into a secure communication channel. Quantum cryptography may be another generation of the cryptography world, which is based on the law of physics. After decades of using the classical cryptography, there is an essential need to move a step forward through the most trusted systems, especially enormous amount of data flows through billions of communicating channels (e.g. The internet), and keeping this transmitting information away from eavesdropping is obligatory. Moreover, quantum cryptography has proved its standing against many weaknesses in the classical cryptography. One of these weaknesses is the ability to copy any type of information using a passive attack without an interruption, which is impossible in the quantum system. Theoretically, several quantum observables are utilized to diagnose an action of one particle. These observables are included in measuring mass, movement, speed, etc. The polarization of one photon occurs normally and randomly in the space. Any interruption that happens during sending of a light will cause a deconstruction of the light polarization. Therefore, particles' movement in a three-dimensional space is supported by Non-Cloning theory that makes eavesdroppers unable to interrupt a communication system. In case an eavesdropper tried to interrupt a photon, the photon will be destroyed after passing the photon into a quantum detector or any measurement device. In the last decades, many Quantum Key Distribution (QKD) protocols have been created to initiate a secret key during encoding and decoding transmitted data operations. Some of these protocols were proven un-secure based on the quantum attacks that were released early. Even though the power of physics is still active and the Non-Cloning theory is unbroken, some QKD protocols failed during the security measurements. The main reason of the failure is based on the

  11. An Agent-Based Auction Protocol on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Yu-Fang Chung

    2014-01-01

    Full Text Available This paper proposes an English auction protocol to preserve a secure, fair, and effective online auction environment, where the operations are integrated with mobile agent technology for bidders participating in online auctions. The protocol consists of four participants, namely, registration manager, agent house, auction house, and bidder.

  12. Enrichment and activation of smectite-poor clay

    Energy Technology Data Exchange (ETDEWEB)

    Sarcevica, Inese; Kostjukovs, Juris; Actint, Andris, E-mail: inese.sarcevicha@gmail.com [Department of Chemistry, University of Latvia, Kr. Valdemara street 48, Riga (Latvia)

    2011-06-23

    A new method of smectite clay enrichment has been developed. The method is based on dispersing clay in a phosphate solution and sequential coagulation. The product of enrichment is characterized with X-ray powder diffraction, wavelength dispersive X-ray fluorescence spectrometry, differential thermal analysis and thermogravimetry. Sorption of methylene blue and hexadecylpyridinium bromide on raw and purified clays was studied.

  13. A novel protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery under cardiopulmonary bypass.

    Science.gov (United States)

    Odaka, Mizuho; Minakata, Kenji; Toyokuni, Hideaki; Yamazaki, Kazuhiro; Yonezawa, Atsushi; Sakata, Ryuzo; Matsubara, Kazuo

    2015-08-01

    This study aimed to develop and assess the effectiveness of a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. We established a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. This novel protocol was assessed by comparing patients undergoing open heart surgery before (control group; n = 30) and after its implementation (protocol group; n = 31) at Kyoto University Hospital between July 2012 and January 2013. Surgical site infections (SSIs) were observed in 4 control group patients (13.3 %), whereas no SSIs were observed in the protocol group patients (P open heart surgery.

  14. Introducing Clicker Training as a Cognitive Enrichment for Laboratory Mice.

    Science.gov (United States)

    Leidinger, Charlotte; Herrmann, Felix; Thöne-Reineke, Christa; Baumgart, Nadine; Baumgart, Jan

    2017-03-06

    Establishing new refinement strategies in laboratory animal science is a central goal in fulfilling the requirements of Directive 2010/63/EU. Previous research determined a profound impact of gentle handling protocols on the well-being of laboratory mice. By introducing clicker training to the keeping of mice, not only do we promote the amicable treatment of mice, but we also enable them to experience cognitive enrichment. Clicker training is a form of positive reinforcement training using a conditioned secondary reinforcer, the "click" sound of a clicker, which serves as a time bridge between the strengthened behavior and an upcoming reward. The effective implementation of the clicker training protocol with a cohort of 12 BALB/c inbred mice of each sex proved to be uncomplicated. The mice learned rather quickly when challenged with tasks of the clicker training protocol, and almost all trained mice overcame the challenges they were given (100% of female mice and 83% of male mice). This study has identified that clicker training for mice strongly correlates with reduced fear in the mice during human-mice interactions, as shown by reduced anxiety-related behaviors (e.g., defecation, vocalization, and urination) and fewer depression-like behaviors (e.g., floating). By developing a reliable protocol that can be easily integrated into the daily routine of the keeping of laboratory mice, the lifetime experience of welfare in the mice can be improved substantially.

  15. Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

    Directory of Open Access Journals (Sweden)

    Majid Mumtaz

    2016-10-01

    Full Text Available Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509 certificates. The system uses Public Key Infrastructure (PKI, challenge/response protocol, mobile proxy servers, and Java cards with crypto capabilities used as a Secure Element. Innovative design of the protocol, its implementation, and evaluation results are described. In addition to end-user authentication, the described solution also supports the use of X.509 certificates for additional security services – confidentiality, integrity, and non-repudiation of transactions and data in an open network environment. The system uses Application Programming Interfaces (APIs to access Java cards functions and credentials that can be used as add-ons to enhance any mobile application with security features and services.

  16. Quantum private comparison protocol based on the entanglement swapping between χ ^+ state and W-Class state

    Science.gov (United States)

    Xu, Ling; Zhao, Zhiwen

    2017-12-01

    Quantum private comparison (QPC) protocol, including Alice, Bob and the third party Charlie, aims at comparing Alice and Bob's secret inputs correctly without leaking them. Firstly, χ ^+ state and W-Class state are used to conduct the entanglement swapping in this protocol. Either the basis {|φ ^± > ,|ψ ^± >} or the basis {|χ ^± > ,|ω ^± > } is chosen by Alice and Bob based on the predetermined value to measure the particle pairs. And three bits of secret inputs can be compared in this protocol in every comparison time, while most of previous QPC protocols can only compare one or two bits. The qubit efficiency of this protocol is 60% more than others, which are 50% at most. Secondly, if the eavesdropper intends to obtain the secret inputs, it is important and primary to get the measurement results of particle pairs. In this protocol, even if the eavesdropper gets the accurate particle pairs, he cannot get the right measurement results without the right basis. Finally, this protocol is analyzed to be able to defend the secret inputs against various kinds of attack.

  17. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  18. Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things

    Directory of Open Access Journals (Sweden)

    Anup Kumar Maurya

    2017-10-01

    Full Text Available To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs and the Internet of Things (IoT. Session key establishment between the sensor node and the user is also required for secure communication. In this paper, we perform the security analysis of A.K.Das’s user authentication scheme (given in 2015, Choi et al.’s scheme (given in 2016, and Park et al.’s scheme (given in 2016. The security analysis shows that their schemes are vulnerable to various attacks like user impersonation attack, sensor node impersonation attack and attacks based on legitimate users. Based on the cryptanalysis of these existing protocols, we propose a secure and efficient authenticated session key establishment protocol which ensures various security features and overcomes the drawbacks of existing protocols. The formal and informal security analysis indicates that the proposed protocol withstands the various security vulnerabilities involved in WSNs. The automated validation using AVISPA and Scyther tool ensures the absence of security attacks in our scheme. The logical verification using the Burrows-Abadi-Needham (BAN logic confirms the correctness of the proposed protocol. Finally, the comparative analysis based on computational overhead and security features of other existing protocol indicate that the proposed user authentication system is secure and efficient. In future, we intend to implement the proposed protocol in real-world applications of WSNs and IoT.

  19. ADAPTIVE CLUSTER BASED ROUTING PROTOCOL WITH ANT COLONY OPTIMIZATION FOR MOBILE AD-HOC NETWORK IN DISASTER AREA

    Directory of Open Access Journals (Sweden)

    Enrico Budianto

    2012-07-01

    Full Text Available In post-disaster rehabilitation efforts, the availability of telecommunication facilities takes important role. However, the process to improve telecommunication facilities in disaster area is risky if it is done by humans. Therefore, a network method that can work efficiently, effectively, and capable to reach the widest possible area is needed. This research introduces a cluster-based routing protocol named Adaptive Cluster Based Routing Protocol (ACBRP equipped by Ant Colony Optimization method, and its implementation in a simulator developed by author. After data analysis and statistical tests, it can be concluded that routing protocol ACBRP performs better than AODV and DSR routing protocol. Pada upaya rehabilitasi pascabencana, ketersediaan fasilitas telekomunikasi memiliki peranan yang sangat penting. Namun, proses untuk memperbaiki fasilitas telekomunikasi di daerah bencana memiliki resiko jika dilakukan oleh manusia. Oleh karena itu, metode jaringan yang dapat bekerja secara efisien, efektif, dan mampu mencapai area seluas mungkin diperlukan. Penelitian ini memperkenalkan sebuah protokol routing berbasis klaster bernama Adaptive Cluster Based Routing Protocol (ACBRP, yang dilengkapi dengan metode Ant Colony Optimization, dan diimplementasikan pada simulator yang dikembangkan penulis. Setelah data dianalisis dan dilakukan uji statistik, disimpulkan bahwa protokol routing ACBRP beroperasi lebih baik daripada protokol routing AODV maupun DSR.

  20. A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Comparison of Routing Protocol for WSNs: Redundancy Based Approach

    Directory of Open Access Journals (Sweden)

    Anand Prakash

    2014-03-01

    Full Text Available Wireless Sensor Networks (WSNs with their dynamic applications gained a tremendous attention of researchers. Constant monitoring of critical situations attracted researchers to utilize WSNs at vast platforms. The main focus in WSNs is to enhance network localization as much as one could, for efficient and optimal utilization of resources. Different approaches based upon redundancy are proposed for optimum functionality. Localization is always related with redundancy of sensor nodes deployed at remote areas for constant and fault tolerant monitoring. In this work, we propose a comparison of classic flooding and the gossip protocol for homogenous networks which enhances stability and throughput quiet significantly.  

  1. Other enrichment related contracts

    International Nuclear Information System (INIS)

    Hall, J.C.

    1978-01-01

    In addition to long-term enrichment contracts, DOE has other types of contracts: (1) short-term, fixed-commitment enrichment contract; (2) emergency sales agreement for enriched uranium; (3) feed material lease agreement; (4) enriched uranium storage agreement; and (5) feed material usage agreement

  2. Schoolwide Enrichment Model: Challenging All Children to Excel

    Science.gov (United States)

    Beecher, Margaret

    2010-01-01

    This article summarizes how the components of the Schoolwide Enrichment Model were used to dramatically reduce the achievement gap in a school with a high at-risk student population. The theories of enrichment and instructional differentiation replaced an existing remedial paradigm and a strength-based methodology was embraced by the school…

  3. Effects of citrate-enriched bicarbonate based dialysate on anticoagulation and dialyzer reuse in maintenance hemodialysis patients.

    Science.gov (United States)

    Rocha, Amanda D; Padua, Vanessa C; Oliveira, Esther; Guimaraes, Márcia M; Lugon, Jocemir R; Strogoff de Matos, Jorge P

    2014-04-01

    Systemic anticoagulation with unfractionated heparin is commonly used in maintenance hemodialysis (HD), but it increases the risk of bleeding complications. We investigated whether the use of citrate-enriched bicarbonate based dialysate (CD) would reduce systemic anticoagulation without compromising the efficacy of reprocessed dialyzers. This is a crossover study in which half of a total of 30 patients initially underwent HD with acetate-enriched bicarbonate based dialysate and a standard heparin dose of ∼ 100 IU/kg (Treatment A), whereas the remaining patients were treated with CD and a 30% reduced heparin dose (Treatment B). After 12 consecutive HD sessions in each treatment, the dialysate and heparin doses were reversed, then followed for another period of 12 HD sessions. The two treatment phases were split by a washout period of six HD sessions using acetate-enriched bicarbonate based dialysate and standard heparin dose. Systemic anticoagulation was higher in Treatment A. The activated partial thromboplastin time at the end of HD session was 68 ± 36 seconds in Treatment A and 47 ± 16 seconds in Treatment B (P = 0.005). Sixty-eight percent of the dialyzers remained adequate until the 12th use in Treatment A and 61% did so in Treatment B (P = 0.63). Patients had three and 24 cramps episodes during Treatment A and B, respectively (P < 0.001). Nine and 26 symptomatic intradialytic hypotension episodes were seen in Treatment A and B, respectively, (P = 0.003). In conclusion, the use of CD had a favorable effect on anticoagulation in the extracorporeal circuit in patients on maintenance HD, but it was also associated with more hypotension and cramps. © 2013 International Society for Hemodialysis.

  4. Physical and welding metallurgy of Gd-enriched austenitic alloys for spent nuclear fuel applications. Part II, nickel base alloys

    International Nuclear Information System (INIS)

    Mizia, Ronald E.; Michael, Joseph Richard; Williams, David Brian; Dupont, John Neuman; Robino, Charles Victor

    2004-01-01

    The physical and welding a metallurgy of gadolinium- (Gd-) enriched Ni-based alloys has been examined using a combination of differential thermal analysis, hot ductility testing. Varestraint testing, and various microstructural characterization techniques. Three different matrix compositions were chosen that were similar to commercial Ni-Cr-Mo base alloys (UNS N06455, N06022, and N06059). A ternary Ni-Cr-Gd alloy was also examined. The Gd level of each alloy was ∼2 wt-%. All the alloys initiated solidification by formation of primary austenite and terminated solidification by a Liquid γ + Ni 5 Gd eutectic-type reaction at ∼1270 C. The solidification temperature ranges of the alloys varied from ∼100 to 130 C (depending on alloy composition). This is a substantial reduction compared to the solidification temperature range to Gd-enriched stainless steels (360 to 400 C) that terminate solidification by a peritectic reaction at ∼1060 C. The higher-temperature eutectic reaction that occurs in the Ni-based alloys is accompanied by significant improvements in hot ductility and solidification cracking resistance. The results of this research demonstrate that Gd-enriched Ni-based alloys are excellent candidate materials for nuclear criticality control in spent nuclear fuel storage applications that require production and fabrication of large amounts of material through conventional ingot metallurgy and fusion welding techniques

  5. Routing protocol for wireless quantum multi-hop mesh backbone network based on partially entangled GHZ state

    Science.gov (United States)

    Xiong, Pei-Ying; Yu, Xu-Tao; Zhang, Zai-Chen; Zhan, Hai-Tao; Hua, Jing-Yu

    2017-08-01

    Quantum multi-hop teleportation is important in the field of quantum communication. In this study, we propose a quantum multi-hop communication model and a quantum routing protocol with multihop teleportation for wireless mesh backbone networks. Based on an analysis of quantum multi-hop protocols, a partially entangled Greenberger-Horne-Zeilinger (GHZ) state is selected as the quantum channel for the proposed protocol. Both quantum and classical wireless channels exist between two neighboring nodes along the route. With the proposed routing protocol, quantum information can be transmitted hop by hop from the source node to the destination node. Based on multi-hop teleportation based on the partially entangled GHZ state, a quantum route established with the minimum number of hops. The difference between our routing protocol and the classical one is that in the former, the processes used to find a quantum route and establish quantum channel entanglement occur simultaneously. The Bell state measurement results of each hop are piggybacked to quantum route finding information. This method reduces the total number of packets and the magnitude of air interface delay. The deduction of the establishment of a quantum channel between source and destination is also presented here. The final success probability of quantum multi-hop teleportation in wireless mesh backbone networks was simulated and analyzed. Our research shows that quantum multi-hop teleportation in wireless mesh backbone networks through a partially entangled GHZ state is feasible.

  6. Receiver-Based Ad Hoc On Demand Multipath Routing Protocol for Mobile Ad Hoc Networks.

    Science.gov (United States)

    Al-Nahari, Abdulaziz; Mohamad, Mohd Murtadha

    2016-01-01

    Decreasing the route rediscovery time process in reactive routing protocols is challenging in mobile ad hoc networks. Links between nodes are continuously established and broken because of the characteristics of the network. Finding multiple routes to increase the reliability is also important but requires a fast update, especially in high traffic load and high mobility where paths can be broken as well. The sender node keeps re-establishing path discovery to find new paths, which makes for long time delay. In this paper we propose an improved multipath routing protocol, called Receiver-based ad hoc on demand multipath routing protocol (RB-AOMDV), which takes advantage of the reliability of the state of the art ad hoc on demand multipath distance vector (AOMDV) protocol with less re-established discovery time. The receiver node assumes the role of discovering paths when finding data packets that have not been received after a period of time. Simulation results show the delay and delivery ratio performances are improved compared with AOMDV.

  7. A novel porcine cell culture based protocol for the propagation of hepatitis E virus

    Directory of Open Access Journals (Sweden)

    Walter Chingwaru

    2016-08-01

    Full Text Available Objective: To present a comprehensive protocol for the processing of hepatitis E virus (HEV infected samples and propagation of the virus in primary cell cultures. Methods: Hepatitis E was extracted from porcine liver and faecal samples following standard protocols. The virus was then allowed to attach in the presence of trypsin to primary cells that included porcine and bovine intestinal epithelial cells and macrophages over a period of up to 3 h. The virus was propagated by rotational passaging through the cell cultures. Propagation was confirmed by immunoblotting. Results: We developed a comprehensive protocol to propagate HEV in porcine cell model that includes (i rotational culturing of the virus between porcine cell types, (ii pre-incubation of infected cells for 210 min, (iii use of a semi-complete cell culture medium supplemented with trypsin (0.33 µg/mL and (iv the use of simple immunoblot technique to detect the amplified virus based on the open reading frame 2/3. Conclusions: This protocol opens doors towards systematic analysis of the mechanisms that underlie the pathogenesis of HEV in vitro. Using our protocol, one can complete the propagation process within 6 to 9 d.

  8. A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation

    International Nuclear Information System (INIS)

    Li Jian; Song Danjie; Guo Xiaojing; Jing Bo

    2012-01-01

    In order to transmit secure messages, a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented. The five-particle cluster state is used to detect eavesdroppers, and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol. In the security analysis, the entropy theory method is introduced, and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all the information, the detection rate of the original ping-pong protocol is 50%; the second protocol, using two particles of the Einstein-Podolsky-Rosen pair as detection particles, is also 50%; while the presented protocol is 89%. Finally, the security of the proposed protocol is discussed, and the analysis results indicate that the protocol in this paper is more secure than the other two. (authors)

  9. Application of free-air CO2 enrichment (FACE) technology to a forest canopy: A simulation study

    International Nuclear Information System (INIS)

    Lipfert, F.W.; Hendrey, G.R.; Lewin, K.L.; Alexander, Y.

    1992-03-01

    Forest ecosystems constitute an important part of the planet's land cover. Understanding their exchanges of carbon with the atmosphere is crucial in projecting future net atmospheric CO 2 increases. It is also important that experimental studies of these processes be performed under conditions which are as realistic as possible, particularly with respect to photosynthesis and evapotranspiration. New technology and experimental protocols now exist which can facilitate studying an undisturbed forest canopy under long-term enriched CO 2 conditions. The International Geosphere Biosphere Program of the International Council of Scientific Unions has established a subprogram on Global Change and Terrestrial Ecosystems (GCTE). This program is driven by two major concerns: to be able to predict the effects of global change on the structure and function of ecosystems, and to predict how these changes will control both atmospheric CO 2 and climate, through various feedback pathways. Brookhaven National Laboratory (BNL) has developed a system for exposing field-grown plants to controlled elevated concentrations of atmospheric gases, without use of confining chambers that alter important atmospheric exchange processes. This system, called FACE for Free Air CO 2 Enrichment. This paper focuses on the fluid mechanics of free-air fumigation and uses a numerical simulation model based on superposed gaussian plumes to project how the present ground-based system could be used to fumigate an elevated forest canopy

  10. L-Lactate-selective microbial sensor based on flavocytochrome b2-enriched yeast cells using recombinant and nanotechnology approaches.

    Science.gov (United States)

    Karkovska, Maria; Smutok, Oleh; Stasyuk, Nataliya; Gonchar, Mykhailo

    2015-11-01

    In the recent years, nanotechnology is the most developing branch due to a wide variety of potential applications in biomedical, biotechnological and agriculture fields. The binding nanoparticles with various biological molecules makes them attractive candidates for using in sensor technologies. The particularly actual is obtaining the bionanomembranes based on biocatalytic elements with improved sensing characteristics. The aim of this investigation is to study the properties of microbial L-lactate-selective sensor based on using the recombinant Hansenula polymorpha yeast cells overproducing flavocytochrome b2 (FC b2), as well as additionally enriched by the enzyme bound with gold nanoparticles (FC b2-nAu). Although, the high permeability of the living cells to nanoparticles is being intensively studied (mostly for delivery of drugs), the idea of using both recombinant technology and nanotechnology to increase the amount of the target enzyme in the biosensing layer is really novel. The FC b2-nAu-enriched living and permeabilized yeast cells were used for construction of a bioselective membrane of microbial L-lactate-selective amperometric biosensor. Phenazine methosulphate was served as a free defusing electron transfer mediator which provides effective electron transfer from the reduced enzyme to the electrode surface. It was shown that the output to L-lactate of FC b2-nAu-enriched permeabilized yeast cells is 2.5-fold higher when compared to the control cells. The obtained results confirm that additional enrichment of the recombinant yeast cell by the enzyme bound with nanoparticles improves the analytical parameters of microbial sensor. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. The Helikon technique for isotope enrichment

    International Nuclear Information System (INIS)

    Haarhoff, P.C.

    1976-11-01

    The separating element employed in the UCOR process for uranium enrichment has an enriched stream which is much smaller than the depleted stream. To deal with this small cut and to exploit the full potential of the process, a new cascade technique has been developed, the so-called helikon technique. It is based on the principle that an axial flow compressor can simultaneously compress a number of streams of different isotopic composition, which flow through it in parallel, without any significant mixing between them. The technique makes it possible to achieve the desired enrichment with a relatively small number of separating units, by making the best use of the high enrichment factor available. A further feature of the helikon technique is that a module yields an enrichment factor which is not constant, but can vary. In this way a cascade can be built up from modules of a fixed size, which is a great advantage when compared to conventional cascade arrangements where several unit sizes are required. A general theoretical treatment of the helikon technique is given and the similarity between helikon and conventional cascades is pointed out. Practical helikon cascades are subsequently discussed on the basis of the UCOR process

  12. Managing public acceptance for a new enrichment facility

    International Nuclear Information System (INIS)

    Boyd, M.

    1992-01-01

    The Claiborne Enrichment Center has many first associated with it, and a solid nuclear-based community relations experience has been combined with fly-by-the-seat-of-your-pants techniques to successfully introduce a first-of-a-kind facility not only to Louisiana, but also to the US. The project is being developed by Louisiana Energy Services (LES), a limited partnership consisting of Urenco, the European enrichment consortium that operates centrifuge enrichment facilities in the United Kingdom, the Netherlands, and Germany; Fluor Daniel, an internationally known engineering and construction firm; and three utilities - Duke Power, Northern States Power, and Louisiana Power and Light (LP and L). Louisiana Energy will build the nation's first privately owned uranium enrichment facility. It will be the first commercial use of centrifuge technology for enrichment in the US. Some of the community relations challenges the project has had and their solutions are described

  13. Enhanced Harnessing of the Graviola Bioactive Components Using a Neoteric Sonication Cum Microwave Coadjuvant Extraction Protocol

    Directory of Open Access Journals (Sweden)

    Se Chul Chun

    2018-02-01

    Full Text Available Graviola is one of the most accomplished natural anticancer therapists gaining popularity in recent times. Harnessing the full benefit from tapping all of its rich bioactive reservoirs is absolutely worthy and mandatory. It is in this regard that a well optimized extraction methodology gains paramount importance. In case of Graviola, no sophistication in terms of extraction methods is reported. A neoteric sonication cum microwave combined extraction technology was introduced that maximized the extraction process and minimized (7 min the extraction time. The extraction efficiency was validated based on the significant enrichment of bioactive ingredients in Graviola extracts following the sonication cum microwave combined protocol.

  14. Cryptographic Protocols Based on Root Extracting

    DEFF Research Database (Denmark)

    Koprowski, Maciej

    In this thesis we design new cryptographic protocols, whose security is based on the hardness of root extracting or more speci cally the RSA problem. First we study the problem of root extraction in nite Abelian groups, where the group order is unknown. This is a natural generalization of the...... complexity of root extraction, even if the algorithm can choose the "public exponent'' itself. In other words, both the standard and the strong RSA assumption are provably true w.r.t. generic algorithms. The results hold for arbitrary groups, so security w.r.t. generic attacks follows for any cryptographic...... groups. In all cases, security follows from a well de ned complexity assumption (the strong root assumption), without relying on random oracles. A smooth natural number has no big prime factors. The probability, that a random natural number not greater than x has all prime factors smaller than x1/u...

  15. Erythrocyte enrichment in hematopoietic progenitor cell cultures based on magnetic susceptibility of the hemoglobin.

    Directory of Open Access Journals (Sweden)

    Xiaoxia Jin

    Full Text Available Using novel media formulations, it has been demonstrated that human placenta and umbilical cord blood-derived CD34+ cells can be expanded and differentiated into erythroid cells with high efficiency. However, obtaining mature and functional erythrocytes from the immature cell cultures with high purity and in an efficient manner remains a significant challenge. A distinguishing feature of a reticulocyte and maturing erythrocyte is the increasing concentration of hemoglobin and decreasing cell volume that results in increased cell magnetophoretic mobility (MM when exposed to high magnetic fields and gradients, under anoxic conditions. Taking advantage of these initial observations, we studied a noninvasive (label-free magnetic separation and analysis process to enrich and identify cultured functional erythrocytes. In addition to the magnetic cell separation and cell motion analysis in the magnetic field, the cell cultures were characterized for cell sedimentation rate, cell volume distributions using differential interference microscopy, immunophenotyping (glycophorin A, hemoglobin concentration and shear-induced deformability (elongation index, EI, by ektacytometry to test for mature erythrocyte attributes. A commercial, packed column high-gradient magnetic separator (HGMS was used for magnetic separation. The magnetically enriched fraction comprised 80% of the maturing cells (predominantly reticulocytes that showed near 70% overlap of EI with the reference cord blood-derived RBC and over 50% overlap with the adult donor RBCs. The results demonstrate feasibility of label-free magnetic enrichment of erythrocyte fraction of CD34+ progenitor-derived cultures based on the presence of paramagnetic hemoglobin in the maturing erythrocytes.

  16. Kyoto Protocol, constraint or opportunity for coal based electricity producers

    International Nuclear Information System (INIS)

    Balasoiu, Constantin; Alecu, Sorin

    2006-01-01

    Coming into force of Kyoto Protocol (KP) in February 2005, as a result of its signing by Russian Federation, created the lawfulness of its provisions and mechanisms in order to reduce the average emission of Greenhouse Gases (GHG) at a global level down to 5.2 %. Passing this environment problem from a constrained area (regulations, directives) to an opportunity area (business) created the possibility that the achievement of KP objectives to be not an exclusive financial task of 'polluting actors', but opened the opportunity of bringing on stage all the necessary elements of a modern business environment: banks, investments from founds companies, consultants, buyers, sellers, stocks exchange. Until now, the investments and emissions transactions based by KP mechanisms at the worldwide level was focused on renewable energy area. Because for the most of countries, including Romania, the production of electricity based on fossil fuels (special coal) is one of the main option, bringing the KP mechanisms in operation in this area is difficult for at least two reasons: - the investments are huge; - the emissions reduction is not spectacular. In these circumstances, this paper gives an overview of the present GHG emission market, transaction mechanisms on this market and of the ways through which coal based electricity producers from Romania can access this market. We consider that the filtration of the information in this area from electricity producer point of view makes the content of this paper a good start for a new approach of environment management and its conversion from constraint (financial resources consumer) to opportunity ( financial resources producer). The paper contains are as follows: 1. Kyoto Protocol at a glance; 2. Emission trading mechanisms; 2.1. Transaction mechanisms under KP; 2.1.1. Joint Implementation (JI); 2.1.2 Clean Development Mechanism (CDM); 2.1.3. Emissions Trading (ET); 2.2. Other transactions mechanisms; 2.2.1. European Union Emissions

  17. Energy Efficient Clustering Based Network Protocol Stack for 3D Airborne Monitoring System

    Directory of Open Access Journals (Sweden)

    Abhishek Joshi

    2017-01-01

    Full Text Available Wireless Sensor Network consists of large number of nodes densely deployed in ad hoc manner. Usually, most of the application areas of WSNs require two-dimensional (2D topology. Various emerging application areas such as airborne networks and underwater wireless sensor networks are usually deployed using three-dimensional (3D network topology. In this paper, a static 3D cluster-based network topology has been proposed for airborne networks. A network protocol stack consisting of various protocols such as TDMA MAC and dynamic routing along with services such as time synchronization, Cluster Head rotation, and power level management has been proposed for this airborne network. The proposed protocol stack has been implemented on the hardware platform consisting of number of TelosB nodes. This 3D airborne network architecture can be used to measure Air Quality Index (AQI in an area. Various parameters of network such as energy consumption, Cluster Head rotation, time synchronization, and Packet Delivery Ratio (PDR have been analyzed. Detailed description of the implementation of the protocol stack along with results of implementation has been provided in this paper.

  18. The Development of Target-Specific Pose Filter Ensembles To Boost Ligand Enrichment for Structure-Based Virtual Screening.

    Science.gov (United States)

    Xia, Jie; Hsieh, Jui-Hua; Hu, Huabin; Wu, Song; Wang, Xiang Simon

    2017-06-26

    Structure-based virtual screening (SBVS) has become an indispensable technique for hit identification at the early stage of drug discovery. However, the accuracy of current scoring functions is not high enough to confer success to every target and thus remains to be improved. Previously, we had developed binary pose filters (PFs) using knowledge derived from the protein-ligand interface of a single X-ray structure of a specific target. This novel approach had been validated as an effective way to improve ligand enrichment. Continuing from it, in the present work we attempted to incorporate knowledge collected from diverse protein-ligand interfaces of multiple crystal structures of the same target to build PF ensembles (PFEs). Toward this end, we first constructed a comprehensive data set to meet the requirements of ensemble modeling and validation. This set contains 10 diverse targets, 118 well-prepared X-ray structures of protein-ligand complexes, and large benchmarking actives/decoys sets. Notably, we designed a unique workflow of two-layer classifiers based on the concept of ensemble learning and applied it to the construction of PFEs for all of the targets. Through extensive benchmarking studies, we demonstrated that (1) coupling PFE with Chemgauss4 significantly improves the early enrichment of Chemgauss4 itself and (2) PFEs show greater consistency in boosting early enrichment and larger overall enrichment than our prior PFs. In addition, we analyzed the pairwise topological similarities among cognate ligands used to construct PFEs and found that it is the higher chemical diversity of the cognate ligands that leads to the improved performance of PFEs. Taken together, the results so far prove that the incorporation of knowledge from diverse protein-ligand interfaces by ensemble modeling is able to enhance the screening competence of SBVS scoring functions.

  19. Effect of administration of water enriched in O2 by injection or electrolysis on transcutaneous oxygen pressure in anesthetized pigs.

    Science.gov (United States)

    Charton, Antoine; Péronnet, François; Doutreleau, Stephane; Lonsdorfer, Evelyne; Klein, Alexis; Jimenez, Liliana; Geny, Bernard; Diemunsch, Pierre; Richard, Ruddy

    2014-01-01

    Oral administration of oxygenated water has been shown to improve blood oxygenation and could be an alternate way for oxygen (O2) supply. In this experiment, tissue oxygenation was compared in anesthetized pigs receiving a placebo or water enriched in O2 by injection or a new electrolytic process. Forty-two pigs randomized in three groups received either mineral water as placebo or water enriched in O2 by injection or the electrolytic process (10 mL/kg in the stomach). Hemodynamic parameters, partial pressure of oxygen in the arterial blood (PaO2), skin blood flow, and tissue oxygenation (transcutaneous oxygen pressure, or TcPO2) were monitored during 90 minutes of general anesthesia. Absorption and tissue distribution of the three waters administered were assessed using dilution of deuterium oxide. Mean arterial pressure, heart rate, PaO2, arteriovenous oxygen difference, and water absorption from the gut were not significantly different among the three groups. The deuterium to protium ratio was also similar in the plasma, skin, and muscle at the end of the protocol. Skin blood flow decreased in the three groups. TcPO2 slowly decreased over the last 60 minutes of the experiment in the three groups, but when compared to the control group, the values remained significantly higher in animals that received the water enriched in O2 by electrolysis. In this protocol, water enriched in O2 by electrolysis lessened the decline of peripheral tissue oxygenation. This observation is compatible with the claim that the electrolytic process generates water clathrates which trap O2 and facilitate O2 diffusion along pressure gradients. Potential applications of O2-enriched water include an alternate method of oxygen supply.

  20. Prediction based Greedy Perimeter Stateless Routing Protocol for Vehicular Self-organizing Network

    Science.gov (United States)

    Wang, Chunlin; Fan, Quanrun; Chen, Xiaolin; Xu, Wanjin

    2018-03-01

    PGPSR (Prediction based Greedy Perimeter Stateless Routing) is based on and extended the GPSR protocol to adapt to the high speed mobility of the vehicle auto organization network (VANET) and the changes in the network topology. GPSR is used in the VANET network environment, the network loss rate and throughput are not ideal, even cannot work. Aiming at the problems of the GPSR, the proposed PGPSR routing protocol, it redefines the hello and query packet structure, in the structure of the new node speed and direction information, which received the next update before you can take advantage of its speed and direction to predict the position of node and new network topology, select the right the next hop routing and path. Secondly, the update of the outdated node information of the neighbor’s table is deleted in time. The simulation experiment shows the performance of PGPSR is better than that of GPSR.

  1. Uranium Enrichment, an overview

    International Nuclear Information System (INIS)

    Coates, J.H.

    1994-01-01

    This general presentation on uranium enrichment will be followed by lectures on more specific topics including descriptions of enrichment processes and assessments of the prevailing commercial and industrial situations. I shall therefore avoid as much as possible duplications with these other lectures, and rather dwell on: some theoretical aspects of enrichment in general, underlying the differences between statistical and selective processes, a review and comparison between enrichment processes, remarks of general order regarding applications, the proliferation potential of enrichment. It is noteworthy that enrichment: may occur twice in the LWR fuel cycle: first by enriching natural uranium, second by reenriching uranium recovered from reprocessing, must meet LWR requirements, and in particular higher assays required by high burn up fuel elements, bears on the structure of the entire front part of the fuel cycle, namely in the conversion/reconversion steps only involving UF 6 for the moment. (author). tabs., figs., 4 refs

  2. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications

    Directory of Open Access Journals (Sweden)

    Dina Shehada

    2017-01-01

    Full Text Available Mobile agents are smart programs that migrate from one platform to another to perform the user task. Mobile agents offer flexibility and performance enhancements to systems and service real-time applications. However, security in mobile agent systems is a great concern. In this paper, we propose a novel Broadcast based Secure Mobile Agent Protocol (BROSMAP for distributed service applications that provides mutual authentication, authorization, accountability, nonrepudiation, integrity, and confidentiality. The proposed system also provides protection from man in the middle, replay, repudiation, and modification attacks. We proved the efficiency of the proposed protocol through formal verification with Scyther verification tool.

  3. Survey is based on Synchronized and Asynchronized Approach of MAC Protocols in WSN

    Directory of Open Access Journals (Sweden)

    Soni Chaurasia

    2010-07-01

    Full Text Available A wireless network is made of spatially distributed autonomous devices. These devices are called sensors. The sensor is used for monitoring physical or environmental conditions. The potential application of wireless sensor network is environmental monitoring, healthcare applications and tactical systems. In this paper focus is on the MAC protocol for WSN. Wireless sensor network is deployed for wide range to send and receive data with the help of medium. Here literature survey of MAC protocol based on the synchronized and asynchronized approach is described which is used to meet different objective like access a medium, statistical channel allocation, spectrum utilization

  4. A new protocol for extraction of C 0 t-1 DNA from rice | Yan | African ...

    African Journals Online (AJOL)

    C0t-1 DNA, enriched for repetitive DNA sequences, has been proved to be valuable in the studies of plant species differentiation and genome evolution. A new protocol to steadily obtain the aimed range of DNA fragments has been developed by shearing the genomic DNA with the digest system containing DNase ...

  5. Evaluation of a RF-Based Approach for Tracking UF6 Cylinders at a Uranium Enrichment Plant

    International Nuclear Information System (INIS)

    Pickett, Chris A; Younkin, James R; Kovacic, Donald N; Laughter, Mark D; Hines, Jairus B; Boyer, Brian Martinez

    2008-01-01

    Approved industry-standard cylinders are used globally to handle and store uranium hexafluoride (UF 6 ) feed, product, tails, and samples at uranium enrichment plants. The International Atomic Energy Agency (IAEA) relies on time-consuming physical inspections to verify operator declarations and detect possible diversion of UF 6 . Development of a reliable, automated, and tamper-resistant system for near real-time tracking and monitoring UF 6 cylinders (as they move within an enrichment facility) would greatly improve the inspector function. This type of system can reduce the risk of false or misreported cylinder tare weights, diversion of nuclear material, concealment of excess production, utilization of undeclared cylinders, and misrepresentation of the cylinders contents. This paper will describe a proof-of-concept approach that was designed to evaluate the feasibility of using radio frequency (RF)-based technologies to track individual UF 6 cylinders throughout a portion of their life cycle, and thus demonstrate the potential for improved domestic accountability of materials, and a more effective and efficient method for application of site-level IAEA safeguards. The evaluation system incorporates RF-based identification devices (RFID) which provide a foundation for establishing a reliable, automated, and near real-time tracking system that can be set up to utilize site-specific, rules-based detection algorithms. This paper will report results from a proof-of-concept demonstration at a real enrichment facility that is specifically designed to evaluate both the feasibility of using RF to track cylinders and the durability of the RF equipment to survive the rigors of operational processing and handling. The paper also discusses methods for securely attaching RF devices and describes how the technology can effectively be layered with other safeguard systems and approaches to build a robust system for detecting cylinder diversion. Additionally, concepts for off

  6. Combination of Cobe AutoPBSC and Gambro Elutra as a platform for monocyte enrichment in dendritic cell (DC) therapy: clinical study.

    Science.gov (United States)

    Chen, Ying; Hoecker, Paul; Zeng, Jia; Dettke, Markus

    2008-01-01

    Monocytes are a common source for generating dendritic cells (DCs). The aim of the present study was to evaluate the efficiency of a platform for monocyte collection and enrichment in a clinical setting. The platform was based on the combination of two semiautomated devices; the Cobe Spectra Auto PBSC for mononuclear cells (MNC) collection followed by counterflow elutriation for monocyte enrichment (Gambro BCT Elutra). Twenty-four patients with various types of epithelial cancer participated in the study. MNC collections were first performed as large volume leukapheresis (LVL). Subsequently, MNC products were processed with an elutriation system for monocyte isolation. LVL resulted in the collection of MNC at a median of 8.1 x 10(9) cells, containing of 31.4% monocytes. A similar efficacy was also shown in patients with lower peripheral blood counts. Elutriation of the MNC product with the Cobe Elutra device resulted in the enrichment of monocytes at a median of 2.7 x 10(9) cells, with a recovery of 80.2% and a purity of 90.7%. These monocytes were then successfully developed into DCs for clinical therapy after in vitro manipulation. These data suggest that the combination of the Cobe Spectra Auto PBSC and the Gambro BCT Elutra is an effective platform for monocyte enrichment in clinical practice according to GCP standards and GMP guidelines, and can be easily implemented in the clinical routine under current DC protocols. Copyright 2008 Wiley-Liss, Inc.

  7. Implementation of the Welfare Quality broiler assessment protocol – final report : overview of outcome-based measurement of broiler welfare and a general discussion on the Welfare Quality broiler assessment protocol

    NARCIS (Netherlands)

    Jong, de I.C.; Gunnink, H.; Hindle, V.A.

    2015-01-01

    In the current report, two topics related to our study on the implementation of the Welfare Quality® broiler assessment protocol are discussed. First, animal-based measures for broiler welfare, currently included in the Welfare Quality® broiler assessment protocol, are discussed with respect to

  8. Interprofessional primary care protocols: a strategy to promote an evidence-based approach to teamwork and the delivery of care.

    Science.gov (United States)

    Goldman, Joanne; Meuser, Jamie; Lawrie, Lynne; Rogers, Jess; Reeves, Scott

    2010-11-01

    Primary care reform involving interprofessional team-based care is a global phenomenon. In Ontario, Canada, 150 Family Health Teams (FHTs) have been approved in the past few years. The transition to a FHT is complex involving many changes and the processes for collaborative teamwork are not clearly delineated. To support the transition to team-based care in FHTs, a project was undertaken to develop and implement a series of interprofessional protocols in four clinical areas. These interprofessional protocols would contain relevant and evidence-based resources to support both a team and evidence-based approach to care. This paper reports on a qualitative study to examine the process of interprofessional protocol development and pilot implementation. Adopting an exploratory case study approach (Robson, 2002 ), 36 interviews were conducted with health professionals and community group members who participated in the creation and piloting of the protocols, and with project managers. In addition, observational and documentary data were gathered on the protocol development and implementation processes. The findings from the protocol development stage demonstrate the value of the focus on evidence and team, the process of assessing and targeting FHT needs, inter-organizational and interprofessional sharing, the importance of facilitation and support, and expectations for implementation. The findings from the pilot implementation stage report on the importance of champions and leaders, the implementation strategies used, FHT and organizational factors affecting implementation, and outcomes achieved. Findings are discussed in relation to the knowledge translation and interprofessional literature. Research is ongoing to examine the effectiveness of dissemination of the protocols to FHTs across the province of Ontario and its impact on health care outcomes.

  9. Quantification of Growth of Campylobacter and Extended Spectrum β-Lactamase Producing Bacteria Sheds Light on Black Box of Enrichment Procedures.

    Science.gov (United States)

    Hazeleger, Wilma C; Jacobs-Reitsma, Wilma F; den Besten, Heidy M W

    2016-01-01

    Campylobacter is well recognized as the leading cause of bacterial foodborne diarrheal disease worldwide, and is routinely found in meat originating from poultry, sheep, pigs, and cattle. Effective monitoring of Campylobacter contamination is dependent on the availability of reliable detection methods. The method of the International Organization for Standardization for the detection of Campylobacter spp. in food (ISO 10272-1:2006) recommends the use of Bolton broth (BB) as selective enrichment medium, including a pre-enrichment step of 4-6 h at 37°C to revive sublethally damaged cells prior to incubation for 2 days at 41.5°C. Recently the presence of abundantly growing extended spectrum β-lactamase producing Enterobacteriaceae (ESBL bacteria) has become one of the most important factors that interfere with the isolation of Campylobacter, resulting in false-negative detection. However, detailed growth dynamics of Campylobacter and its competitors remain unclear, where these would provide a solid base for further improvement of the enrichment procedure for Campylobacter. Other enrichment broths, such as Preston broth (PB) and BB plus clavulanic acid (BBc) have been suggested to inhibit competitive flora. Therefore, these different broths were used as enrichments to measure the growth kinetics of several strains of Campylobacter jejuni and ESBL bacteria separately, in co-culture and of strains in chicken samples. The maximum cell numbers and often the growth rates of Campylobacter in mixed culture with ESBL bacteria were significantly lower than in single cultures, indicating severe suppression of Campylobacter by ESBL bacteria, also in naturally contaminated samples. PB and BBc successfully diminished ESBL bacteria and might therefore be a better choice as enrichment medium in possibly ESBL-bacteria contaminated samples. The efficacy of a pre-enrichment step in the BB ISO-procedure was not supported for cold-stressed and non-stressed cells. Therefore, omission of

  10. Report of Sectional Committee on Industrialization of Uranium Enrichment

    International Nuclear Information System (INIS)

    1981-01-01

    In order to accelerate the development and utilization of atomic energy which is the core of the substitute energies for petroleum, it is indispensable requirement to establish independent fuel cycle as the base. In particular, the domestic production of enriched uranium is necessary to eliminate the obstacles to secure the energy supply in Japan. The construction and operation of the pilot plant for uranium enrichment by centrifugal separation method have progressed smoothly, and the technical base for the domestic production of enriched uranium is being consolidated. For the time being, the service of uranium enrichment is given by USA and France, but it is expected that the short supply will arise around 1990. The start of operation of the uranium enrichment plant in Japan is scheduled around 1990, and the scale of the plant will be expanded stepwise thereafter. The scale of production is assumed as 3000 t SWU/year in 2000. Prior to this commercial plant, the prototype plant of up to 250 t SWU/year capacity will be operated in 1986, starting the production of centrifugal separators in 1983. The production line for centrifugal separators will have the capacity of up to 125 t SWU/year. The organization for operating these plants, the home production of natural uranium conversion, the uranium enrichment by chemical method and others are described. (Kako, I.)

  11. Total synthesis of Ivorenolide A following a base-induced elimination protocol.

    Science.gov (United States)

    Mohapatra, Debendra K; Umamaheshwar, Gonela; Rao, R Nageshwar; Rao, T Srinivasa; R, Sudheer Kumar; Yadav, Jhillu S

    2015-02-20

    A concise and stereocontrolled first total synthesis of Ivorenolide A (1) is reported in 16 longest linear steps with a 13.4% overall yield starting from (+)-diethyl tartrate (DET). Key features are base-induced elimination protocol for the construction of chiral propargyl alcohols in both fragments, Pd-catalyzed cross-coupling of terminal acetylenes, and Shiina's 2-methyl-6-nitrobezoic anhydride (MNBA) mediated macrolactonization.

  12. A combined enrichment/polymerase chain reaction based method for the routine screening of Streptococcus agalactiae in pregnant women

    Directory of Open Access Journals (Sweden)

    F.M. Munari

    2012-03-01

    Full Text Available Group B Streptococcus (GBS is the most common cause of life-threatening infection in neonates. Guidelines from CDC recommend universal screening of pregnant women for rectovaginal GBS colonization. The objective of this study was to compare the performance of a combined enrichment/PCR based method targeting the atr gene in relation to culture using enrichment with selective broth medium (standard method to identify the presence of GBS in pregnant women. Rectovaginal GBS samples from women at ≥36 weeks of pregnancy were obtained with a swab and analyzed by the two methods. A total of 89 samples were evaluated. The prevalence of positive results for GBS detection was considerable higher when assessed by the combined enrichment/PCR method than with the standard method (35.9% versus 22.5%, respectively. The results demonstrated that the use of selective enrichment broth followed by PCR targeting the atr gene is a highly sensitive, specific and accurate test for GBS screening in pregnant women, allowing the detection of the bacteria even in lightly colonized patients. This PCR methodology may provide a useful diagnostic tool for GBS detection and contributes for a more accurate and effective intrapartum antibiotic and lower newborn mortality and morbidity.

  13. Enrichment 2.0 Gifted and Talented Education for the 21st Century

    Science.gov (United States)

    Eckstein, Michelle

    2009-01-01

    Enrichment clusters, a component of the Schoolwide Enrichment Model, are multigrade investigative groups based on constructivist learning methodology. Enrichment clusters are organized around major disciplines, interdisciplinary themes, or cross-disciplinary topics. Within clusters, students are grouped across grade levels by interests and focused…

  14. A Guide to Writing a Qualitative Systematic Review Protocol to Enhance Evidence-Based Practice in Nursing and Health Care.

    Science.gov (United States)

    Butler, Ashleigh; Hall, Helen; Copnell, Beverley

    2016-06-01

    The qualitative systematic review is a rapidly developing area of nursing research. In order to present trustworthy, high-quality recommendations, such reviews should be based on a review protocol to minimize bias and enhance transparency and reproducibility. Although there are a number of resources available to guide researchers in developing a quantitative review protocol, very few resources exist for qualitative reviews. To guide researchers through the process of developing a qualitative systematic review protocol, using an example review question. The key elements required in a systematic review protocol are discussed, with a focus on application to qualitative reviews: Development of a research question; formulation of key search terms and strategies; designing a multistage review process; critical appraisal of qualitative literature; development of data extraction techniques; and data synthesis. The paper highlights important considerations during the protocol development process, and uses a previously developed review question as a working example. This paper will assist novice researchers in developing a qualitative systematic review protocol. By providing a worked example of a protocol, the paper encourages the development of review protocols, enhancing the trustworthiness and value of the completed qualitative systematic review findings. Qualitative systematic reviews should be based on well planned, peer reviewed protocols to enhance the trustworthiness of results and thus their usefulness in clinical practice. Protocols should outline, in detail, the processes which will be used to undertake the review, including key search terms, inclusion and exclusion criteria, and the methods used for critical appraisal, data extraction and data analysis to facilitate transparency of the review process. Additionally, journals should encourage and support the publication of review protocols, and should require reference to a protocol prior to publication of the

  15. Uranium enrichment

    International Nuclear Information System (INIS)

    Mohrhauer, H.

    1982-01-01

    The separation of uranium isotopes in order to enrich the fuel for light water reactors with the light isotope U-235 is an important part of the nuclear fuel cycle. After the basic principals of isotope separation the gaseous diffusion and the centrifuge process are explained. Both these techniques are employed on an industrial scale. In addition a short review is given on other enrichment techniques which have been demonstrated at least on a laboratory scale. After some remarks on the present situation on the enrichment market the progress in the development and the industrial exploitation of the gas centrifuge process by the trinational Urenco-Centec organisation is presented. (orig.)

  16. United States uranium enrichment policies

    International Nuclear Information System (INIS)

    Roberts, R.W.

    1977-01-01

    ERDA's uranium enrichment program policies governing the manner in which ERDA's enrichment complex is being operated and expanded to meet customer requirements for separative work, research and development activities directed at providing technology alternatives for future enrichment capacity, and establishing the framework for additional domestic uranium enrichment capacity to meet the domestic and foreign nuclear industry's growing demand for enrichment services are considered. The ERDA enrichment complex consists of three gaseous diffusion plants located in Oak Ridge, Tennessee; Paducah, Kentucky; and Portsmouth, Ohio. Today, these plants provide uranium enrichment services for commercial nuclear power generation. These enrichment services are provided under contracts between the Government and the utility customers. ERDA's program involves a major pilot plant cascade, and pursues an advanced isotope separation technique for the late 1980's. That the United States must develop additional domestic uranium enrichment capacity is discussed

  17. Differential Sarcomere and Electrophysiological Maturation of Human iPSC-Derived Cardiac Myocytes in Monolayer vs. Aggregation-Based Differentiation Protocols

    Directory of Open Access Journals (Sweden)

    Dorota Jeziorowska

    2017-06-01

    Full Text Available Human induced pluripotent stem cells (iPSCs represent a powerful human model to study cardiac disease in vitro, notably channelopathies and sarcomeric cardiomyopathies. Different protocols for cardiac differentiation of iPSCs have been proposed either based on embroid body formation (3D or, more recently, on monolayer culture (2D. We performed a direct comparison of the characteristics of the derived cardiomyocytes (iPSC-CMs on day 27 ± 2 of differentiation between 3D and 2D differentiation protocols with two different Wnt-inhibitors were compared: IWR1 (inhibitor of Wnt response or IWP2 (inhibitor of Wnt production. We firstly found that the level of Troponin T (TNNT2 expression measured by FACS was significantly higher for both 2D protocols as compared to the 3D protocol. In the three methods, iPSC-CM show sarcomeric structures. However, iPSC-CM generated in 2D protocols constantly displayed larger sarcomere lengths as compared to the 3D protocol. In addition, mRNA and protein analyses reveal higher cTNi to ssTNi ratios in the 2D protocol using IWP2 as compared to both other protocols, indicating a higher sarcomeric maturation. Differentiation of cardiac myocytes with 2D monolayer-based protocols and the use of IWP2 allows the production of higher yield of cardiac myocytes that have more suitable characteristics to study sarcomeric cardiomyopathies.

  18. The assisting system for uranium enrichment plant operation

    International Nuclear Information System (INIS)

    Nakazawa, Hiroaki; Yamamoto, Fumio

    1990-01-01

    We have been developing an operation assisting system, partially supported by AI system, for uranium enrichment plant. The AI system is a proto-type system aiming a final one which can be applied to any future large uranium enrichment plant and also not only to specific operational area but also to complex and multi-phenomenon operational area. An existing AI system, for example facility diagnostic system that utilizes the result of CCT analysis as knowledge base, has weakness in flexibility and potentiality. To build AI system, we have developed the most suitable knowledge representations using deep knowledge for each facility or operation of uranium enrichment plant. This paper describes our AI proto-type system adopting several knowledge representations that can represent an uranium enrichment plant's operation with deep knowledge. (author)

  19. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.K.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt

  20. What Is the Best NGS Enrichment Method for the Molecular Diagnosis of Monogenic Diabetes and Obesity?

    Directory of Open Access Journals (Sweden)

    Julien Philippe

    Full Text Available Molecular diagnosis of monogenic diabetes and obesity is of paramount importance for both the patient and society, as it can result in personalized medicine associated with a better life and it eventually saves health care spending. Genetic clinical laboratories are currently switching from Sanger sequencing to next-generation sequencing (NGS approaches but choosing the optimal protocols is not easy. Here, we compared the sequencing coverage of 43 genes involved in monogenic forms of diabetes and obesity, and variant detection rates, resulting from four enrichment methods based on the sonication of DNA (Agilent SureSelect, RainDance technologies, or using enzymes for DNA fragmentation (Illumina Nextera, Agilent HaloPlex. We analyzed coding exons and untranslated regions of the 43 genes involved in monogenic diabetes and obesity. We found that none of the methods achieves yet full sequencing of the gene targets. Nonetheless, the RainDance, SureSelect and HaloPlex enrichment methods led to the best sequencing coverage of the targets; while the Nextera method resulted in the poorest sequencing coverage. Although the sequencing coverage was high, we unexpectedly found that the HaloPlex method missed 20% of variants detected by the three other methods and Nextera missed 10%. The question of which NGS technique for genetic diagnosis yields the highest diagnosis rate is frequently discussed in the literature and the response is still unclear. Here, we showed that the RainDance enrichment method as well as SureSelect, which are both based on the sonication of DNA, resulted in a good sequencing quality and variant detection, while the use of enzymes to fragment DNA (HaloPlex or Nextera might not be the best strategy to get an accurate sequencing.

  1. Blueprint for domestic uranium enrichment

    International Nuclear Information System (INIS)

    1981-01-01

    The AEC advisory committee on domestic production of uranium enrichment has studied for more than a year how to achieve the domestic enrichment of uranium by the construction and operation of a commercial enriching plant using centrifugal separation method, and the report was submitted to the Atomic Energy Commission on August 18, 1980. Japan has depended wholly on overseas services for her uranium enrichment needs, but the development of domestic enrichment has been carried on in parallel. The AEC decided to construct a uranium enrichment pilot plant using centrifuges, and it has been forwarded as a national project. The plant is operated by the Power Reactor and Nuclear Fuel Development Corp. since 1979. The capacity of the plant will be raised to approximately 75 ton SWU a year. The centrifuges already operated have provided the first delivery of fuel of about 1 ton for the ATR ''Fugen''. The demand-supply balance of uranium enrichment service, the significance of the domestic enrichment of uranium, the evaluation of uranium enrichment technology, the target for domestic enrichment plan, the measures to promote domestic uranium enrichment, and the promotion of the construction of a demonstration plant are reported. (Kako, I.)

  2. A Game Theory-Based Obstacle Avoidance Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shujun Bi

    2011-09-01

    Full Text Available The obstacle avoidance problem in geographic forwarding is an important issue for location-based routing in wireless sensor networks. The presence of an obstacle leads to several geographic routing problems such as excessive energy consumption and data congestion. Obstacles are hard to avoid in realistic environments. To bypass obstacles, most routing protocols tend to forward packets along the obstacle boundaries. This leads to a situation where the nodes at the boundaries exhaust their energy rapidly and the obstacle area is diffused. In this paper, we introduce a novel routing algorithm to solve the obstacle problem in wireless sensor networks based on a game-theory model. Our algorithm forms a concave region that cannot forward packets to achieve the aim of improving the transmission success rate and decreasing packet transmission delays. We consider the residual energy, out-degree and forwarding angle to determine the forwarding probability and payoff function of forwarding candidates. This achieves the aim of load balance and reduces network energy consumption. Simulation results show that based on the average delivery delay, energy consumption and packet delivery ratio performances our protocol is superior to other traditional schemes.

  3. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  4. Efficacy of protocol-based pharmacotherapy management on anticoagulation with warfarin for patients with cardiovascular surgery.

    Science.gov (United States)

    Katada, Y; Nakagawa, S; Minakata, K; Odaka, M; Taue, H; Sato, Y; Yonezawa, A; Kayano, Y; Yano, I; Nakatsu, T; Sakamoto, K; Uehara, K; Sakaguchi, H; Yamazaki, K; Minatoya, K; Sakata, R; Matsubara, K

    2017-10-01

    Anticoagulation therapy with warfarin requires periodic monitoring of prothrombin time-international normalized ratio (PT-INR) and adequate dose adjustments based on the data to minimize the risk of bleeding and thromboembolic events. In our hospital, we have developed protocol-based pharmaceutical care, which we called protocol-based pharmacotherapy management (PBPM), for warfarin therapy. The protocol requires pharmacists to manage timing of blood sampling for measuring PT-INR and warfarin dosage determination based on an algorithm. This study evaluated the efficacy of PBPM in warfarin therapy by comparing to conventional pharmaceutical care. From October 2013 to June 2015, a total of 134 hospitalized patients who underwent cardiovascular surgeries received post-operative warfarin therapy. The early series of patients received warfarin therapy as the conventional care (control group, n=77), whereas the latter received warfarin therapy based on the PBPM (PBPM group, n=68). These patients formed the cohort of the present study and were retrospectively analysed. The indications for warfarin included aortic valve replacement (n=56), mitral valve replacement (n=4), mitral valve plasty (n=22) and atrial fibrillation (n=29). There were no differences in patients' characteristics between both groups. The percentage time in therapeutic range in the first 10 days was significantly higher in the PBPM group (47.1%) than that in the control group (34.4%, PWarfarin therapy based on our novel PBPM was clinically safe and resulted in significantly better anticoagulation control compared to conventional care. © 2017 John Wiley & Sons Ltd.

  5. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  6. Modeling and Simulation of a Novel Relay Node Based Secure Routing Protocol Using Multiple Mobile Sink for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Madhumathy Perumal

    2015-01-01

    Full Text Available Data gathering and optimal path selection for wireless sensor networks (WSN using existing protocols result in collision. Increase in collision further increases the possibility of packet drop. Thus there is a necessity to eliminate collision during data aggregation. Increasing the efficiency is the need of the hour with maximum security. This paper is an effort to come up with a reliable and energy efficient WSN routing and secure protocol with minimum delay. This technique is named as relay node based secure routing protocol for multiple mobile sink (RSRPMS. This protocol finds the rendezvous point for optimal transmission of data using a “splitting tree” technique in tree-shaped network topology and then to determine all the subsequent positions of a sink the “Biased Random Walk” model is used. In case of an event, the sink gathers the data from all sources, when they are in the sensing range of rendezvous point. Otherwise relay node is selected from its neighbor to transfer packets from rendezvous point to sink. A symmetric key cryptography is used for secure transmission. The proposed relay node based secure routing protocol for multiple mobile sink (RSRPMS is experimented and simulation results are compared with Intelligent Agent-Based Routing (IAR protocol to prove that there is increase in the network lifetime compared with other routing protocols.

  7. Research of Video Steganalysis Algorithm Based on H265 Protocol

    Directory of Open Access Journals (Sweden)

    Wu Kaicheng

    2015-01-01

    This paper researches LSB matching VSA based on H265 protocol with the research background of 26 original Video sequences, it firstly extracts classification features out from training samples as input of SVM, and trains in SVM to obtain high-quality category classification model, and then tests whether there is suspicious information in the video sample. The experimental results show that VSA algorithm based on LSB matching can be more practical to obtain all frame embedded secret information and carrier and video of local frame embedded. In addition, VSA adopts the method of frame by frame with a strong robustness in resisting attack in the corresponding time domain.

  8. Effects of 2 Types of Activation Protocols Based on Postactivation Potentiation on 50-m Freestyle Performance.

    Science.gov (United States)

    Cuenca-Fernández, Francisco; Ruiz-Teba, Ana; López-Contreras, Gracia; Arellano, Raúl

    2018-06-14

    Cuenca-Fernández, F, Ruiz-Teba, A, López-Contreras, G, and Arellano, R. Effects of 2 types of activation protocols based on postactivation potentiation on 50-m freestyle performance. J Strength Cond Res XX(X): 000-000, 2018-Postactivation potentiation (PAP) is a phenomenon which improves muscle contractility, strength, and speed in sporting performances through previously applied maximal or submaximal loads on the muscle system. This study aimed to assess the effects of 2 types of activation protocols based on PAP, on sprint swimming performance. A repeated-measures design was used to compare 3 different scenarios before a 50-m race. First, all of the participants performed a standard warm-up (SWU), consisting of a 400-m swim followed by dynamic stretching. This protocol acted as the control. Subsequently, the swimmers were randomly assigned into 2 groups: the swimmers in the first group performed the SWU followed by a PAP one-repetition maximum warm-up (RMWU), consisting of 3 "lunge" and 3 "arm stroke" repetitions, both at 85% of the one-repetition maximum. The swimmers in the second group performed the SWU followed by a PAP eccentric flywheel warm-up (EWU), consisting of one set of 4 repetitions of exercises of both the lower and upper limbs on an adapted eccentric flywheel at the maximal voluntary contraction. The time required for the swimmers to swim 5 and 10 m was shorter with the PAP protocols. The swimming velocity of the swimmers who underwent the EWU and RMWU protocols was faster at 5 and 10 m. The best total swimming time was not influenced by any of the protocols. When isolating swimming (excluding start performance and turn), best time was achieved with the SWU and RMWU compared with EWU (SWU: 20.86 ± 0.95 seconds; EWU: 21.25 ± 1.12 seconds; RMWU: 20.97 ± 1.22 seconds). In conclusion, a warm-up based on PAP protocols might exert an influence on performance in the first meters of a 50-m race. Nevertheless, other factors, such as fatigue, could

  9. Promotion of uranium enrichment business

    International Nuclear Information System (INIS)

    Kurushima, Morihiro

    1981-01-01

    The Committee on Nuclear Power has studied on the basic nuclear power policy, establishing its five subcommittees, entrusted by the Ministry of Nternational Trade and Industry. The results of examination by the subcommittee on uranium enrichment business are given along with a report in this connection by the Committee. In order to establish the nuclear fuel cycle, the aspect of uranium enrichment is essential. The uranium enrichment by centrifugal process has proceeded steadily in Power Reactor and Nuclear Fuel Development Corporation. The following matters are described: the need for domestic uranium enrichment, the outlook for overseas enrichment services and the schedule for establishing domestic enrichment business, the current state of technology development, the position of the prototype enrichment plant, the course to be taken to establish enrichment business the main organization operating the prototype and commercial plants, the system of supplying centrifuges, the domestic conversion of natural uranium the subsidies for uranium enrichment business. (J.P.N.)

  10. Energy Threshold-based Cluster Head Rotation for Routing Protocol in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hadi Raheem Ali

    2018-05-01

    Full Text Available Energy efficiency represents a fundamental issue in WSNs, since the network lifetime period entirely depends on the energy of sensor nodes, which are usually battery-operated. In this article, an unequal clustering-based routing protocol has been suggested, where parameters of energy, distance, and density are involved in the cluster head election. Besides, the sizes of clusters are unequal according to distance, energy, and density. Furthermore, the cluster heads are not changed every round unless the residual energy reaches a specific threshold of energy. The outcomes of the conducted simulation confirmed that the performance of the suggested protocol achieves improvement in energy efficiency.

  11. Using salivary cortisol to measure the effects of a Wilbarger protocol-based procedure on sympathetic arousal: a pilot study.

    Science.gov (United States)

    Kimball, Judith G; Lynch, Keara M; Stewart, Kelli C; Williams, Nicole E; Thomas, Meghan A; Atwood, Kam D

    2007-01-01

    This study investigated changes in salivary cortisol, the stress hormone, after administration of a procedure based on the Wilbarger protocol to children diagnosed with sensory defensiveness (SD), a type of sensory modulation dysfunction. Using a single-subject design across participants, we studied 4 boys with SD ages 3 to 5 years. Each participant completed four sessions consisting of the collection of a saliva sample, administration of a procedure based on the Wilbarger protocol, 15 min of quiet neutral activities to allow time for any changes in cortisol level to manifest in the saliva, and the second collection of saliva. Saliva samples were analyzed using enzyme-linked immunosorbent assay (ELISA). Salivary cortisol levels in all participants changed after each of four applications of a procedure based on the Wilbarger protocol. The cortisol levels of 2 children whose levels were relatively higher on pretest decreased at each posttest. The levels of 1 child whose cortisol was higher on pretest three times decreased those three times and increased the one time the pretest cortisol was lower. The levels of 1 child who had the lowest cortisol levels of any of the children increased each time. Therefore, in all participants, cortisol moved in the direction of modulation. In these 4 boys, a procedure based on the Wilbarger protocol modulated cortisol levels toward a middle range. This pilot study indicates that there is an association between sympathetic nervous system response and the Wilbarger protocol-based procedure, as indicated by salivary cortisol levels.

  12. A network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption

    Science.gov (United States)

    Zhu, Lijuan; Liu, Jingao

    2013-07-01

    This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.

  13. Implementation of a Rapid, Protocol-based TIA Management Pathway.

    Science.gov (United States)

    Jarhult, Susann J; Howell, Melissa L; Barnaure-Nachbar, Isabelle; Chang, Yuchiao; White, Benjamin A; Amatangelo, Mary; Brown, David F; Singhal, Aneesh B; Schwamm, Lee H; Silverman, Scott B; Goldstein, Joshua N

    2018-03-01

    Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED) with symptoms of transient ischemic attack (TIA). We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6-12 months after implementation. Outcomes included ED length of stay (LOS), hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18). Following the intervention, the inpatient admission rate decreased from 62% to 24% (pTIA among those with final diagnosis of TIA was 3% for both periods. Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  14. From high enriched to low enriched uranium fuel in research reactors

    Energy Technology Data Exchange (ETDEWEB)

    Van Den Berghe, S.; Leenaers, A.; Koonen, E.; Moons, F.; Sannen, L. [Nuclear Materials Science Institute, SCK.CEN, Boeretang 200, B-2400 Mol (Belgium)

    2010-07-01

    Since the 1970's, global efforts have been going on to replace the high-enriched (>90% {sup 235}U), low-density UAlx research reactor fuel with high-density, low enriched (<20% {sup 235}U) replacements. This search is driven by the attempt to reduce the civil use of high-enriched material because of proliferation risks and terrorist threats. American initiatives, such as the Global Threat Reduction Initiative (GTRI) and the Reduced Enrichment for Research and Test Reactors (RERTR) program have triggered the development of reliable low-enriched fuel types for these reactors, which can replace the high enriched ones without loss of performance. Most success has presently been obtained with U{sub 3}Si{sub 2} dispersion fuel, which is currently used in many research reactors in the world. However, efforts to search for a replacement with even higher density, which will also allow the conversion of some high flux research reactors that currently cannot change to U{sub 3}Si{sub 2} (eg. BR2 in Belgium), have continued and are for the moment mainly directed towards the U(Mo) alloy fuel (7-10 w% Mo). This paper provides an overview of the past efforts and presents the current status of the U(Mo) development. (authors)

  15. From high enriched to low enriched uranium fuel in research reactors

    International Nuclear Information System (INIS)

    Van Den Berghe, S.; Leenaers, A.; Koonen, E.; Moons, F.; Sannen, L.

    2010-01-01

    Since the 1970's, global efforts have been going on to replace the high-enriched (>90% 235 U), low-density UAlx research reactor fuel with high-density, low enriched ( 235 U) replacements. This search is driven by the attempt to reduce the civil use of high-enriched material because of proliferation risks and terrorist threats. American initiatives, such as the Global Threat Reduction Initiative (GTRI) and the Reduced Enrichment for Research and Test Reactors (RERTR) program have triggered the development of reliable low-enriched fuel types for these reactors, which can replace the high enriched ones without loss of performance. Most success has presently been obtained with U 3 Si 2 dispersion fuel, which is currently used in many research reactors in the world. However, efforts to search for a replacement with even higher density, which will also allow the conversion of some high flux research reactors that currently cannot change to U 3 Si 2 (eg. BR2 in Belgium), have continued and are for the moment mainly directed towards the U(Mo) alloy fuel (7-10 w% Mo). This paper provides an overview of the past efforts and presents the current status of the U(Mo) development. (authors)

  16. Uranium enrichment by gas centrifuge

    International Nuclear Information System (INIS)

    Heriot, I.D.

    1988-01-01

    After recalling the physical principles and the techniques of centrifuge enrichment the report describes the centrifuge enrichment programmes of the various countries concerned and compares this technology with other enrichment technologies like gaseous diffusion, laser, aerodynamic devices and chemical processes. The centrifuge enrichment process is said to be able to replace with advantage the existing enrichment facilities in the short and medium term. Future prospects of the process are also described, like recycled uranium enrichment and economic improvements; research and development needs to achieve the economic prospects are also indicated. Finally the report takes note of the positive aspect of centrifuge enrichment as far as safeguards and nuclear safety are concerned. 27 figs, 113 refs

  17. Derived enriched uranium market

    International Nuclear Information System (INIS)

    Rutkowski, E.

    1996-01-01

    The potential impact on the uranium market of highly enriched uranium from nuclear weapons dismantling in the Russian Federation and the USA is analyzed. Uranium supply, conversion, and enrichment factors are outlined for each country; inventories are also listed. The enrichment component and conversion components are expected to cause little disruption to uranium markets. The uranium component of Russian derived enriched uranium hexafluoride is unresolved; US legislation places constraints on its introduction into the US market

  18. DNA-based and culture-based characterization of a hydrocarbon-degrading consortium enriched from Arctic soil

    Energy Technology Data Exchange (ETDEWEB)

    Thomassin-Lacroix, E. J. M.; Reimer, K. J. [Royal Military College, Dept. of Chemistry and Chemical Engineering, Kingston, On (Canada); Yu, Z.; Mohn, W. W. [British Columbia Univ., Dept. of Microbiology and Immunology, Vancouver, BC (Canada); Eriksson, M. [Royal Inst. of Technology, Dept. of Biotechnology, Stockholm (Sweden)

    2001-12-01

    Oil spills are fairly common in polar tundra regions, including remote locations, and are a threat to the relatively fragile ecosystem. Remediation must be done economically and with minimum additional damage. Bioremediation is considered to be the appropriate technology, although its application in polar tundra regions is not well documented. Most studies of hydrocarbon remediation in polar regions have concerned marine oil spills, while a few studies have demonstrated on-site polar tundra soil remediation. A few of these demonstrated the presence of psychrotolerant hydrocarbon-degrading bacteria in polar tundra soils. Because fuels are complex mixtures of hydrocarbons, microbial consortia rather than pure cultures may be the most effective agents in degrading fuels. Despite their potential advantages for bioaugmentation applications, consortia are difficult to characterize and monitor. Molecular methods based on DNA analysis partially address these difficulties. One such approach is to randomly clone rRNA gene (rDNA) fragments and to sequence as a set of clones. The relative abundance of individual sequences in the clone library is related to the relative abundance of the corresponding organism in the community. In this study a psychrotolerant, fuel-degrading consortium was enriched with Arctic tundra soil. The enrichment substrate for the consortium was Jet A-1 fuel, which is very similar to Arctic diesel fuel, a common contaminant in the region. The objectives of the study were to (1) characterize thr consortium by DNA- and culture-based methods, (2) develop quantitative polymerase chain reaction assays for populations of predominant consortium members, and (3) determine the dynamics of those populations during incubation of the consortium. Result showed that is possible to quantitatively monitor members of a microbial consortium, with potential application for bioremediation of Arctic tundra soil. The relative abundance of consortium members was found to vary

  19. A Field-Based Testing Protocol for Assessing Gross Motor Skills in Preschool Children: The Children's Activity and Movement in Preschool Study Motor Skills Protocol

    Science.gov (United States)

    Williams, Harriet G.; Pfeiffer, Karin A.; Dowda, Marsha; Jeter, Chevy; Jones, Shaverra; Pate, Russell R.

    2009-01-01

    The purpose of this study was to develop a valid and reliable tool for use in assessing motor skills in preschool children in field-based settings. The development of the Children's Activity and Movement in Preschool Study Motor Skills Protocol included evidence of its reliability and validity for use in field-based environments as part of large…

  20. Study of accent-based music speech protocol development for improving voice problems in stroke patients with mixed dysarthria.

    Science.gov (United States)

    Kim, Soo Ji; Jo, Uiri

    2013-01-01

    Based on the anatomical and functional commonality between singing and speech, various types of musical elements have been employed in music therapy research for speech rehabilitation. This study was to develop an accent-based music speech protocol to address voice problems of stroke patients with mixed dysarthria. Subjects were 6 stroke patients with mixed dysarthria and they received individual music therapy sessions. Each session was conducted for 30 minutes and 12 sessions including pre- and post-test were administered for each patient. For examining the protocol efficacy, the measures of maximum phonation time (MPT), fundamental frequency (F0), average intensity (dB), jitter, shimmer, noise to harmonics ratio (NHR), and diadochokinesis (DDK) were compared between pre and post-test and analyzed with a paired sample t-test. The results showed that the measures of MPT, F0, dB, and sequential motion rates (SMR) were significantly increased after administering the protocol. Also, there were statistically significant differences in the measures of shimmer, and alternating motion rates (AMR) of the syllable /K$\\inve$/ between pre- and post-test. The results indicated that the accent-based music speech protocol may improve speech motor coordination including respiration, phonation, articulation, resonance, and prosody of patients with dysarthria. This suggests the possibility of utilizing the music speech protocol to maximize immediate treatment effects in the course of a long-term treatment for patients with dysarthria.

  1. Method for semi-automated microscopy of filtration-enriched circulating tumor cells.

    Science.gov (United States)

    Pailler, Emma; Oulhen, Marianne; Billiot, Fanny; Galland, Alexandre; Auger, Nathalie; Faugeroux, Vincent; Laplace-Builhé, Corinne; Besse, Benjamin; Loriot, Yohann; Ngo-Camus, Maud; Hemanda, Merouan; Lindsay, Colin R; Soria, Jean-Charles; Vielh, Philippe; Farace, Françoise

    2016-07-14

    Circulating tumor cell (CTC)-filtration methods capture high numbers of CTCs in non-small-cell lung cancer (NSCLC) and metastatic prostate cancer (mPCa) patients, and hold promise as a non-invasive technique for treatment selection and disease monitoring. However filters have drawbacks that make the automation of microscopy challenging. We report the semi-automated microscopy method we developed to analyze filtration-enriched CTCs from NSCLC and mPCa patients. Spiked cell lines in normal blood and CTCs were enriched by ISET (isolation by size of epithelial tumor cells). Fluorescent staining was carried out using epithelial (pan-cytokeratins, EpCAM), mesenchymal (vimentin, N-cadherin), leukocyte (CD45) markers and DAPI. Cytomorphological staining was carried out with Mayer-Hemalun or Diff-Quik. ALK-, ROS1-, ERG-rearrangement were detected by filter-adapted-FISH (FA-FISH). Microscopy was carried out using an Ariol scanner. Two combined assays were developed. The first assay sequentially combined four-color fluorescent staining, scanning, automated selection of CD45(-) cells, cytomorphological staining, then scanning and analysis of CD45(-) cell phenotypical and cytomorphological characteristics. CD45(-) cell selection was based on DAPI and CD45 intensity, and a nuclear area >55 μm(2). The second assay sequentially combined fluorescent staining, automated selection of CD45(-) cells, FISH scanning on CD45(-) cells, then analysis of CD45(-) cell FISH signals. Specific scanning parameters were developed to deal with the uneven surface of filters and CTC characteristics. Thirty z-stacks spaced 0.6 μm apart were defined as the optimal setting, scanning 82 %, 91 %, and 95 % of CTCs in ALK-, ROS1-, and ERG-rearranged patients respectively. A multi-exposure protocol consisting of three separate exposure times for green and red fluorochromes was optimized to analyze the intensity, size and thickness of FISH signals. The semi-automated microscopy method reported here

  2. Application research of improved 235U enrichment meter

    International Nuclear Information System (INIS)

    Liu Daming; Wu Xin; Lu Zhao; Tang Peijia; Lu Feng; Wang Yunmei

    1998-01-01

    A prototype 235 U enrichment meter based on NaI(Tl) γ spectroscopy is improved and it works under the principle of that the enrichment of 235 U is proportional to the radioactivity of 185 keV γ-ray when the sample is thick infinitely. The data of radioactivity from 235 U can be collected by a notebook computer and the interface control software is written using C++ language. The meter was tested and calibrated using standard fuel rods in fuel fabrication plant. For single fuel rod, the measured value of 235 U enrichment is agreeable with declared value within-1.0%-2.8%

  3. The Architecture of WiFi-Based WSN for AMR System and E-HWMP Routing Protocol

    Directory of Open Access Journals (Sweden)

    Li LI

    2014-02-01

    Full Text Available With the development of SoC technology in recent years, the ultra-low power WiFi System on SoC Chip has emerged. As a result, WiFi-based Wireless Sensor Networks come into use, especially used in Automatic Meter Reading. While because the nodes of Wireless Sensor Networks have limited energy supply, smaller storage capability and slower calculation ability, the current WiFi technology cannot be directly applied to WiFi-based Wireless Sensor Networks. The protocols should be upgraded and the security algorithms should be improved to meet the new requests. Firstly, this article describes the network architecture of WiFi-based WSN for AMR system and discusses the reason for using this analogous Mesh architecture. Secondly, the new Hardware architecture of WiFi-based WSN node is designed to realize the AMR system and verify the research work. The node can collect the data of power meter by WiFi and can be powered by a Lithium Battery. Thirdly, on the basis of study work of WiFi original routing protocol HWMP, a new method on improving the energy saving ability of HWMP to adapt the new features of WiFi-based WSN is proposed. And the simulation work on the new routing protocol E-HWMP has been done with NS2 and the simulation results show that the life cycle of the network has been extended to some degree.

  4. Experimental implementation of a real-time token-based network protocol on a microcontroller

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Krikke, Robert; Baron, Bert; Jansen, P.G.; Scholten, Johan

    The real-time token-based RTnet network protocol has been implemented on a standard Ethernet network to investigate the possibility to use cheap components with strict resource limitations while preserving Quality of Service guarantees. It will be shown that the proposed implementation is feasible

  5. Experimental implementation of a real-time token-based network protocol on a microcontroller

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Krikke, Robert; Baron, Bert; Jansen, P.G.; Scholten, Johan

    2004-01-01

    The real-time token-based RTnet network protocol has been implemented on a standard Ethernet network to investigate the possibility to use cheap components with strict resource limitations while preserving Quality of Service guarantees. It will be shown that the proposed implementation is feasible

  6. BIM-based Modeling and Data Enrichment of Classical Architectural Buildings

    Directory of Open Access Journals (Sweden)

    Fabrizio Ivan Apollonio

    2012-12-01

    Full Text Available EnIn this paper we presented a BIM-based approach for the documentation of Architectural Heritage. Knowledge of classical architecture is first extracted from the treatises for parametric modeling in object level. Then we established a profile library based on semantic studies to sweep out different objects. Variants grow out from the parametric models by editing or regrouping parameters based on grammars. Multiple data including material, structure and real-life state are enriched with respect to different research motivations. The BIM models are expected to ease the modeling process and provide comprehensive data shared among different platforms for further simulations.ItIn questo articolo è presentata una procedura definita nell'ambito dei sistemi BIM con l'obiettivo di documentare il Patrimonio Architettonico. I dati conoscitivi relativi all'architettura classica sono, in una prima fase, ottenuti dai trattati al fine di modellare in maniera parametrica a livello di oggetti. Successivamente è stata definita una libreria di profili, basata su principi semantici, dalla quale è possibile ottenere oggetti differenti. Dati di natura differente, relativi ad esempio ai materiali, alle strutture, allo stato di fatto, sono implementati in funzione delle differenti esigenze. I modelli BIM hanno la potenzialità di facilitare le procedure di modellazione e di fornire informazioni e dati completi che possono essere condivisi tra piattaforme differenti per ulteriori simulazioni ed analisi.

  7. South Australia, uranium enrichment

    International Nuclear Information System (INIS)

    1976-02-01

    The Report sets out the salient data relating to the establishment of a uranium processing centre at Redcliff in South Australia. It is conceived as a major development project for the Commonwealth, the South Australian Government and Australian Industry comprising the refining and enrichment of uranium produced from Australian mines. Using the data currently available in respect of markets, demand, technology and possible financial return from overseas sales, the project could be initiated immediately with hexafluoride production, followed rapidly in stages by enrichment production using the centrifuge process. A conceptual development plan is presented, involving a growth pattern that would be closely synchronised with the mining and production of yellowcake. The proposed development is presented in the form of an eight-and-half-year programme. Costs in this Report are based on 1975 values, unless otherwise stated. (Author)

  8. Profile of World Uranium Enrichment Programs - 2007

    International Nuclear Information System (INIS)

    Laughter, Mark D.

    2007-01-01

    of the future, but has yet to be demonstrated commercially. In the early 1980s, six countries developing gas centrifuge technology (United States, United Kingdom, Germany, the Netherlands, Japan, and Australia) along with the International Atomic Energy Agency (IAEA) and the European Atomic Energy Community (EURATOM) began developing effective safeguards techniques for GCEPs. This effort was known as the Hexapartite Safeguards Project (HSP). The HSP had the goal of maximizing safeguards effectiveness while minimizing the cost to the operator and inspectorate, and adopted several recommendations, such as the acceptance of limited-frequency unannounced access (LFUA) inspections in cascade halls, and the use of nondestructive assay (NDA) measurements and tamper-indicating seals. While only the HSP participants initially committed to implementing all the measures of the approach, it has been used as a model for the safeguards applied to GCEPs in additional states. This report provides a snapshot overview of world enrichment capacity in 2007, including profiles of the uranium enrichment programs of individual states. It is based on open-source information, which is dependent on unclassified sources and may therefore not reflect the most recent developments. In addition, it briefly describes some of the safeguards techniques being used at various enrichment plants, including implementation of HSP recommendations

  9. Atlas-based analysis of cardiac shape and function: correction of regional shape bias due to imaging protocol for population studies.

    Science.gov (United States)

    Medrano-Gracia, Pau; Cowan, Brett R; Bluemke, David A; Finn, J Paul; Kadish, Alan H; Lee, Daniel C; Lima, Joao A C; Suinesiaputra, Avan; Young, Alistair A

    2013-09-13

    Cardiovascular imaging studies generate a wealth of data which is typically used only for individual study endpoints. By pooling data from multiple sources, quantitative comparisons can be made of regional wall motion abnormalities between different cohorts, enabling reuse of valuable data. Atlas-based analysis provides precise quantification of shape and motion differences between disease groups and normal subjects. However, subtle shape differences may arise due to differences in imaging protocol between studies. A mathematical model describing regional wall motion and shape was used to establish a coordinate system registered to the cardiac anatomy. The atlas was applied to data contributed to the Cardiac Atlas Project from two independent studies which used different imaging protocols: steady state free precession (SSFP) and gradient recalled echo (GRE) cardiovascular magnetic resonance (CMR). Shape bias due to imaging protocol was corrected using an atlas-based transformation which was generated from a set of 46 volunteers who were imaged with both protocols. Shape bias between GRE and SSFP was regionally variable, and was effectively removed using the atlas-based transformation. Global mass and volume bias was also corrected by this method. Regional shape differences between cohorts were more statistically significant after removing regional artifacts due to imaging protocol bias. Bias arising from imaging protocol can be both global and regional in nature, and is effectively corrected using an atlas-based transformation, enabling direct comparison of regional wall motion abnormalities between cohorts acquired in separate studies.

  10. An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP

    Directory of Open Access Journals (Sweden)

    Alaauldin Ibrahim

    2017-01-01

    Full Text Available Information in patients’ medical histories is subject to various security and privacy concerns. Meanwhile, any modification or error in a patient’s medical data may cause serious or even fatal harm. To protect and transfer this valuable and sensitive information in a secure manner, radio-frequency identification (RFID technology has been widely adopted in healthcare systems and is being deployed in many hospitals. In this paper, we propose a mutual authentication protocol for RFID tags based on elliptic curve cryptography and advanced encryption standard. Unlike existing authentication protocols, which only send the tag ID securely, the proposed protocol could also send the valuable data stored in the tag in an encrypted pattern. The proposed protocol is not simply a theoretical construct; it has been coded and tested on an experimental RFID tag. The proposed scheme achieves mutual authentication in just two steps and satisfies all the essential security requirements of RFID-based healthcare systems.

  11. PWR fuel of high enrichment with erbia and enriched gadolinia

    International Nuclear Information System (INIS)

    Bejmer, Klaes-Håkan; Malm, Christian

    2011-01-01

    Today standard PWR fuel is licensed for operation up to 65-70 MWd/kgU, which in most cases corresponds to an enrichment of more than 5 w/o "2"3"5U. Due to criticality safety reason of storage and transportation, only fuel up to 5 w/o "2"3"5U enrichment is so far used. New fuel storage installations and transportation casks are necessary investments before the reactivity level of the fresh fuel can be significantly increased. These investments and corresponding licensing work takes time, and in the meantime a solution that requires burnable poisons in all pellets of the fresh high-enriched fuel might be used. By using very small amounts of burnable absorber in every pellet the initial reactivity can be reduced to today's levels. This study presents core calculations with fuel assemblies enriched to almost 6 w/o "2"3"5U mixed with a small amount of erbia. Some of the assemblies also contain gadolinia. The results are compared to a reference case containing assemblies with 4.95 w/o "2"3"5U without erbia, utilizing only gadolinia as burnable poison. The comparison shows that the number of fresh fuel assemblies can be reduced by 21% (which increases the batch burnup by 24%) by utilizing the erbia fuel concept. However, increased cost of uranium due to higher enrichment is not fully compensated for by the cost gain due to the reduction of the number assemblies. Hence, the fuel cycle cost becomes slightly higher for the high enrichment erbia case than for the reference case. (author)

  12. DEVELOPMENT OF ENRICHMENT VERIFICATION ASSAY BASED ON THE AGE AND 235U AND 238U ACTIVITIES OF THE SAMPLES

    International Nuclear Information System (INIS)

    AL-YAMAHI, H.; EL-MONGY, S.A.

    2008-01-01

    Development of the enrichment verification methods is the backbone of the nuclear materials safeguards skeleton. In this study, the 235U percentage of depleted , natural and very slightly enriched uranium samples were estimated based on the sample age and the measured activity of 235U and 238U. The HpGe and NaI spectrometry were used for samples assay. A developed equation was derived to correlate the sample age and 235U and 238U activities with the enrichment percentage (E%). The results of the calculated E% by the deduced equation and the target E% values were found to be similar and within 0.58 -1.75% bias in the case of HpGe measurements. The correlation between them was found to be very sharp. The activity was also calculated based on the measured sample count rate and the efficiency at the gamma energies of interest. The correlation between the E% and the 235U activity was estimated and found to be linearly sharp. The results obtained by NaI was found to be less accurate than these obtained by HpGe. The bias in the case of NaI assay was in the range from 6.398% to 22.8% for E% verification

  13. Morning and Evening Blue-Enriched Light Exposure Alters Metabolic Function in Normal Weight Adults.

    Directory of Open Access Journals (Sweden)

    Ivy N Cheung

    Full Text Available Increasing evidence points to associations between light-dark exposure patterns, feeding behavior, and metabolism. This study aimed to determine the acute effects of 3 hours of morning versus evening blue-enriched light exposure compared to dim light on hunger, metabolic function, and physiological arousal. Nineteen healthy adults completed this 4-day inpatient protocol under dim light conditions (<20lux. Participants were randomized to 3 hours of blue-enriched light exposure on Day 3 starting either 0.5 hours after wake (n = 9; morning group or 10.5 hours after wake (n = 10; evening group. All participants remained in dim light on Day 2 to serve as their baseline. Subjective hunger and sleepiness scales were collected hourly. Blood was sampled at 30-minute intervals for 4 hours in association with the light exposure period for glucose, insulin, cortisol, leptin, and ghrelin. Homeostatic model assessment of insulin resistance (HOMA-IR and area under the curve (AUC for insulin, glucose, HOMA-IR and cortisol were calculated. Comparisons relative to baseline were done using t-tests and repeated measures ANOVAs. In both the morning and evening groups, insulin total area, HOMA-IR, and HOMA-IR AUC were increased and subjective sleepiness was reduced with blue-enriched light compared to dim light. The evening group, but not the morning group, had significantly higher glucose peak value during blue-enriched light exposure compared to dim light. There were no other significant differences between the morning or the evening groups in response to blue-enriched light exposure. Blue-enriched light exposure acutely alters glucose metabolism and sleepiness, however the mechanisms behind this relationship and its impacts on hunger and appetite regulation remain unclear. These results provide further support for a role of environmental light exposure in the regulation of metabolism.

  14. Determination of Greenhouse Gases Base Year for Hrvatska elektroprivreda (HEP) in Accordance with Kyoto Protocol

    International Nuclear Information System (INIS)

    Jelavic, V.; Sestic, M.; Juric, Z.; Stanic, Z.

    1998-01-01

    The Kyoto Protocol obliges the Republic of Croatia to reduce greenhouse gas emissions by 5 percent till the year 2010, taking a base year from the period between 1985 and 1990. Thermal power plants of Hrvatska Elektroprivreda (HEP) represent significant source of the most important greenhouse gas - CO 2 - and consequently HEP is expected to make a significant contribution to the national activities aiming to meet the Kyoto Protocol requirements. This issue is of particular importance, as Croatia has not submitted its base year to the Conference of the Parties in form of The National Communication on Climate Change, which is one of the requirements of UN Climate Change Convention and the Kyoto Protocol. Related to this, it is interesting to include emissions from the thermal power plants located in Bosnia and Herzegovina and Serbia (650 MWe) that had supplied electricity to the Croatian power supply system in the base year period and on which HEP claims legal ownership. This article presents HEP greenhouse gas emissions from the period of 1985 to 1990, as well as its contribution in total greenhouse gas emissions of Croatia. Furthermore, future HEP greenhouse gas emissions, according to its business development scenario till the year 2010, will be estimated. (author)

  15. Monitoring the enrichment of the UF6 in the pipework of a gas centrifuge enrichment plant

    International Nuclear Information System (INIS)

    Packer, T.W.; Close, D.A.; Pratt, J.C.

    1987-01-01

    Research in the UK and the US has resulted in the development of a nondestructive assay instrument which can confirm the presence of low enriched uranium, on a rapid Go, No-Go basis, in cascade header pipework in the centrifuge enrichment plant at Capenhurst. The instrument is based on gamma-ray spectrometry and x-ray fluorescence analysis. It allows pipes, 120mm outer diameter, to be inspected in a total measurement time of approximately 30 minutes. This paper describes the techniques developed and includes the results obtained during a demonstration to, and preliminary in-plant measurements by, members of the IAEA and EURATOM Inspectorates at Capenhurst

  16. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  17. Environmental enrichment and exercise are better than social enrichment to reduce memory deficits in amyloid beta neurotoxicity.

    Science.gov (United States)

    Prado Lima, Mariza G; Schimidt, Helen L; Garcia, Alexandre; Daré, Letícia R; Carpes, Felipe P; Izquierdo, Ivan; Mello-Carpes, Pâmela B

    2018-03-06

    Recently, nongenetic animal models to study the onset and development of Alzheimer's disease (AD) have appeared, such as the intrahippocampal infusion of peptides present in Alzheimer amyloid plaques [i.e., amyloid-β (Aβ)]. Nonpharmacological approaches to AD treatment also have been advanced recently, which involve combinations of behavioral interventions whose specific effects are often difficult to determine. Here we isolate the neuroprotective effects of three of these interventions-environmental enrichment (EE), anaerobic physical exercise (AnPE), and social enrichment (SE)-on Aβ-induced oxidative stress and on impairments in learning and memory induced by Aβ. Wistar rats were submitted to 8 wk of EE, AnPE, or SE, followed by Aβ infusion in the dorsal hippocampus. Short-term memory (STM) and long-term memory (LTM) of object recognition (OR) and social recognition (SR) were evaluated. Biochemical assays determined hippocampal oxidative status: reactive oxygen species, lipid peroxidation by thiobarbituric acid reactive substance (TBARS) test, and total antioxidant capacity by ferric reducing/antioxidant power (FRAP), as well as acetylcholinesterase activity. Aβ infusion resulted in memory deficits and hippocampal oxidative damage. EE and AnPE prevented all memory deficits (STM and LTM of OR and SR) and lipid peroxidation (i.e., TBARS). SE prevented only the SR memory deficits and the decrease of total antioxidant capacity decrease (i.e., FRAP). Traditionally, findings obtained with EE protocols do not allow discrimination of the roles of the three individual factors involved. Here we demonstrate that EE and physical exercise have better neuroprotective effects than SE in memory deficits related to Aβ neurotoxicity in the AD model tested.

  18. Corrections to "Connectivity-Based Reliable Multicast MAC Protocol for IEEE 802.11 Wireless LANs"

    Directory of Open Access Journals (Sweden)

    Choi Woo-Yong

    2010-01-01

    Full Text Available We have found the errors in the throughput formulae presented in our paper "Connectivity-based reliable multicast MAC protocol for IEEE 802.11 wireless LANs". We provide the corrected formulae and numerical results.

  19. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  20. Improved security detection strategy in quantum secure direct communication protocol based on four-particle Green-Horne-Zeilinger state

    Energy Technology Data Exchange (ETDEWEB)

    Li, Jian; Nie, Jin-Rui; Li, Rui-Fan [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Jing, Bo [Beijing Univ. of Posts and Telecommunications, Beijing (China). School of Computer; Beijing Institute of Applied Meteorology, Beijing (China). Dept. of Computer Science

    2012-06-15

    To enhance the efficiency of eavesdropping detection in the quantum secure direct communication protocol, an improved quantum secure direct communication protocol based on a four-particle Green-Horne-Zeilinger (GHZ) state is presented. In the protocol, the four-particle GHZ state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. In the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference that has been introduced. If the eavesdropper wants to obtain all the information, the detection rate of the quantum secure direct communication using an Einstein-Podolsky-Rosen (EPR) pair block will be 50% and the detection rate of the presented protocol will be 87%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol proposed is more secure than the others. (orig.)

  1. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    Science.gov (United States)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  2. Safety criteria of uranium enrichment plants

    International Nuclear Information System (INIS)

    Nardocci, A.C.; Oliveira Neto, J.M. de

    1994-01-01

    The applicability of nuclear reactor safety criteria applied to uranium enrichment plants is discussed, and a new criterion based on the soluble uranium compounds and hexafluoride chemical toxicities is presented. (L.C.J.A.). 21 refs, 4 tabs

  3. Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory

    Directory of Open Access Journals (Sweden)

    Faisal Waheed

    2018-07-01

    Full Text Available Network Security is a vital part of any corporate and enterprise network. Network attacks greatly compromise not only the sensitive data of the consumers but also cause outages to these networks. Thus inadequately protected networks need to be “hardened”. The hardening of network devices refers to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and above all making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network. This article investigates the use of cryptography and network protocols based on encryption, to meet the need for essential security requirements. Use of non-secure protocols, underrating and misconfigurations of management protection are reasons behind network devices not properly being hardened; hence leaving vulnerabilities for the intruders. The gap identified after conducting intense search and review of past work is used as the foundation to present solutions. When performing cryptography techniques by encrypting packets using tunnelling and security protocols, management level credentials are encrypted. These include password encryption and exceptional analysis of the emulated IOS (Internetwork Operating System. Necessary testing is carried out to evaluate an acceptable level of protection of these devices. In a virtual testing environment, security flaws are found mainly in the emulated IOS. The discoveries does not depend on the hardware or chassis of a networking device. Since routers primarily rely on its Operating System (OS, attackers focus on manipulating the command line configuration before initiating an attack. Substantial work is devoted to implementation and testing of a router based on Cryptography and Security Protocols in the border router. This is deployed at the core layer and acts as the first point of entry of any trusted and untrusted traffic. A step

  4. TRIGA low enrichment fuel

    International Nuclear Information System (INIS)

    Gietzen, A.

    1993-01-01

    Sixty TRIGA reactors have been sold and the earliest of these are now passing twenty years of operation. All of these reactors use the uranium zirconium hydride fuel (UZrH) which provides certain unique advantages arising out of its large prompt negative temperature coefficient, very low fission product release, and high temperature capability. Eleven of these Sixty reactors are conversions from plate fuel to TRIGA fuel which were made as a result of these advantages. With only a few exceptions, TRIGA reactors have always used low-enriched uranium (LEU) fuel with an enrichment of 19.9%. The exceptions have either been converted from the standard low-enriched fuel to the 70% enriched FLIP fuel in order to achieve extended lifetime, or are higher powered reactors which were designed for long life using 93%-enriched uranium during the time when the use and export of highly enriched uranium (HEU) was not restricted. The advent of international policies focusing attention on nonproliferation and safeguards made the HEU fuels obsolete. General Atomic immediately undertook a development effort (nearly two years ago) in order to be in a position to comply with these policies for all future export sales and also to provide a low-enriched alternative to fully enriched plate-type fuels. This important work was subsequently partially supported by the U.S. Department of Energy. The laboratory and production tests have shown that higher uranium densities can be achieved to compensate for reducing the enrichment to 20%, and that the fuels maintain the characteristics of the very thoroughly proven standard TRIGA fuels. In May of 1978, General Atomic announced that these fuels were available for TRIGA reactors and for plate-type reactors with power levels up to 15 MW with General Atomic's standard commercial warranty

  5. TRIGA low enrichment fuel

    International Nuclear Information System (INIS)

    Gietzen, A.

    1993-01-01

    Sixty TRIGA reactors have been sold and the earliest of these are now passing twenty years of operation. All of these reactors use the uranium-zirconium hydride fuel (UZrH) which provides certain unique advantages arising out of its large prompt negative temperature coefficient, very low fission product release, and high temperature capability. Eleven of these Sixty reactors are conversions from plate fuel to TRIGA fuel which were made as a result of these advantages. With only a few exceptions, TRIGA reactors have always used low-enriched-uranium (LEU) fuel with an enrichment of 19.9%. The exceptions have either been converted from the standard low-enriched fuel to the 70% enriched FLIP fuel in order to achieve extended lifetime, or are higher powered reactors which were designed for long life using 93%-enriched uranium during the time when the use and export of highly enriched uranium (HEU) was not restricted. The advent of international policies focusing attention on nonproliferation and safeguards made the HEU fuels obsolete. General Atomic immediately undertook a development effort (nearly two years ago) in order to be in a position to comply with these policies for all future export sales and also to provide a low-enriched alternative to fully enriched plate-type fuels. This important work was subsequently partially supported by the U.S. Department of Energy. The laboratory and production tests have shown that higher uranium densities can be achieved to compensate for reducing the enrichment to 20%, and that the fuels maintain the characteristics of the very thoroughly proven standard TRIGA fuels. In May of 1978, General Atomic announced that these fuels were available for TRIGA reactors and for plate-type reactors with power levels up to 15 MW with GA's standard commercial warranty

  6. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  7. A survey on bio inspired meta heuristic based clustering protocols for wireless sensor networks

    Science.gov (United States)

    Datta, A.; Nandakumar, S.

    2017-11-01

    Recent studies have shown that utilizing a mobile sink to harvest and carry data from a Wireless Sensor Network (WSN) can improve network operational efficiency as well as maintain uniform energy consumption by the sensor nodes in the network. Due to Sink mobility, the path between two sensor nodes continuously changes and this has a profound effect on the operational longevity of the network and a need arises for a protocol which utilizes minimal resources in maintaining routes between the mobile sink and the sensor nodes. Swarm Intelligence based techniques inspired by the foraging behavior of ants, termites and honey bees can be artificially simulated and utilized to solve real wireless network problems. The author presents a brief survey on various bio inspired swarm intelligence based protocols used in routing data in wireless sensor networks while outlining their general principle and operation.

  8. A disposition strategy for highly enriched, aluminum-based fuel from research and test reactors

    International Nuclear Information System (INIS)

    McKibben, J.M.; Gould, T.H.; McDonell, W.R.; Bickford, W.E.

    1994-01-01

    The strategy proposed in this paper offers the Department of Energy an approach for disposing of aluminum-based, highly enriched uranium (HEU) spent fuels from foreign and domestic research reactors. The proposal is technically, socially, and economically sound. If implemented, it would advance US non-proliferation goals while also disposing of the spent fuel's waste by timely and proven methods using existing technologies and facilities at SRS without prolonged and controversial storage of the spent fuel. The fuel would be processed through 221-H. The radioactive fission products (waste) would be treated along with existing SRS high level waste by vitrifying it as borosilicate glass in the Defense Waste Processing Facility (DWPF) for disposal in the national geological repository. The HEU would be isotopically diluted, during processing, to low-enriched uranium (LEU) which can not be used to make weapons, thus eliminating proliferation concerns. The LEU can be sold to fabricators of either research reactor fuel or commercial power fuel. This proposed processing-LEU recycle approach has several important advantages over other alternatives, including: Lowest capital investment; lowest net total cost; quickest route to acceptable waste form and final geologic disposal; and likely lowest safety, health, and environmental impacts

  9. Quantum secret information equal exchange protocol based on dense coding

    Science.gov (United States)

    Jiang, Ying-Hua; Zhang, Shi-Bin; Dai, Jin-Qiao; Shi, Zhi-Ping

    2018-04-01

    In this paper, we design a novel quantum secret information equal exchange protocol, which implements the equal exchange of secret information between the two parties with the help of semi-trusted third party (TP). In the protocol, EPR pairs prepared by the TP are, respectively, distributed to both the communication parties. Then, the two parties perform Pauli operation on each particle and return the new particles to TP, respectively. TP measures each new pair with Bell basis and announces the measurement results. Both parties deduce the secret information of each other according to the result of announcement by TP. Finally, the security analysis shows that this protocol solves the problem about equal exchange of secret information between two parties and verifies the security of semi-trusted TPs. It proves that the protocol can effectively resist glitch attacks, intercept retransmission attacks and entanglement attack.

  10. Turkey's regulatory plans for high enriched to low enriched conversion of TR-2 reactor core

    International Nuclear Information System (INIS)

    Guelol Oezdere, Oya

    2003-01-01

    Turkey is a developing country and has three nuclear facilities two of which are research reactors and one pilot fuel production plant. One of the two research reactors is TR-2 which is located in Cekmece site in Istanbul. TR-2 Reactor's core is composed of both high enriched and low enriched fuel and from high enriched to low enriched core conversion project will take place in year 2005. This paper presents the plans for drafting regulations on the safety analysis report updates for high enriched to low enriched core conversion of TR-2 reactor, the present regulatory structure of Turkey and licensing activities of nuclear facilities. (author)

  11. Smart Traffic Management Protocol Based on VANET architecture

    Directory of Open Access Journals (Sweden)

    Amilcare Francesco Santamaria

    2014-01-01

    Full Text Available Nowadays one of the hottest theme in wireless environments research is the application of the newest technologies to road safety problems and traffic management exploiting the (VANET architecture. In this work, a novel protocol that aims to achieve a better traffic management is proposed. The overal system is able to reduce traffic level inside the city exploiting inter-communication among vehicles and support infrastructures also known as (V2V and (V2I communications. We design a network protocol called (STMP that takes advantages of IEEE 802.11p standard. On each road several sensors system are placed and they are responsible of monitoring. Gathered data are spread in the network exploiting ad-hoc protocol messages. The increasing knowledge about environment conditions make possible to take preventive actions. Moreover, having a realtime monitoring of the lanes it is possible to reveal roads and city blocks congestions in a shorter time. An external entity to the (VANET is responsible to manage traffic and rearrange traffic along the lanes of the city avoiding huge traffic levels.

  12. Isotope Enrichment Detection by Laser Ablation - Laser Absorption Spectrometry: Automated Environmental Sampling and Laser-Based Analysis for HEU Detection

    International Nuclear Information System (INIS)

    Anheier, Norman C.; Bushaw, Bruce A.

    2010-01-01

    The global expansion of nuclear power, and consequently the uranium enrichment industry, requires the development of new safeguards technology to mitigate proliferation risks. Current enrichment monitoring instruments exist that provide only yes/no detection of highly enriched uranium (HEU) production. More accurate accountancy measurements are typically restricted to gamma-ray and weight measurements taken in cylinder storage yards. Analysis of environmental and cylinder content samples have much higher effectiveness, but this approach requires onsite sampling, shipping, and time-consuming laboratory analysis and reporting. Given that large modern gaseous centrifuge enrichment plants (GCEPs) can quickly produce a significant quantity (SQ ) of HEU, these limitations in verification suggest the need for more timely detection of potential facility misuse. The Pacific Northwest National Laboratory (PNNL) is developing an unattended safeguards instrument concept, combining continuous aerosol particulate collection with uranium isotope assay, to provide timely analysis of enrichment levels within low enriched uranium facilities. This approach is based on laser vaporization of aerosol particulate samples, followed by wavelength tuned laser diode spectroscopy to characterize the uranium isotopic ratio through subtle differences in atomic absorption wavelengths. Environmental sampling (ES) media from an integrated aerosol collector is introduced into a small, reduced pressure chamber, where a focused pulsed laser vaporizes material from a 10 to 20-(micro)m diameter spot of the surface of the sampling media. The plume of ejected material begins as high-temperature plasma that yields ions and atoms, as well as molecules and molecular ions. We concentrate on the plume of atomic vapor that remains after the plasma has expanded and then cooled by the surrounding cover gas. Tunable diode lasers are directed through this plume and each isotope is detected by monitoring absorbance

  13. High enrichment to low enrichment core's conversion. Technical securities

    International Nuclear Information System (INIS)

    Abbate, P.; Madariaga, M.R.

    1990-01-01

    This work presents the fulfillment of the technical securities subscribed by INVAP S.E. for the conversion of a high enriched uranium core. The reactor (of 5 thermal Mw), built in the 50's and 60's, is of the 'swimming pool' type, with light water and fuel elements of the curve plates MTR type, enriched at 93.15 %. These are neutronic and thermohydraulic securities. (Author) [es

  14. Beta activity of enriched uranium

    International Nuclear Information System (INIS)

    Nambiar, P.P.V.J.; Ramachandran, V.

    1975-01-01

    Use of enriched uranium as reactor fuel necessitates its handling in various forms. For purposes of planning and organising radiation protection measures in enriched uranium handling facilities, it is necessary to have a basic knowledge of the radiation status of enriched uranium systems. The theoretical variations in beta activity and energy with U 235 enrichment are presented. Depletion is considered separately. Beta activity build up is also studied for two specific enrichments, in respect of which experimental values for specific alpha activity are available. (author)

  15. A hospital-based child and adolescent overweight and obesity treatment protocol transferred into a community healthcare setting

    DEFF Research Database (Denmark)

    Mollerup, Pernille Maria; Gamborg, Michael Orland; Trier, Cæcilie

    2017-01-01

    BACKGROUND: Due to the pandemic of child and adolescent overweight and obesity, improvements in overweight and obesity treatment availability and accessibility are needed. METHODS: In this prospective study, we investigated if reductions in body mass index (BMI) standard deviation scores (SDS......) and waist circumference (WC) would occur during 1.5 years of community-based overweight and obesity treatment based upon an effective hospital-based overweight and obesity treatment protocol, The Children's Obesity Clinics' Treatment protocol. Height, weight, and WC were measured at all consultations...... was invested per child per year. CONCLUSION: BMI SDS and WC were reduced after 1.5 years of treatment. Hence, this community-based overweight and obesity treatment program may help accommodate the need for improvements in treatment availability and accessibility....

  16. Improvement of the SEP protocol based on community structure of node degree

    Science.gov (United States)

    Li, Donglin; Wei, Suyuan

    2017-05-01

    Analyzing the Stable election protocol (SEP) in wireless sensor networks and aiming at the problem of inhomogeneous cluster-heads distribution and unreasonable cluster-heads selectivity and single hop transmission in the SEP, a SEP Protocol based on community structure of node degree (SEP-CSND) is proposed. In this algorithm, network node deployed by using grid deployment model, and the connection between nodes established by setting up the communication threshold. The community structure constructed by node degree, then cluster head is elected in the community structure. On the basis of SEP, the node's residual energy and node degree is added in cluster-heads election. The information is transmitted with mode of multiple hops between network nodes. The simulation experiments showed that compared to the classical LEACH and SEP, this algorithm balances the energy consumption of the entire network and significantly prolongs network lifetime.

  17. A secure medical data exchange protocol based on cloud environment.

    Science.gov (United States)

    Chen, Chin-Ling; Yang, Tsai-Tung; Shih, Tzay-Farn

    2014-09-01

    In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a secure medical data exchange protocol based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples use medical resources on the cloud environment to seek medical advice conveniently.

  18. Effectiveness of a transdiagnostic internet-based protocol for the treatment of emotional disorders versus treatment as usual in specialized care: study protocol for a randomized controlled trial.

    Science.gov (United States)

    González-Robles, Alberto; García-Palacios, Azucena; Baños, Rosa; Riera, Antonio; Llorca, Ginés; Traver, Francisco; Haro, Gonzalo; Palop, Vicente; Lera, Guillem; Romeu, José Enrique; Botella, Cristina

    2015-10-31

    Emotional disorders (depression and anxiety disorders) are highly prevalent mental health problems. Although evidence showing the effectiveness of disorder-specific treatments exists, high comorbidity rates among emotional disorders limit the utility of these protocols. This has led some researchers to focus their interest on transdiagnostic interventions, a treatment perspective that might be more widely effective across these disorders. Also, the current way of delivering treatments makes it difficult provide assistance to all of the population in need. The use of the Internet in the delivery of evidence-based treatments may help to disseminate treatments among the population. In this study, we aim to test the effectiveness of EmotionRegulation, a new transdiagnostic Internet-based protocol for unipolar mood disorders, five anxiety disorders (panic disorder, agoraphobia, social anxiety disorder, generalized anxiety disorder and anxiety disorder not otherwise specified), and obsessive-compulsive disorder in comparison to treatment as usual as provided in Spanish public specialized mental health care. We will also study its potential impact on basic temperament dimensions (neuroticism/behavioral inhibition and extraversion/behavioral activation). Expectations and opinions of patients about this protocol will also be studied. The study is a randomized controlled trial. 200 participants recruited in specialized care will be allocated to one of two treatment conditions: a) EmotionRegulation or b) treatment as usual. Primary outcome measures will be the BAI and the BDI-II. Secondary outcomes will include a specific measure of the principal disorder, and measures of neuroticism/behavioral inhibition and extraversion/behavioral activation. Patients will be assessed at baseline, post-treatment, and 3- and 12-month follow-ups. Intention to treat and per protocol analyses will be performed. Although the effectiveness of face-to-face transdiagnostic protocols has been

  19. An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae

    With the growing trend towards convergence in broadcast and communications media, Internet Protocol television (IPTV) that delivers real-time multimedia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional access security or service quality as increasing illegal users and delaying service. This paper proposes an RFID-USB authentication protocol, for mobile IPTV users, combined with USIM-based personalized authentication and lightweight authentication that utilizes the RFID-USB technology with an implanted agent module (called an "agent tag") which temporarily enhanced user status information. The proposed authentication protocol adopts a plug-and-play security agent module that is placed in both an RFID tag and an RFID-USB. The implanted security agents cooperate in such a way that multiple RFID tags are connected seamlessly to an RFID-USB.

  20. Feasibility study of an alkaline-based chemical treatment for the purification of polyhydroxybutyrate produced by a mixed enriched culture

    NARCIS (Netherlands)

    Jiang, Y.; Mikova, G.; Kleerebezem, R.; Van der Wielen, L.A.M.; Cuellar Soares, M.C.

    2015-01-01

    This study focused on investigating the feasibility of purifying polyhydroxybutyrate (PHB) from mixed culture biomass by alkaline-based chemical treatment. The PHB-containing biomass was enriched on acetate under non-sterile conditions. Alkaline treatment (0.2 M NaOH) together with surfactant SDS

  1. Enrichment and desalting of tryptic protein digests and the protein depletion using boron nitride

    Energy Technology Data Exchange (ETDEWEB)

    Fischnaller, Martin; Köck, Rainer; Bakry, Rania, E-mail: rania.bakry@uibk.ac.at; Bonn, Günther K.

    2014-05-01

    Highlights: • Protein tryptic digests were desalted and enriched utilizing hexagonal boron nitride. • Phosphopeptides were desalted with high recovery rates. • Boron nitride exhibits high wettability allowing fast sample preparation. • Boron nitride shows protein depletion capability applied for peptide purification. - Abstract: Sample preparation still remains a great challenge in modern bioanalysis and the interest in new efficient solid phase extraction (SPE) materials still remains high. In this work, hexagonal boron nitride (h-BN) is introduced as a new SPE material for the isolation and enrichment of peptides. The h-BN is isoelectronic and structurally similar to graphite. It has remarkable properties including good thermal conductivity, excellent thermal and chemical stability and a better oxidation resistance than graphite. BN attracts increasing interest because of its wide range of applicability. In the present work, the great potential of h-BN, as a new SPE-material, on the enrichment, preconcentration and desalting of tryptic digest of model proteins is demonstrated. A special attention was dedicated to the efficient enrichment of hydrophilic phosphopeptides. Two elution protocols were developed for the enrichment of peptides compatible for subsequent MALDI-MS and ESI-MS analysis. In addition, the recoveries of 5 peptides and 3 phosphopeptides with wide range of pI values utilizing h-BN materials with different surface areas were investigated. 84–106% recovery rate could be achieved using h-BN materials. The results were compared with those obtained using graphite and silica C18 under the same elution conditions, and lower recoveries were obtained. In addition, h-BN was found to have a capability of protein depletion, which is requisite for the peptide profiling.

  2. Enrichment and desalting of tryptic protein digests and the protein depletion using boron nitride

    International Nuclear Information System (INIS)

    Fischnaller, Martin; Köck, Rainer; Bakry, Rania; Bonn, Günther K.

    2014-01-01

    Highlights: • Protein tryptic digests were desalted and enriched utilizing hexagonal boron nitride. • Phosphopeptides were desalted with high recovery rates. • Boron nitride exhibits high wettability allowing fast sample preparation. • Boron nitride shows protein depletion capability applied for peptide purification. - Abstract: Sample preparation still remains a great challenge in modern bioanalysis and the interest in new efficient solid phase extraction (SPE) materials still remains high. In this work, hexagonal boron nitride (h-BN) is introduced as a new SPE material for the isolation and enrichment of peptides. The h-BN is isoelectronic and structurally similar to graphite. It has remarkable properties including good thermal conductivity, excellent thermal and chemical stability and a better oxidation resistance than graphite. BN attracts increasing interest because of its wide range of applicability. In the present work, the great potential of h-BN, as a new SPE-material, on the enrichment, preconcentration and desalting of tryptic digest of model proteins is demonstrated. A special attention was dedicated to the efficient enrichment of hydrophilic phosphopeptides. Two elution protocols were developed for the enrichment of peptides compatible for subsequent MALDI-MS and ESI-MS analysis. In addition, the recoveries of 5 peptides and 3 phosphopeptides with wide range of pI values utilizing h-BN materials with different surface areas were investigated. 84–106% recovery rate could be achieved using h-BN materials. The results were compared with those obtained using graphite and silica C18 under the same elution conditions, and lower recoveries were obtained. In addition, h-BN was found to have a capability of protein depletion, which is requisite for the peptide profiling

  3. Improving International-Level Chess Players' Performance with an Acceptance-Based Protocol: Preliminary Findings

    Science.gov (United States)

    Ruiz, Francisco J.; Luciano, Carmen

    2012-01-01

    This study compared an individual, 4-hr intervention based on acceptance and commitment therapy (ACT) versus a no-contact control condition in improving the performance of international-level chess players. Five participants received the brief ACT protocol, with each matched to another chess player with similar characteristics in the control…

  4. Enriching Orphans’ Potentials through Interpersonal and Intrapersonal Intelligence Enrichment Activities

    Directory of Open Access Journals (Sweden)

    Nurulwahida Hj Azid

    2016-01-01

    Full Text Available Orphans are considered a minority and they should be given a greater emphasis so that they do not feel left out and can build their own lives without a sense of humility. This does not mean that the orphans should be pampered instead they should be given the confidence and motivation to strive for success in later life. Humility among orphans can be associated with interpersonal and intrapersonal intelligences. This study aims to evaluate the impact of problem-solving activity treatment based on the interpersonal and intrapersonal intelligences. 46 students from two orphanages were involved as the treatment group. The research design used was a one-group pretest-posttest design applied through a combination of quantitative and qualitative approaches. Enrichment activities that provided interpersonal and intrapersonal skills as evidenced in this study should be carried out regularly at orphanages. Our study has proven that orphans‟ rights to learn cannot be neglected and „no child left behind „policy needs to be carried through by everybody involved with orphans‟ well-being. Teachers and carers need to be trained to use these enrichment activities at their orphanages to help maximize the orphans‟ potentials.

  5. The implementation and evaluation of an evidence-based statewide prehospital pain management protocol developed using the national prehospital evidence-based guideline model process for emergency medical services.

    Science.gov (United States)

    Brown, Kathleen M; Hirshon, Jon Mark; Alcorta, Richard; Weik, Tasmeen S; Lawner, Ben; Ho, Shiu; Wright, Joseph L

    2014-01-01

    In 2008, the National Highway Traffic Safety Administration funded the development of a model process for the development and implementation of evidence-based guidelines (EBGs) for emergency medical services (EMS). We report on the implementation and evaluation of an evidence-based prehospital pain management protocol developed using this model process. An evidence-based protocol for prehospital management of pain resulting from injuries and burns was reviewed by the Protocol Review Committee (PRC) of the Maryland Institute for Emergency Medical Services Systems (MIEMSS). The PRC recommended revisions to the Maryland protocol that reflected recommendations in the EBG: weight-based dosing and repeat dosing of morphine. A training curriculum was developed and implemented using Maryland's online Learning Management System and successfully accessed by 3,941 paramedics and 15,969 BLS providers. Field providers submitted electronic patient care reports to the MIEMSS statewide prehospital database. Inclusion criteria were injured or burned patients transported by Maryland ambulances to Maryland hospitals whose electronic patient care records included data for level of EMS provider training during a 12-month preimplementation period and a 12-month postimplementation period from September 2010 through March 2012. We compared the percentage of patients receiving pain scale assessments and morphine, as well as the dose of morphine administered and the use of naloxone as a rescue medication for opiate use, before and after the protocol change. No differences were seen in the percentage of patients who had a pain score documented or the percent of patients receiving morphine before and after the protocol change, but there was a significant increase in the total dose and dose in mg/kg administered per patient. During the postintervention phase, patients received an 18% higher total morphine dose and a 14.9% greater mg/kg dose. We demonstrated that the implementation of a revised

  6. Isotope enrichment

    International Nuclear Information System (INIS)

    Garbuny, M.

    1979-01-01

    The invention discloses a method for deriving, from a starting material including an element having a plurality of isotopes, derived material enriched in one isotope of the element. The starting material is deposited on a substrate at less than a critical submonatomic surface density, typically less than 10 16 atoms per square centimeter. The deposit is then selectively irradiated by a laser (maser or electronic oscillator) beam with monochromatic coherent radiation resonant with the one isotope causing the material including the one istope to escape from the substrate. The escaping enriched material is then collected. Where the element has two isotopes, one of which is to be collected, the deposit may be irradiated with radiation resonant with the other isotope and the residual material enriched in the one isotope may be evaporated from the substrate and collected

  7. Community-aware user profile enrichment in folksonomy.

    Science.gov (United States)

    Xie, Haoran; Li, Qing; Mao, Xudong; Li, Xiaodong; Cai, Yi; Rao, Yanghui

    2014-10-01

    In the era of big data, collaborative tagging (a.k.a. folksonomy) systems have proliferated as a consequence of the growth of Web 2.0 communities. Constructing user profiles from folksonomy systems is useful for many applications such as personalized search and recommender systems. The identification of latent user communities is one way to better understand and meet user needs. The behavior of users is highly influenced by the behavior of their neighbors or community members, and this can be utilized in constructing user profiles. However, conventional user profiling techniques often encounter data sparsity problems as data from a single user is insufficient to build a powerful profile. Hence, in this paper we propose a method of enriching user profiles based on latent user communities in folksonomy data. Specifically, the proposed approach contains four sub-processes: (i) tag-based user profiles are extracted from a folksonomy tripartite graph; (ii) a multi-faceted folksonomy graph is constructed by integrating tag and image affinity subgraphs with the folksonomy tripartite graph; (iii) random walk distance is used to unify various relationships and measure user similarities; (iv) a novel prototype-based clustering method based on user similarities is used to identify user communities, which are further used to enrich the extracted user profiles. To evaluate the proposed method, we conducted experiments using a public dataset, the results of which show that our approach outperforms previous ones in user profile enrichment. Copyright © 2014 Elsevier Ltd. All rights reserved.

  8. Radioactive Waste Issues related to Production of Fission-based Mo-99 by using Low Enriched Uranium (LEU)

    Energy Technology Data Exchange (ETDEWEB)

    Hassan, Muhmood ul; Ryu, Ho Jin [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2014-10-15

    In order to produce fission-based Mo-99 from research reactors, two types of targets are being used and they are highly enriched uranium (HEU) targets with {sup 235}U enrichment more than 90wt% of {sup 235}U and low enriched uranium (LEU) targets with {sup 235}U enrichment less than 20wt% of {sup 235}U. It is worth noting that medium enriched uranium i.e. 36wt% of {sup 235}U as being used in South Africa is also regarded as non-LEU from a nuclear security point of view. In order to cope with the proliferation issues, international nuclear security policy is promoting the use of LEU targets in order to minimize the civilian use of HEU. It is noteworthy that Mo-99 yield of the LEU target is less than 20% of the HEU target, which requires approximately five times more LEU targets to be irradiated and consequently results in increased volume of waste. The waste generated from fission Mo-99 production can be mainly due to: target fabrication, assembling of target, irradiation in reactor and processing of irradiated targets. During the fission of U-235 in a reactor, a large number of radionuclides with different chemical and physical properties are formed. The waste produced from these practices may be a combination of low level waste (LLW) and intermediate level waste (ILW) comprised of all three types, i.e., solid, liquid and gas. Handling and treatment of the generated waste are dependent on its form and activity. In case of the large production facility, waste storage facility should be constructed in order to limit the radiation exposures of the workers and the environment. In this study, we discuss and compare mainly the radioactive waste generated by alkaline digestion of both HEU and LEU targets to assist in planning and deciding the choice of the technology with better arrangements for proper handling and disposal of generated waste. With the use of the LEU targets in Mo-99 production facility, significant increase in liquid and solid waste has been expected.

  9. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  10. Enrichment technology. Dependable vendor of gas centrifuges; Enrichment Technology. Zuverlaessiger Lieferant von Gaszentrifugen

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2011-10-15

    Enrichment Technology is an innovative, high-tech company that develops, manufactures and installs gas centrifuges for enriching uranium. In addition, Enrichment Technology designs enrichment plants that use gas centrifuge technology. This technology offers the most efficient and cost-effective method for enriching uranium yet: high-performance, safe technology that dominates the market with a global share of 45 percent. A determining factor in Enrichment Technology's success is its mission: supplying its customers with safe, reliable technology. Production of the centrifuges requires versatile know-how and collaboration between different departments as well as interdisciplinary teams at the various sites. More than 2000 operators at 8 sites in 5 countries contribute their individual knowledge and personal skills in order to produce this exceptional technology. The head office is in Beaconsfield near London and the operational headquarters are in Almelo in the Netherlands. There are other sites in Germany (Juelich und Gronau), Great Britain (Capenhurst) as well as project sites in the USA and France. Capenhurst is where experienced engineers design new enrichment plants and organise their construction. Centrifuge components are manufactured in Almelo and Juelich, while the pipework needed to connect up the centrifuges is produced at the site in Gronau. In Juelich, highly qualified scientists in interdisciplinary teams are continuously researching ways of improving the current centrifuges. Communication between specialists in the fields of chemistry, physics and engineering forms the basis for the company's success and the key to extending this leading position in the global enrichment market. (orig.)

  11. Improving the efficiency of single and multiple teleportation protocols based on the direct use of partially entangled states

    Energy Technology Data Exchange (ETDEWEB)

    Fortes, Raphael; Rigolin, Gustavo, E-mail: rigolin@ifi.unicamp.br

    2013-09-15

    We push the limits of the direct use of partially pure entangled states to perform quantum teleportation by presenting several protocols in many different scenarios that achieve the optimal efficiency possible. We review and put in a single formalism the three major strategies known to date that allow one to use partially entangled states for direct quantum teleportation (no distillation strategies permitted) and compare their efficiencies in real world implementations. We show how one can improve the efficiency of many direct teleportation protocols by combining these techniques. We then develop new teleportation protocols employing multipartite partially entangled states. The three techniques are also used here in order to achieve the highest efficiency possible. Finally, we prove the upper bound for the optimal success rate for protocols based on partially entangled Bell states and show that some of the protocols here developed achieve such a bound. -- Highlights: •Optimal direct teleportation protocols using directly partially entangled states. •We put in a single formalism all strategies of direct teleportation. •We extend these techniques for multipartite partially entangle states. •We give upper bounds for the optimal efficiency of these protocols.

  12. Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment

    Directory of Open Access Journals (Sweden)

    Byunggil Lee

    2014-01-01

    Full Text Available International Association of Lighthouse Authorities (IALA is developing the standard intersystem VTS exchange format (IVEF protocol for exchange of navigation and vessel information between VTS systems and between VTS and vessels. VTS (vessel traffic system is an important marine traffic monitoring system which is designed to improve the safety and efficiency of navigation and the protection of the marine environment. And the demand of Inter-VTS networking has been increased for realization of e-Navigation as shore side collaboration for maritime safety. And IVEF (inter-VTS data exchange format for inter-VTS network has become a hot research topic of VTS system. Currently, the IVEF developed by the International Association of Lighthouse Authorities (IALA does not include any highly trusted certification technology for the connectors. The output of standardization is distributed as the IALA recommendation V-145, and the protocol is implemented with an open source. The IVEF open source, however, is the code used to check the functions of standard protocols. It is too slow to be used in the field and requires a large memory. And the vessel traffic information requires high security since it is highly protected by the countries. Therefore, this paper suggests the authentication protocol to increase the security of the VTS systems using the main certification server and IVEF.

  13. 76 FR 11523 - Atomic Safety and Licensing Board; AREVA Enrichment Services, LLC (Eagle Rock Enrichment Facility...

    Science.gov (United States)

    2011-03-02

    ... and Licensing Board; AREVA Enrichment Services, LLC (Eagle Rock Enrichment Facility); Notice of... Governmental Entities Regarding Environmental Portion of Enrichment Facility Licensing Proceeding February 24.... White. In this 10 CFR part 70 proceeding regarding the request of applicant AREVA Enrichment Services...

  14. Effect of broccoli extract enriched diet on liver cholesterol oxidation in rats subjected to exhaustive exercise.

    Science.gov (United States)

    Cardenia, Vladimiro; Rodriguez-Estrada, Maria Teresa; Lorenzini, Antonello; Bandini, Erika; Angeloni, Cristina; Hrelia, Silvana; Malaguti, Marco

    2017-05-01

    The effect of broccoli extract (BE)-enriched diet was studied in order to evaluate its ability to counteract liver cholesterol oxidation products (COPs) induced by acute strenuous exercise in rats. Thirty-two female Wistar rats were randomly divided into four groups: control diet without exercise (C), BE-enriched diet without exercise (B), control diet with acute exhaustive exercise (S) and BE-enriched diet with acute exhaustive exercise (BS). The study lasted 45days and on the last day, rats of S and BS groups were forced to run until exhaustion on a treadmill. Glutathione-S-transferase (GST), glutathione reductase (GR), glutathione peroxidase (GPx), catalase (CAT) and cholesterol oxidation products (COPs) were determined in liver. Exhaustive exercise was clearly responsible for tissue damage, as evidenced by the increase of lactate dehydrogenase (LDH) plasma activity in the S group. Moreover, the exercise protocol reduced CAT activity in liver, while it did not affect GST, GR and GPx. BE-enriched diet raised GST, GR and CAT activities in rats of BS group. The main COPs found were 7α-hydroxycholesterol, 7β-hydroxycholesterol, 7-ketocholesterol, cholestanetriol, 24-hydroxycholesterol and 27-hydroxycholesterol. The BE-enriched diet led to reduced cholesterol oxidation following exhaustive exercise; the highest level of COPs was found in the S group, whereas the BS rats showed the lowest amount. This study indicates that the BE-enriched diet increases antioxidant enzyme activities and exerts an antioxidant effect towards cholesterol oxidation in rat liver, suggesting the use of phytochemicals in the prevention of oxidative damage and in the modulation of the redox environment. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. Comparative study with two different enrichments in the culture media used in the disinfectant efficacy assay.

    Science.gov (United States)

    Sabagh, Bruna Peres; Souto, Aline da Silva Soares; Reis, Louise Moreira; Silva, Sérgio Alves da; Pereira, Daniella Cristina Rodrigues; Neves, Marta de Campos; Pinheiro, Rodrigo Rollin; Duarte, Rafael Silva; Miyazaki, Neide Hiromi Tokumaru; Bôas, Maria Helena Simões Villas

    2012-02-01

    Recent changes in Brazilian legislation for commercial disinfectants have been published due to the recent epidemic of nosocomial infections caused by rapidly growing mycobacteria (RGM) in many states of Brazil over the last 8years. One of these documents requires that all the manufacturers provide evidence of efficacy of sterilizing and disinfectant products, used for semi critical medical devices, against the Mycobacterium bovis BCG Moreau and Mycobacterium abscessus subsp. bolletii INCQS 00594 strains by using the Confirmative in vitro Test for Determining Tuberculocidal Activity of Disinfectants recommended by the Association of Official Analytical Chemists. These changes have caused additional costs and increased problems for importation of enrichment products at national laboratories where disinfectant efficacy assay service is performed. Middlebrook ADC Enrichment (ADC) is provided by a unique manufacturer and used in the official protocol. The aim of the present study was to evaluate an alternative in house low-cost enrichment composed of fetal bovine serum and glucose (FBSG) with ADC for performance of disinfectant efficacy assay against mycobacteria. After obtaining the growth curves for M. abscessus ATCC 19977, M. abscessus subsp. bolletii INCQS 00594, Mycobacterium chelonae ATCC 35752, and Mycobacterium fortuitum ATCC 6841 by using ADC enrichment and FBSG in Kirchners and 7H9 culture media. Through statistical analysis via the Kruskal-Wallis test on the evaluation of microorganism growth rate, it was observed that there was no inhibition of RGM growth by any of the enrichments used. These results suggest that low-cost enrichment FBSG may be used as a potential substitute of ADC for composition of media for mycobacterial growth, including in disinfectant tests. Copyright © 2011 Elsevier B.V. All rights reserved.

  16. A desirability-based multi objective approach for the virtual screening discovery of broad-spectrum anti-gastric cancer agents.

    Directory of Open Access Journals (Sweden)

    Yunierkis Perez-Castillo

    Full Text Available Gastric cancer is the third leading cause of cancer-related mortality worldwide and despite advances in prevention, diagnosis and therapy, it is still regarded as a global health concern. The efficacy of the therapies for gastric cancer is limited by a poor response to currently available therapeutic regimens. One of the reasons that may explain these poor clinical outcomes is the highly heterogeneous nature of this disease. In this sense, it is essential to discover new molecular agents capable of targeting various gastric cancer subtypes simultaneously. Here, we present a multi-objective approach for the ligand-based virtual screening discovery of chemical compounds simultaneously active against the gastric cancer cell lines AGS, NCI-N87 and SNU-1. The proposed approach relays in a novel methodology based on the development of ensemble models for the bioactivity prediction against each individual gastric cancer cell line. The methodology includes the aggregation of one ensemble per cell line using a desirability-based algorithm into virtual screening protocols. Our research leads to the proposal of a multi-targeted virtual screening protocol able to achieve high enrichment of known chemicals with anti-gastric cancer activity. Specifically, our results indicate that, using the proposed protocol, it is possible to retrieve almost 20 more times multi-targeted compounds in the first 1% of the ranked list than what is expected from a uniform distribution of the active ones in the virtual screening database. More importantly, the proposed protocol attains an outstanding initial enrichment of known multi-targeted anti-gastric cancer agents.

  17. 76 FR 34103 - In the Matter of Areva Enrichment Services, LLC (Eagle Rock Enrichment Facility); Notice of...

    Science.gov (United States)

    2011-06-10

    .... 10-899-02-ML-BD01] In the Matter of Areva Enrichment Services, LLC (Eagle Rock Enrichment Facility...'' portion of this proceeding regarding the December 2008 application by AREVA Enrichment Services, LLC (AES... gas centrifuge uranium enrichment facility--denoted as the Eagle Rock Enrichment Facility (EREF)--in...

  18. Missed Cases in the Detection of Child Abuse Based on Parental Characteristics in the Emergency Department (the Hague Protocol)

    NARCIS (Netherlands)

    Diderich, H.M.; Verkerk, P.H.; Oudesluys-Murphy, A.M.; Dechesne, M.; Buitendijk, S.E.; Fekkes, M.

    2015-01-01

    Introduction We aimed to assess the number of “missed cases” in the detection of child abuse based on the Hague Protocol. This protocol considers 3 parental characteristics of ED adult patients to identify child abuse: (1) domestic violence, (2) intoxication, and (3) suicide attempt or

  19. Measurement of the enrichment of uranium-hexafluoride gas in product pipes in the centrifuge enrichment plant at Almelo

    International Nuclear Information System (INIS)

    Packer, T.W.; Lees, E.W.; Aaldijk, J.K.; Harry, R.J.S.

    1987-09-01

    One of the objectives of safeguarding centrifuge enrichment plants is to apply non-destructive measurements inside the cascade area to confirm that the enrichment level is in the low enriched uranium range. Research in the UK and USA has developed a NDA instrument which can confirm the presence of low enriched uranium on a rapid go/no go basis in cascade header pipework of their centrifuge enrichment plants. The instrument is based on a gamma spectroscopic measurement coupled with an X-ray fluorescence analysis. This report gives the results of measurements carried out at Almelo by the UKAEA Harwell, ECN Petten and KFA Juelich to determine if these techniques could be employed at Almelo and Gronau. The energy dispersive X-ray fluorescence analysis has been applied to determine the total mass of uranium in the gas phase, and the deposit correction technique and the two geometry technique have been applied at Almelo to correct the measured gamma intensities for those emitted by the deposit. After an executive summary the report discusses the principles of the two correction methods. A short description of the equipment precedes the presentation of the results of the measurements and the discussion. After the conclusions the report contains two appendices which contain the derivation of the formulae for the deposit correction technique and a discussion of the systematic errors of this technique. 8 figs.; 11 refs.; 6 tables

  20. Feasibility study of an alkaline-based chemical treatment for the purification of polyhydroxybutyrate produced by a mixed enriched culture

    NARCIS (Netherlands)

    Jiang, Y.; Mikova, G.; Kleerebezem, R.; van der Wielen, L.A.M.; Cuellar, M.C.

    2015-01-01

    This study focused on investigating the feasibility of purifying polyhydroxybutyrate (PHB) from mixed culture biomass by alkaline-based chemical treatment. The PHB-containing biomass was enriched on acetate under non-sterile conditions. Alkaline treatment (0.2 M NaOH) together with surfactant SDS

  1. Enrichment plants. A survey of major new uranium enriching projects

    International Nuclear Information System (INIS)

    Kovan, D.

    1976-01-01

    The work enrichment situation is reported. The development of enrichment in the U.S. and in Europe is outlined. A brief description is given of the technology of separation by diffusion and by centrifugation and the advantages and disadvantages of the two processes are compared. Finally the supply and demand situation is briefly considered. (U.K.)

  2. Interface Assignment-Based AODV Routing Protocol to Improve Reliability in Multi-Interface Multichannel Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Won-Suk Kim

    2015-01-01

    Full Text Available The utilization of wireless mesh networks (WMNs has greatly increased, and the multi-interface multichannel (MIMC technic has been widely used for the backbone network. Unfortunately, the ad hoc on-demand distance vector (AODV routing protocol defined in the IEEE 802.11s standard was designed for WMNs using the single-interface single-channel technic. So, we define a problem that happens when the legacy AODV is used in MIMC WMNs and propose an interface assignment-based AODV (IA-AODV in order to resolve that problem. IA-AODV, which is based on multitarget path request, consists of the PREQ prediction scheme, the PREQ loss recovery scheme, and the PREQ sender assignment scheme. A detailed operation according to various network conditions and services is introduced, and the routing efficiency and network reliability of a network using IA-AODV are analyzed over the presented system model. Finally, after a real-world test-bed for MIMC WMNs using the IA-AODV routing protocol is implemented, the various indicators of the network are evaluated through experiments. When the proposed routing protocol is compared with the existing AODV routing protocol, it performs the path update using only 14.33% of the management frames, completely removes the routing malfunction, and reduces the UDP packet loss ratio by 0.0012%.

  3. ASCOT: a text mining-based web-service for efficient search and assisted creation of clinical trials

    Science.gov (United States)

    2012-01-01

    Clinical trials are mandatory protocols describing medical research on humans and among the most valuable sources of medical practice evidence. Searching for trials relevant to some query is laborious due to the immense number of existing protocols. Apart from search, writing new trials includes composing detailed eligibility criteria, which might be time-consuming, especially for new researchers. In this paper we present ASCOT, an efficient search application customised for clinical trials. ASCOT uses text mining and data mining methods to enrich clinical trials with metadata, that in turn serve as effective tools to narrow down search. In addition, ASCOT integrates a component for recommending eligibility criteria based on a set of selected protocols. PMID:22595088

  4. Developments in uranium enrichment

    International Nuclear Information System (INIS)

    Mohrhauer, H.

    1995-01-01

    The enrichment services market is still characterized by overcapacities. While consumption worldwide will rise by some 15% to 39,000 t SWU/a over the next ten years, capacities amount to nearly 50,000 t SWU/a. The price for enrichment services probably has reached its all time low. Prices below U.S. $ 100/kg SWU are not likely to cover costs even of the economically most advanced enrichment processes. Urenco has prepared for the difficult enrichment business in the years to come by streamlining and cost cutting measures. The company intends to hold and increase its share of more than 10% in the world market. The uranium enrichment plant of Gronau will be expanded further. Expansion beyond 1000 t is subject to another permit being granted under the Atomic Energy Act, an application for which was filed in December 1994. Centrifuge technology is the superior enrichment technology, i.e., there is still considerable potential for further development. Construction of enrichment plants employing the centrifuge technology in the United States and in France is being pursued in various phases, from feasibility studies to licensing procedures. Before these plants could be implemented, however, considerable problems of organization would have to be solved, and the market would have to change greatly, respectively. The laser process, at the present time, does not seem to be able to develop into a major industrial competitor. (orig.) [de

  5. Data acquisition and meter unit based in wifi communication protocol

    Directory of Open Access Journals (Sweden)

    Gerardo Cázarez Ayala

    2012-05-01

    Full Text Available Without doubt, the competitive fast rhythm of the industries is one of the main causes helped bring to the accelerated growth of the electronic technology and the communication. The need to develop new products with a best quality, cheaper and faster as assure and increase the quality of the products in the international markets, requires of new technologies to the metering, monitoring and control of their production processes, of which finality is to improve the processes to guaranteed their products in the market in the less time possible, the best quality and low cost for the final consumer. This work is based in the design and implementation of a Wireless Data Acquisition Unit based in WiFi protocol, which is oriented to meter, monitoring and the control of processes in the industry, commercial and the home automation applications, using one of the wirelessprotocols with the biggest acceptance in the market, with the main objective of to take advantage of the installed physical infrastructure in the place of the application, like industry, company or house. The Unit is based in the RN-131G, a Roving Network company module, which is able to work in stand-alone mode with ultralow power consummation and supporting the IEEE 802.11b/g protocols, in which is possible to achieve transfer rates of up to 11 Mbps and 54 Mbps in /b & /g specifications respectively. Whit this unit is possible to meter up to 5 analogs signals with 14 bits precision and has include a temperature and relative humidity sensors. This unit can meter two digital signals and act mean two digitals outputs, and gas include an USB port for communication and programming tasks.

  6. Uranium enrichment plans

    International Nuclear Information System (INIS)

    Gagne, R.W.; Thomas, D.C.

    1977-01-01

    The status of existing uranium enrichment contracts in the US is reviewed and expected natural uranium requirements for existing domestic uranium enrichment contracts are evaluated. Uncertainty in natural uranium requirements associated with requirements-type and fixed-commitment type contracts is discussed along with implementation of variable tails assay

  7. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  8. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  9. A novel method for sample preparation of fresh lung cancer tissue for proteomics analysis by tumor cell enrichment and removal of blood contaminants

    Directory of Open Access Journals (Sweden)

    Orre Lotta

    2010-02-01

    Full Text Available Abstract Background In-depth proteomics analyses of tumors are frequently biased by the presence of blood components and stromal contamination, which leads to large experimental variation and decreases the proteome coverage. We have established a reproducible method to prepare freshly collected lung tumors for proteomics analysis, aiming at tumor cell enrichment and reduction of plasma protein contamination. We obtained enriched tumor-cell suspensions (ETS from six lung cancer cases (two adenocarcinomas, two squamous-cell carcinomas, two large-cell carcinomas and from two normal lung samples. The cell content of resulting ETS was evaluated with immunocytological stainings and compared with the histologic pattern of the original specimens. By means of a quantitative mass spectrometry-based method we evaluated the reproducibility of the sample preparation protocol and we assessed the proteome coverage by comparing lysates from ETS samples with the direct lysate of corresponding fresh-frozen samples. Results Cytological analyses on cytospin specimens showed that the percentage of tumoral cells in the ETS samples ranged from 20% to 70%. In the normal lung samples the percentage of epithelial cells was less then 10%. The reproducibility of the sample preparation protocol was very good, with coefficient of variation at the peptide level and at the protein level of 13% and 7%, respectively. Proteomics analysis led to the identification of a significantly higher number of proteins in the ETS samples than in the FF samples (244 vs 109, respectively. Albumin and hemoglobin were among the top 5 most abundant proteins identified in the FF samples, showing a high contamination with blood and plasma proteins, whereas ubiquitin and the mitochondrial ATP synthase 5A1 where among the top 5 most abundant proteins in the ETS samples. Conclusion The method is feasible and reproducible. We could obtain a fair enrichment of cells but the major benefit of the method

  10. The protocols for the 10/66 dementia research group population-based research programme

    OpenAIRE

    Salas Aquiles; Rodriguez Juan; McKeigue Paul; Jacob KS; Krishnamoorthy ES; Huang Yueqin; Guerra Mariella; Gavrilova Svetlana I; Dewey Michael; Arizaga Raul; Albanese Emiliano; Acosta Daisy; Ferri Cleusa P; Prince Martin; Sosa Ana

    2007-01-01

    Abstract Background Latin America, China and India are experiencing unprecedentedly rapid demographic ageing with an increasing number of people with dementia. The 10/66 Dementia Research Group's title refers to the 66% of people with dementia that live in developing countries and the less than one tenth of population-based research carried out in those settings. This paper describes the protocols for the 10/66 population-based and intervention studies that aim to redress this imbalance. Meth...

  11. Experience with environmental sampling at gas centrifuge enrichment plants

    International Nuclear Information System (INIS)

    Ekenstam, G. af; Bush, W.; Janov, J.; Kuhn, E.; Ryjinski, M.

    2001-01-01

    Environmental sampling has been used routinely by the IAEA since 1996 after the IAEA Board of Governors approved it in March 1995 as a new technique to strengthen safeguards and improve efficiency. In enrichment plants it is used to confirm that there has been no production of highly enriched uranium (HEU), or production of uranium at above the declared enrichment. The use of environmental sampling is based on the assumption that every process, no matter how leak tight, will release small amounts of process material to the environment. Even though these releases of nuclear material are extremely small in gas centrifuge enrichment plants, and well below levels of concern from a health physics and safety standpoint, they are detectable and their analysis provides an indication of the enrichment of the material that has been processed in the plant. The environmental samples at enrichment plants are collected by swiping selected areas of the plant with squares of cotton cloth (10x10 cm) from sampling kits prepared in ultra clean condition. The squares of cotton cloth sealed in plastic bags are sent for analysis to the Network Analytical Laboratories. The analysis includes the measurement of the uranium isotopic composition in uranium-containing particles by Thermal lonization Mass Spectroscopy (TIMS) or Secondary ION Mass Spectroscopy (SIMS). Since the implementation of environmental sampling, swipes have been collected from 240 sampling points at three gas centrifuge plants of URENCO, which have a total throughput of more than 8,000 tonnes of uranium per year. The particle analysis results generally reflected the known operational history of the plants and confirmed that they had only been operated to produce uranium with enrichment less than 5% 235 U. The information about the content of the minor isotopes 234 U and 236 U also indicates that depleted and recycled uranium were sometimes used as feed materials in some plants. An example is given of the TIMS particle

  12. Perancangan dan Realisasi Web-Based Data Logging System menggunakan ATmega16 melalui Hypertext Transfer Protocol (HTTP

    Directory of Open Access Journals (Sweden)

    RATNA SUSANA

    2016-02-01

    Full Text Available Abstrak Hypertext Transfer Protocol (HTTP merupakan protokol jaringan pada lapisan aplikasi TCP/IP yang menjadi dasar komunikasi pada World Wide Web (WWW. Penelitian ini merancang dan merealisasikan web-based data logging system yang bertujuan untuk memperkenalkan aturan HTTP, sehingga perangkat elektronik dapat berkomunikasi dengan website secara langsung. Sistem dirancang dengan dua sub sistem utama yaitu website data logger dan website. Data logger direalisasikan menggunakan ATMega16 yang diintegrasikan dengan sumber data analog dan digital, RTC serta modem GSM. Data logger berfungsi sebagai pengirim data, sedangkan website berfungsi sebagai pengatur, penerima, pengolah dan penyaji data. Sistem ini telah berhasil melakukan komunikasi antara data logger dengan website melalui HTTP, artinya protokol ini dapat diimplementasikan pada data logger yang menggunakan ATmega16. Perubahan data analog dan status logika 0 dan 1 dari data digital yang terjadi pada data logger dapat dilihat pada tampilan di website. Kata kunci:  basis data, data logger, Hypertext Transfer Protocol (HTTP, website, protokol jaringan. Abstract Hypertext Transfer Protocol (HTTP is an application layer network protocols in TCP/IP is the basis of communication on the World Wide Web (WWW. This research was to design and realize a web-based data logging system that aims to introduce the rules of HTTP, so that electronic devices could communicate with the website directly. The system was designed with two main sub-system, namely data logger and website. The data logger was realized using ATmega16 are integrated with analog and digital data sources, RTC and a GSM modem. Data logger function as the sender of data, while the website functions as regulator, receiver, processing and presenter data. This system had been successfully perform communication between the data logger to a website via HTTP, meaning that this protocol could be implemented on a data logger that uses ATmega16

  13. Base station MAC with APRMA protocol for broadband multimedia ATM in micro/pico-cellular mobile networks

    DEFF Research Database (Denmark)

    Le, Khanh Hoang; Nielsen, Søren Nørskov; Dittmann, Lars

    1998-01-01

    The concept for a wireless ATM access system that enables seamless mobile connectivity to the B-ISDN is presented. It is based on small, low cost and intelligent base stations running a medium access control (MAC) protocol using adaptive packet reservation multiple access (APRMA). Both...

  14. Nitrogen-enriched bituminous coal-based active carbons as materials for supercapacitors

    Energy Technology Data Exchange (ETDEWEB)

    R. Pietrzak; K. Jurewicz; P. Nowicki; K. Babel; H. Wachowska [A. Mickiewicz University, Poznan (Poland). Laboratory of Coal Chemistry and Technology

    2010-11-15

    The paper presents the results of a study on obtaining N-enriched active carbons from bituminous coal and on testing its use as an electrode material in supercapacitors. The coal was carbonised, activated with KOH and ammoxidised by a mixture of ammonia and air at the ratio 1:3 at 300{sup o}C or 350{sup o}C, at different stages of the production, that is, at those of precursor, carbonisate, and active carbon. The products were microporous N-enriched active carbon samples of well-developed surface area reaching from 1577 to 2510 m{sup 2}/g and containing 1.0 to 8.5 wt% of nitrogen. The XPS measurements have shown that in the active carbons enriched in nitrogen at the stage of precursor and at the stage of carbonisate, the dominant nitrogen species are the N-5 groups, while in the samples ammoxidised at the last stage of the treatment the dominant nitrogen species are the surface groups of imines and/or nitriles, probably accompanied by amines and amides. The paper reports the results of a comprehensive study of the effect of the structure and chemical composition of a series of active carbon samples of different properties on their capacity performance in water solutions of H{sub 2}SO{sub 4} or KOH, with the behaviour of positive and negative electrodes analysed separately. 33 refs., 7 figs., 8 tabs.

  15. Profile of World Uranium Enrichment Programs-2009

    International Nuclear Information System (INIS)

    Laughter, Mark D.

    2009-01-01

    based entirely on open-source information, which is dependent on published sources and may therefore not be completely accurate or reflect the most recent developments. Consequently, readers should not assume that information cited here has the endorsement of either ORNL or the U.S. Department of Energy. We are merely reporting what's been reported. In addition, this report briefly describes some of the safeguards techniques being used at various enrichment plants, including implementation of HSP recommendations

  16. Preparation of highly and generally enriched mammalian tissues for solid state NMR

    Energy Technology Data Exchange (ETDEWEB)

    Wong, Veronica Wai Ching; Reid, David G.; Chow, Wing Ying; Rajan, Rakesh [University of Cambridge, Department of Chemistry (United Kingdom); Green, Maggie [University of Cambridge, Central Biomedical Resources, School of Clinical Medicine (United Kingdom); Brooks, Roger A. [University of Cambridge, Department of Trauma and Orthopaedic Surgery, Addenbrooke’s Hospital (United Kingdom); Duer, Melinda J., E-mail: mjd13@cam.ac.uk [University of Cambridge, Department of Chemistry (United Kingdom)

    2015-10-15

    An appreciable level of isotope labelling is essential for future NMR structure elucidation of mammalian biomaterials, which are either poorly expressed, or unexpressable, using micro-organisms. We present a detailed protocol for high level {sup 13}C enrichment even in slow turnover murine biomaterials (fur keratin), using a customized diet supplemented with commercial labelled algal hydrolysate and formulated as a gel to minimize wastage, which female mice consumed during pregnancy and lactation. This procedure produced approximately eightfold higher fur keratin labelling in pups, exposed in utero and throughout life to label, than in adults exposed for the same period, showing both the effectiveness, and necessity, of this approach.

  17. Uranium enrichment management review: summary of analysis

    International Nuclear Information System (INIS)

    1981-01-01

    In May 1980, the Assistant Secretary for Resource Applications within the Department of Energy requested that a group of experienced business executives be assembled to review the operation, financing, and management of the uranium enrichment enterprise as a basis for advising the Secretary of Energy. After extensive investigation, analysis, and discussion, the review group presented its findings and recommendations in a report on December 2, 1980. The following pages contain background material on which that final report was based. This report is arranged in chapters that parallel those of the uranium enrichment management review final report - chapters that contain summaries of the review group's discussion and analyses in six areas: management of operations and construction; long-range planning; marketing of enrichment services; financial management; research and development; and general management. Further information, in-depth analysis, and discussion of suggested alternative management practices are provided in five appendices

  18. Uranium enrichment management review: summary of analysis

    Energy Technology Data Exchange (ETDEWEB)

    1981-01-01

    In May 1980, the Assistant Secretary for Resource Applications within the Department of Energy requested that a group of experienced business executives be assembled to review the operation, financing, and management of the uranium enrichment enterprise as a basis for advising the Secretary of Energy. After extensive investigation, analysis, and discussion, the review group presented its findings and recommendations in a report on December 2, 1980. The following pages contain background material on which that final report was based. This report is arranged in chapters that parallel those of the uranium enrichment management review final report - chapters that contain summaries of the review group's discussion and analyses in six areas: management of operations and construction; long-range planning; marketing of enrichment services; financial management; research and development; and general management. Further information, in-depth analysis, and discussion of suggested alternative management practices are provided in five appendices.

  19. Conversion of highly enriched uranium in thorium-232 based oxide fuel for light water reactors: MOX-T fuel

    Energy Technology Data Exchange (ETDEWEB)

    Vapirev, E; Jordanov, T; Khristoskov, I [Sofia Univ. (Bulgaria). Fizicheski Fakultet

    1996-12-31

    The possibility of using highly enriched uranium available from military inventories for production of mixed oxide fuel (MOX) has been proposed. The fuel is based on U-235 dioxide as fissile isotope and Th-232 dioxide as a non-fissile isotope. It is shown that although the fuel conversion coefficient to U-233 is expected to be less than 1, the proposed fuel has several important advantages resulting in cost reduction of the nuclear fuel cycle. The expected properties of MOX fuel (cross-sections, generated chains, delayed neutrons) are estimated. Due to fuel generation the initial enrichment is expected to be 1% less for production of the same energy. In contrast to traditional fuel no long living actinides are generated which reduces the disposal and reprocessing cost. 7 refs.

  20. Family, Employment, and Individual Resource-Based Antecedents of Maternal Work-Family Enrichment from Infancy through Middle Childhood

    Science.gov (United States)

    Zhou, Nan; Buehler, Cheryl

    2015-01-01

    This study used data from the NICHD Study of Early Child Care and Youth Development (N = 1,019) to examine family, employment, and individual antecedents of maternal work-family enrichment from infancy through middle childhood. Work-family conflict and important confounding factors were controlled. From the family domain, higher income-to-needs ratio and social support were associated with higher work-family enrichment. From the employment domain, greater job rewards, benefits of employment for children, and work commitment were associated with higher work-family enrichment. From the individual domain, higher maternal education and extroversion were associated with higher work-family enrichment. No family, employment, and individual characteristics were associated with work-family conflict across time except for partner intimacy. In general, the results supported antecedents of work-family enrichment that supply needed resources. The present study contributed to the literature by identifying antecedents of maternal work-family enrichment across early child developmental stages, which goes beyond examinations of particular life stages and a work-family conflict perspective. Implications for theory and practice are discussed. PMID:26641483

  1. Factors that predict consumer acceptance of enriched processed meats

    OpenAIRE

    Shan, Liran Christine; Henchion, Maeve; De Brún, Aoife; Murrin, Celine; Wall, Patrick G.; Monahan, Frank J.

    2017-01-01

    The study aimed to understand predictors of consumers' purchase intention towards processed meat based functional foods (i.e. enriched processed meat). A cross-sectional survey was conducted with 486 processed meat consumers in spring 2016. Results showed that processed meats were perceived differently in healthiness, with sausage-type products perceived less healthy than cured meat products. Consumers were in general more uncertain than positive about enriched processed meat but differences ...

  2. A Systematic Approach to Marital Enrichment.

    Science.gov (United States)

    Dinkmeyer, Don; Carlson, Jon

    1986-01-01

    Presents a systematic approach to enriching marital relationships. The history and current status of marital enrichment is reviewed. An Adlerian approach to marital enrichment is described. Applications of the program in enrichment groups, marriage therapy and couple groups are included. (Author)

  3. The enrichment secondary market

    International Nuclear Information System (INIS)

    Einbund, D.R.

    1986-01-01

    This paper will addresses two topics: the background to the present status of the enrichment secondary market and the future outlook of the secondary market in enrichment services, and the viability of the nuclear fuel brokerage industry. These two topics are inevitably connected, as most secondary market activity, not only in enrichment but also in natural uranium, has traditionally been conducted with the participation of brokers. Therefore, the author interrelates these topics

  4. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.

    Science.gov (United States)

    Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram

    2017-04-01

    Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.

  5. Thermal breeder fuel enrichment zoning

    International Nuclear Information System (INIS)

    Capossela, H.J.; Dwyer, J.R.; Luce, R.G.; McCoy, D.F.; Merriman, F.C.

    1992-01-01

    A method and apparatus for improving the performance of a thermal breeder reactor having regions of higher than average moderator concentration are disclosed. The fuel modules of the reactor core contain at least two different types of fuel elements, a high enrichment fuel element and a low enrichment fuel element. The two types of fuel elements are arranged in the fuel module with the low enrichment fuel elements located between the high moderator regions and the high enrichment fuel elements. Preferably, shim rods made of a fertile material are provided in selective regions for controlling the reactivity of the reactor by movement of the shim rods into and out of the reactor core. The moderation of neutrons adjacent the high enrichment fuel elements is preferably minimized as by reducing the spacing of the high enrichment fuel elements and/or using a moderator having a reduced moderating effect. 1 figure

  6. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  7. Uranium enrichment in the United States

    International Nuclear Information System (INIS)

    Hill, J.H.; Parks, J.W.

    1975-01-01

    History, improvement programs, status of electrical power availability, demands for uranium enrichment, operating plan for the U. S. enriching facilities, working inventory of enriched uranium, possible factors affecting deviations in the operating plan, status of gaseous diffusion technology, status of U. S. gas centrifuge advances, transfer of enrichment technology, gaseous diffusion--gas centrifuge comparison, new enrichment capacity, U. S. separative work pricing, and investment in nuclear energy are discussed. (LK)

  8. Standards-Based Wireless Sensor Networking Protocols for Spaceflight Applications

    Science.gov (United States)

    Wagner, Raymond S.

    2010-01-01

    Wireless sensor networks (WSNs) have the capacity to revolutionize data gathering in both spaceflight and terrestrial applications. WSNs provide a huge advantage over traditional, wired instrumentation since they do not require wiring trunks to connect sensors to a central hub. This allows for easy sensor installation in hard to reach locations, easy expansion of the number of sensors or sensing modalities, and reduction in both system cost and weight. While this technology offers unprecedented flexibility and adaptability, implementing it in practice is not without its difficulties. Recent advances in standards-based WSN protocols for industrial control applications have come a long way to solving many of the challenges facing practical WSN deployments. In this paper, we will overview two of the more promising candidates - WirelessHART from the HART Communication Foundation and ISA100.11a from the International Society of Automation - and present the architecture for a new standards-based sensor node for networking and applications research.

  9. Improved Syntheses and Expanded Analyses of the Enantiomerically Enriched Chiral Cobalt Complexes Co(en)[subscript 3]I[subscript 3] and Co(diNOsar)Br[subscript 3

    Science.gov (United States)

    McClellan, Michael J.; Cass, Marion E.

    2015-01-01

    This communication is a collection of additions and modifications to two previously published classic inorganic synthesis laboratory experiments. The experimental protocol for the synthesis and isolation of enantiomerically enriched ?- (or ?-)Co(en)[subscript 3]I[subscript 3] has been modified to increase reproducibility, yield, and enantiomeric…

  10. Enrichment into the 21st century

    International Nuclear Information System (INIS)

    Rutkowski, E.

    1995-01-01

    This article discusses the future of the enrichment services market into the next century. It is estimated that demand for enrichment services will reach 31 million SWU by the end of the century and remain constant for the following 10 years. The current world enrichment capacity is 44 million SWU, or some 50% ahead of the demand. This oversupply is projected to continue into the next century, but in spite of this, several suppliers are planning new enrichment facilities. HEU as a source of enriched uranium is examined. Overall, long-term prices for enrichment services are expected to decline in the coming decade

  11. The commercial role for centrifuge enrichment

    International Nuclear Information System (INIS)

    Readle, P.H.; Wilcox, P.

    1987-01-01

    The enrichment market is extremely competitive and capacity greatly exceeds demand. BNFL [British Nuclear Fuels Ltd.] is in a unique position in having commercial experience of the two enrichment technologies currently used industrially: diffusion, and centrifuge enrichment through its associate company Urenco. In addition, BNFL is developing laser enrichment techniques as part of a UK development programme. The paper describes the enrichment market, briefly discusses the relative merits of the various methods of uranium enrichment and concludes that the gas centrifuge will be best able to respond to market needs for at least the remainder of the century. (author)

  12. High enrichment to low enrichment core's conversion. Accidents analysis

    International Nuclear Information System (INIS)

    Abbate, P.; Rubio, R.; Doval, A.; Lovotti, O.

    1990-01-01

    This work analyzes the different accidents that may occur in the reactor's facility after the 20% high-enriched uranium core's conversion. The reactor (of 5 thermal Mw), built in the 50's and 60's, is of the 'swimming pool' type, with light water and fuel elements of the curve plates MTR type, enriched at 93.15 %. This analysis includes: a) accidents by reactivity insertion; b) accidents by coolant loss; c) analysis by flow loss and d) fission products release. (Author) [es

  13. A Novel Quantum Video Steganography Protocol with Large Payload Based on MCQI Quantum Video

    Science.gov (United States)

    Qu, Zhiguo; Chen, Siyi; Ji, Sai

    2017-11-01

    As one of important multimedia forms in quantum network, quantum video attracts more and more attention of experts and scholars in the world. A secure quantum video steganography protocol with large payload based on the video strip encoding method called as MCQI (Multi-Channel Quantum Images) is proposed in this paper. The new protocol randomly embeds the secret information with the form of quantum video into quantum carrier video on the basis of unique features of video frames. It exploits to embed quantum video as secret information for covert communication. As a result, its capacity are greatly expanded compared with the previous quantum steganography achievements. Meanwhile, the new protocol also achieves good security and imperceptibility by virtue of the randomization of embedding positions and efficient use of redundant frames. Furthermore, the receiver enables to extract secret information from stego video without retaining the original carrier video, and restore the original quantum video as a follow. The simulation and experiment results prove that the algorithm not only has good imperceptibility, high security, but also has large payload.

  14. Detecting child abuse based on parental characteristics: does the Hague Protocol cause parents to avoid the emergency department?

    Science.gov (United States)

    Diderich, Hester M; Fekkes, Minne; Dechesne, Mark; Buitendijk, Simone E; Oudesluys-Murphy, Anne Marie

    2015-04-01

    The Hague Protocol is used by professionals at the adult Emergency Departments (ED) in The Netherlands to detect child abuse based on three parental characteristics: (1) domestic violence, (2) substance abuse or (3) suicide attempt or self-harm. After detection, a referral is made to the Reporting Center for Child Abuse and Neglect (RCCAN). This study investigates whether implementing this Protocol will lead parents to avoid medical care. We compared the number of patients (for whom the Protocol applied) who attended the ED prior to implementation with those attending after implementation. We conducted telephone interviews (n = 14) with parents whose children were referred to the RCCAN to investigate their experience with the procedure. We found no decline in the number of patients, included in the Protocol, visiting the ED during the 4 year implementation period (2008-2011). Most parents (n = 10 of the 14 interviewed) were positive and stated that they would, if necessary, re-attend the ED with the same complaints in the future. ED nurses and doctors referring children based on parental characteristics do not have to fear losing these families as patients. Copyright © 2014 Elsevier Ltd. All rights reserved.

  15. Final Technical Report: Science and technology reviews of FACE[Free Air Carbon Enrichment

    Energy Technology Data Exchange (ETDEWEB)

    Strain, Boyd R.

    1998-03-23

    The purpose of this grant was to bring together the principals of all known facilities that had been developed, principals who had submitted proposals to develop FACE facilities, and principals who want to develop proposals for facilities. In addition, critical program personnel from potential funding agencies and a few high level science administrators were invited to observe the proceedings and to visit a working FACE facility. The objectives of this study are to conduct a three-day international meeting on scientific aspects of research with the new and developing free air carbon enrichment (FACE) technology. Immediately following the science meeting, conduct a two-day international meeting on experimental protocols to be applied in FACE research. To conduct a four day international meeting on the assessment of the responses of forest ecosystems to elevated atmospheric carbon dioxide. The three meetings supported by this grant were all highly successful meetings and resulted in the formation of an organized and identified working group with the acronym InterFACE (International Free-Air Carbon Dioxide Enrichment) working group.

  16. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  17. Enrichr: interactive and collaborative HTML5 gene list enrichment analysis tool.

    Science.gov (United States)

    Chen, Edward Y; Tan, Christopher M; Kou, Yan; Duan, Qiaonan; Wang, Zichen; Meirelles, Gabriela Vaz; Clark, Neil R; Ma'ayan, Avi

    2013-04-15

    System-wide profiling of genes and proteins in mammalian cells produce lists of differentially expressed genes/proteins that need to be further analyzed for their collective functions in order to extract new knowledge. Once unbiased lists of genes or proteins are generated from such experiments, these lists are used as input for computing enrichment with existing lists created from prior knowledge organized into gene-set libraries. While many enrichment analysis tools and gene-set libraries databases have been developed, there is still room for improvement. Here, we present Enrichr, an integrative web-based and mobile software application that includes new gene-set libraries, an alternative approach to rank enriched terms, and various interactive visualization approaches to display enrichment results using the JavaScript library, Data Driven Documents (D3). The software can also be embedded into any tool that performs gene list analysis. We applied Enrichr to analyze nine cancer cell lines by comparing their enrichment signatures to the enrichment signatures of matched normal tissues. We observed a common pattern of up regulation of the polycomb group PRC2 and enrichment for the histone mark H3K27me3 in many cancer cell lines, as well as alterations in Toll-like receptor and interlukin signaling in K562 cells when compared with normal myeloid CD33+ cells. Such analyses provide global visualization of critical differences between normal tissues and cancer cell lines but can be applied to many other scenarios. Enrichr is an easy to use intuitive enrichment analysis web-based tool providing various types of visualization summaries of collective functions of gene lists. Enrichr is open source and freely available online at: http://amp.pharm.mssm.edu/Enrichr.

  18. Advanced Neutron Source enrichment study

    International Nuclear Information System (INIS)

    Bari, R.A.; Ludewig, H.; Weeks, J.R.

    1996-01-01

    A study has been performed of the impact on performance of using low-enriched uranium (20% 235 U) or medium-enriched uranium (35% 235 U) as an alternative fuel for the Advanced Neutron Source, which was initially designed to use uranium enriched to 93% 235 U. Higher fuel densities and larger volume cores were evaluated at the lower enrichments in terms of impact on neutron flux, safety, safeguards, technical feasibility, and cost. The feasibility of fabricating uranium silicide fuel at increasing material density was specifically addressed by a panel of international experts on research reactor fuels. The most viable alternative designs for the reactor at lower enrichments were identified and discussed. Several sensitivity analyses were performed to gain an understanding of the performance of the reactor at parametric values of power, fuel density, core volume, and enrichment that were interpolations between the boundary values imposed on the study or extrapolations from known technology

  19. Security Enhanced EMV-Based Mobile Payment Protocol

    Directory of Open Access Journals (Sweden)

    Ming-Hour Yang

    2014-01-01

    Full Text Available Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant’s reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer’s credits for risk control, and users can have online-equivalent credits in offline transactions.

  20. Standardized terminology for clinical trial protocols based on top-level ontological categories.

    Science.gov (United States)

    Heller, B; Herre, H; Lippoldt, K; Loeffler, M

    2004-01-01

    This paper describes a new method for the ontologically based standardization of concepts with regard to the quality assurance of clinical trial protocols. We developed a data dictionary for medical and trial-specific terms in which concepts and relations are defined context-dependently. The data dictionary is provided to different medical research networks by means of the software tool Onto-Builder via the internet. The data dictionary is based on domain-specific ontologies and the top-level ontology of GOL. The concepts and relations described in the data dictionary are represented in natural language, semi-formally or formally according to their use.

  1. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  2. Optimizing the MAC Protocol in Localization Systems Based on IEEE 802.15.4 Networks.

    Science.gov (United States)

    Pérez-Solano, Juan J; Claver, Jose M; Ezpeleta, Santiago

    2017-07-06

    Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI) values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments.

  3. Optimizing the MAC Protocol in Localization Systems Based on IEEE 802.15.4 Networks

    Directory of Open Access Journals (Sweden)

    Juan J. Pérez-Solano

    2017-07-01

    Full Text Available Radio frequency signals are commonly used in the development of indoor localization systems. The infrastructure of these systems includes some beacons placed at known positions that exchange radio packets with users to be located. When the system is implemented using wireless sensor networks, the wireless transceivers integrated in the network motes are usually based on the IEEE 802.15.4 standard. But, the CSMA-CA, which is the basis for the medium access protocols in this category of communication systems, is not suitable when several users want to exchange bursts of radio packets with the same beacon to acquire the radio signal strength indicator (RSSI values needed in the location process. Therefore, new protocols are necessary to avoid the packet collisions that appear when multiple users try to communicate with the same beacons. On the other hand, the RSSI sampling process should be carried out very quickly because some systems cannot tolerate a large delay in the location process. This is even more important when the RSSI sampling process includes measures with different signal power levels or frequency channels. The principal objective of this work is to speed up the RSSI sampling process in indoor localization systems. To achieve this objective, the main contribution is the proposal of a new MAC protocol that eliminates the medium access contention periods and decreases the number of packet collisions to accelerate the RSSI collection process. Moreover, the protocol increases the overall network throughput taking advantage of the frequency channel diversity. The presented results show the suitability of this protocol for reducing the RSSI gathering delay and increasing the network throughput in simulated and real environments.

  4. Switching From Age-Based Stimulus Dosing to Dose Titration Protocols in Electroconvulsive Therapy: Empirical Evidence for Better Patient Outcomes With Lower Peak and Cumulative Energy Doses.

    Science.gov (United States)

    O'Neill-Kerr, Alex; Yassin, Anhar; Rogers, Stephen; Cornish, Janie

    2017-09-01

    The aim of this study was to test the proposition that adoption of a dose titration protocol may be associated with better patient outcomes, at lower treatment dose, and with comparable cumulative dose to that in patients treated using an age-based stimulus dosing protocol. This was an analysis of data assembled from archived records and based on cohorts of patients treated respectively on an age-based stimulus dosing protocol and on a dose titration protocol in the National Health Service in England. We demonstrated a significantly better response in the patient cohort treated with dose titration than with age-based stimulus dosing. Peak doses were less and the total cumulative dose was less in the dose titration group than in the age-based stimulus dosing group. Our findings are consistent with superior outcomes in patients treated using a dose titration protocol when compared with age-based stimulus dosing in a similar cohort of patients.

  5. Correlation dimension based nonlinear analysis of network traffics with different application protocols

    International Nuclear Information System (INIS)

    Wang Jun-Song; Yuan Jing; Li Qiang; Yuan Rui-Xi

    2011-01-01

    This paper uses a correlation dimension based nonlinear analysis approach to analyse the dynamics of network traffics with three different application protocols—HTTP, FTP and SMTP. First, the phase space is reconstructed and the embedding parameters are obtained by the mutual information method. Secondly, the correlation dimensions of three different traffics are calculated and the results of analysis have demonstrated that the dynamics of the three different application protocol traffics is different from each other in nature, i.e. HTTP and FTP traffics are chaotic, furthermore, the former is more complex than the later; on the other hand, SMTP traffic is stochastic. It is shown that correlation dimension approach is an efficient method to understand and to characterize the nonlinear dynamics of HTTP, FTP and SMTP protocol network traffics. This analysis provided insight into and a more accurate understanding of nonlinear dynamics of internet traffics which have a complex mixture of chaotic and stochastic components. (general)

  6. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  7. Service Characteristics Based High Speed Multimedia Transport Protocol

    National Research Council Canada - National Science Library

    Chen, C

    1997-01-01

    .... This multimedia protocol will automatically extract service requirements from multimedia applications by selecting certain sets of parameters from user applications to optimally drive the lower level physical network...

  8. DOE hands over uranium enrichment duties to government corporation

    International Nuclear Information System (INIS)

    Simpson, J.

    1993-01-01

    In an effort to renew the United States' competitiveness in the world market for uranium enrichment services, the Department of Energy (DOE) is turning over control of its Paducah, KY, and Portsmouth, OH, enrichment facilities to a for-profit organization, the United States Enrichment Corp. (USEC), which was created by last year's Energy Policy Act. William H. Timbers, Jr., a former investment banker who was appointed acting CEO in March, said the Act's mandate will mean more competitive prices for enriched reactor fuel and greater responsiveness to utility customers. As a government corporation, USEC, with current annual revenues estimated at $1.5 billion, will no longer be part of the federal budget appropriations process, but will use business management techniques, set market-based prices for enriched uranium, and pay annual dividends to the US Treasury-its sole stockholder-from earnings. The goal is to finish privatizing the corporation within two years, and to sell its stock to investors for an estimated $1 to $3 billion. USEC's success will depend in part on developing short- and long-term marketing plants to help stanch the flow of enriched-uranium customers to foreign suppliers. (DOE already has received notice from a number of US utilities that they want to be let out of their long-term enrichment contracts as they expire over the next several years).USEC's plans likely will include exploring new joint ventures with other businesses in the nuclear fuel cycle-such as suppliers, fabricators, and converters-and offering a broader range of enrichment services than DOE provided. The corporation will have to be responsive to utilities on an individual basis

  9. Family, employment, and individual resource-based antecedents of maternal work-family enrichment from infancy through middle childhood.

    Science.gov (United States)

    Zhou, Nan; Buehler, Cheryl

    2016-07-01

    This study used data from the National Institute of Child Health and Human Development (NICHD) Study of Early Child Care and Youth Development (N = 1,019) to examine family, employment, and individual antecedents of maternal work-family enrichment from infancy through middle childhood. Work-family conflict and important confounding factors were controlled. From the family domain, higher income-to-needs ratio and social support were associated with higher work-family enrichment. From the employment domain, greater job rewards, benefits of employment for children, and work commitment were associated with higher work-family enrichment. From the individual domain, higher maternal education and extroversion were associated with higher work-family enrichment. No family, employment, and individual characteristics were associated with work-family conflict across time except for partner intimacy. In general, the results supported antecedents of work-family enrichment that supply needed resources. The present study contributed to the literature by identifying antecedents of maternal work-family enrichment across early child developmental stages, which goes beyond examinations of particular life stages and a work-family conflict perspective. Implications for theory and practice are discussed. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  10. Prospects and problems of uranium enrichment

    International Nuclear Information System (INIS)

    Imai, Ryukichi

    1974-01-01

    The problem of uranium enrichment now concerns principally peaceful nuclear power generation. With the current oil crisis, energy resources assume unprecedented importance. However, the requirements for enriched uranium vary with the vicissitude of the world situation in nuclear power generation; the enterprise of uranium enrichment is related to economic aspect. The following matters are described: dimension of enrichment problem, political factors, changes in requirements, projects in each country, and strategy of enrichment in Japan. (Mori, K.)

  11. Method for semi-automated microscopy of filtration-enriched circulating tumor cells

    International Nuclear Information System (INIS)

    Pailler, Emma; Oulhen, Marianne; Billiot, Fanny; Galland, Alexandre; Auger, Nathalie; Faugeroux, Vincent; Laplace-Builhé, Corinne; Besse, Benjamin; Loriot, Yohann; Ngo-Camus, Maud; Hemanda, Merouan; Lindsay, Colin R.; Soria, Jean-Charles; Vielh, Philippe; Farace, Françoise

    2016-01-01

    Circulating tumor cell (CTC)-filtration methods capture high numbers of CTCs in non-small-cell lung cancer (NSCLC) and metastatic prostate cancer (mPCa) patients, and hold promise as a non-invasive technique for treatment selection and disease monitoring. However filters have drawbacks that make the automation of microscopy challenging. We report the semi-automated microscopy method we developed to analyze filtration-enriched CTCs from NSCLC and mPCa patients. Spiked cell lines in normal blood and CTCs were enriched by ISET (isolation by size of epithelial tumor cells). Fluorescent staining was carried out using epithelial (pan-cytokeratins, EpCAM), mesenchymal (vimentin, N-cadherin), leukocyte (CD45) markers and DAPI. Cytomorphological staining was carried out with Mayer-Hemalun or Diff-Quik. ALK-, ROS1-, ERG-rearrangement were detected by filter-adapted-FISH (FA-FISH). Microscopy was carried out using an Ariol scanner. Two combined assays were developed. The first assay sequentially combined four-color fluorescent staining, scanning, automated selection of CD45 − cells, cytomorphological staining, then scanning and analysis of CD45 − cell phenotypical and cytomorphological characteristics. CD45 − cell selection was based on DAPI and CD45 intensity, and a nuclear area >55 μm 2 . The second assay sequentially combined fluorescent staining, automated selection of CD45 − cells, FISH scanning on CD45 − cells, then analysis of CD45 − cell FISH signals. Specific scanning parameters were developed to deal with the uneven surface of filters and CTC characteristics. Thirty z-stacks spaced 0.6 μm apart were defined as the optimal setting, scanning 82 %, 91 %, and 95 % of CTCs in ALK-, ROS1-, and ERG-rearranged patients respectively. A multi-exposure protocol consisting of three separate exposure times for green and red fluorochromes was optimized to analyze the intensity, size and thickness of FISH signals. The semi-automated microscopy method reported here

  12. Uranium enrichment: an overview

    International Nuclear Information System (INIS)

    Cazalet, J.

    1995-01-01

    This paper is a general presentation of uranium enrichment processes and assessments of the prevailing commercial and industrial situations. It gives first some theoretical aspects of enrichment in general and explains the differences between statistical and selective processes in particular. Then a review of the different processes is made with a comparison between them. Finally, some general remarks concerning applications are given and the risks of proliferation related to enrichment are mentioned. (J.S.). 4 refs., 5 figs., 8 tabs

  13. Environmental enrichment for a mixed-species nocturnal mammal exhibit.

    Science.gov (United States)

    Clark, Fay E; Melfi, Vicky A

    2012-01-01

    Environmental enrichment (EE) is an integral aspect of modern zoo animal management but, empirical evaluation of it is biased toward species housed in single-species groups. Nocturnal houses, where several nocturnal species are housed together, are particularly overlooked. This study investigated whether three species (nine-banded armadillos, Dasypus novemcinctus; Senegal bush babies, Galago senegalensis; two-toed sloths, Choloepus didactylus) in the nocturnal house at Paignton Zoo Environmental Park, UK could be enriched using food-based and sensory EE. Subjects were an adult male and female of each species. EE was deemed effective if it promoted target species-typical behaviors, behavioral diversity, and increased use of enriched exhibit zones. Results from generalized linear mixed models demonstrated that food-based EE elicited the most positive behavioral effects across species. One set of food-based EEs (Kong®, termite mound and hanging food) presented together was associated with a significant increase in species-typical behaviors, increased behavioral diversity, and increased use of enriched exhibit zones in armadillos and bush babies. Although one type of sensory EE (scented pine cones) increased overall exhibit use in all species, the other (rainforest sounds) was linked to a significant decrease in species-typical behavior in bush babies and sloths. There were no intra or interspecies conflicts over EE, and commensalism occurred between armadillos and bush babies. Our data demonstrate that simple food-based and sensory EE can promote positive behavioral changes in a mixed-species nocturnal mammal exhibit. We suggest that both food and sensory EE presented concurrently will maximize opportunities for naturalistic activity in all species. © 2011 Wiley Periodicals, Inc.

  14. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  15. The effects of sweep numbers per average and protocol type on the accuracy of the p300-based concealed information test.

    Science.gov (United States)

    Dietrich, Ariana B; Hu, Xiaoqing; Rosenfeld, J Peter

    2014-03-01

    In the first of two experiments, we compared the accuracy of the P300 concealed information test protocol as a function of numbers of trials experienced by subjects and ERP averages analyzed by investigators. Contrary to Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), we found no evidence that 100 trial based averages are more accurate than 66 or 33 trial based averages (all numbers led to accuracies of 84-94 %). There was actually a trend favoring the lowest trial numbers. The second study compared numbers of irrelevant stimuli recalled and recognized in the 3-stimulus protocol versus the complex trial protocol (Rosenfeld in Memory detection: theory and application of the concealed information test, Cambridge University Press, New York, pp 63-89, 2011). Again, in contrast to expectations from Farwell et al. (Cogn Neurodyn 6(2):115-154, 2012), there were no differences between protocols, although there were more irrelevant stimuli recognized than recalled, and irrelevant 4-digit number group stimuli were neither recalled nor recognized as well as irrelevant city name stimuli. We therefore conclude that stimulus processing in the P300-based complex trial protocol-with no more than 33 sweep averages-is adequate to allow accurate detection of concealed information.

  16. Cooperative Cloud Service Aware Mobile Internet Coverage Connectivity Guarantee Protocol Based on Sensor Opportunistic Coverage Mechanism

    Directory of Open Access Journals (Sweden)

    Qin Qin

    2015-01-01

    Full Text Available In order to improve the Internet coverage ratio and provide connectivity guarantee, based on sensor opportunistic coverage mechanism and cooperative cloud service, we proposed the coverage connectivity guarantee protocol for mobile Internet. In this scheme, based on the opportunistic covering rules, the network coverage algorithm of high reliability and real-time security was achieved by using the opportunity of sensor nodes and the Internet mobile node. Then, the cloud service business support platform is created based on the Internet application service management capabilities and wireless sensor network communication service capabilities, which is the architecture of the cloud support layer. The cooperative cloud service aware model was proposed. Finally, we proposed the mobile Internet coverage connectivity guarantee protocol. The results of experiments demonstrate that the proposed algorithm has excellent performance, in terms of the security of the Internet and the stability, as well as coverage connectivity ability.

  17. Modification of Rat Lung Decellularization Protocol Based on Dynamic Conductometry of Working Solution.

    Science.gov (United States)

    Kuevda, E V; Gubareva, E A; Gumenyuk, I S; Sotnichenko, A S; Gilevich, I V; Nakokhov, R Z; Rusinova, T V; Yudina, T G; Red'ko, A N; Alekseenko, S N

    2017-03-01

    We modified the protocol of obtaining of biological scaffolds of rat lungs based on dynamic recording of specific resistivity of working detergent solution (conductometry) during perfusion decellularization. Termination of sodium deoxycholate exposure after attaining ionic equilibrium plateau did not impair the quality of decellularization and preserved structural matrix components, which was confirmed by morphological analysis and quantitative assay of residual DNA.

  18. Supply of low enriched (LEU) and highly enriched uranium (HEU) for research reactors

    International Nuclear Information System (INIS)

    Mueller, H.

    1997-01-01

    Enriched uranium for research reactors in the form of LEU /= low enriched uranium at 19.75% U-235) and HEU (= highly enriched uranium at 90 to 93% U-235) was and is - due to its high U-235 enrichment - a political fuel other than enriched uranium for power reactors. The sufficient availability of LEU and HEU is a vital question for research reactors, especially in Europe, in order to perform their peaceful research reactor programs. In the past the USA were in the Western hemisphere sole supplier of LEU and HEU. Today the USA have de facto stopped the supply of LEU and HEU, for HEU mainly due to political reasons. This paper deals, among others, with the present availability of LEU and HEU for European research reactors and touches the following topics: - historical US supplies, - influence of the RERTR-program, - characteristics of LEU and HEU, - military HEU enters the civil market, -what is the supply situation for LEU and HEU today? - outlook for safe supplies of LEU and HEU. (author)

  19. A Data-origin Authentication Protocol Based on ONOS Cluster

    Directory of Open Access Journals (Sweden)

    Qin Hua

    2016-01-01

    Full Text Available This paper is aim to propose a data-origin authentication protocol based on ONOS cluster. ONOS is a SDN controller which can work under a distributed environment. However, the security of an ONOS cluster is seldom considered, and the communication in an ONOS cluster may suffer from lots of security threats. In this paper, we used a two-tier self-renewable hash chain for identity authentication and data-origin authentication. We analyse the security and overhead of our proposal and made a comparison with current security measure. It showed that with the help of our proposal, communication in an ONOS cluster could be protected from identity forging, replay attacks, data tampering, MITM attacks and repudiation, also the computational overhead would decrease apparently.

  20. Factors that predict consumer acceptance of enriched processed meats.

    Science.gov (United States)

    Shan, Liran C; Henchion, Maeve; De Brún, Aoife; Murrin, Celine; Wall, Patrick G; Monahan, Frank J

    2017-11-01

    The study aimed to understand predictors of consumers' purchase intention towards processed meat based functional foods (i.e. enriched processed meat). A cross-sectional survey was conducted with 486 processed meat consumers in spring 2016. Results showed that processed meats were perceived differently in healthiness, with sausage-type products perceived less healthy than cured meat products. Consumers were in general more uncertain than positive about enriched processed meat but differences existed in terms of the attitudes and purchase intention. Following regression analysis, consumers' purchase intention towards enriched processed meat was primarily driven by their attitudes towards the product concept. Perceived healthiness of existing products and eating frequency of processed meat were also positively associated with the purchase intention. Other factors such as general food choice motives, socio-demographic characteristics, consumer health and the consumption of functional foods and dietary supplements in general, were not significant predictors of the purchase intention for enriched processed meat. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Research on aerodynamic means of isotope enrichment

    International Nuclear Information System (INIS)

    Cattolica, R.J.; Gallagher, R.J.; Talbot, L.; Willis, D.R.; Hurlbut, F.C.; Fiszdon, W.; Anderson, J.B.

    1978-03-01

    The results of a research program directed toward the understanding of the fundamental gas dynamics involved in aerodynamic isotope enrichment are summarized. The specific aerodynamic isotope enrichment method which was examined in this research is based on a velocity slip phenomenon which occurs in the rarefied hypersonic expansion of a heavy molecular weight gas and a light carrier gas in a nozzle or free jet. This particular aerodynamic method was chosen for study because it contains the fundamental molecular physics of other more complex techniques within the context of a one-dimensional flow without boundary effects. From both an experimental and theoretical modeling perspective this provides an excellent basis for testing the experimental and numerical tools with which to investigate more complex aerodynamic isotope enrichment processes. This report consists of three separate parts. Part I contains a theoretical analysis of the velocity slip effect in free jet expansions of binary and ternary gas mixtures. The analysis, based on a source flow model and using moment equations is derived from the Boltzmann equation using the hypersonic approximation. Part II contains the experimental measurements of velocity slip. The numerical simulation of the slip process was carried out by using a Monte-Carlo numerical technique. In addition, comparisons between the theoretical analysis of Part I and the experiments are presented. Part III describes impact pressure measurements of free jet expansions from slot shaped two dimensional nozzles. At least two methods of aerodynamic isotope enrichment (opposed jet and velocity slip) would depend on the use of this type of two dimensional expansion. Flow surveys of single free jet and the interferene of crossed free jets are presented

  2. Winnowing DNA for rare sequences: highly specific sequence and methylation based enrichment.

    Directory of Open Access Journals (Sweden)

    Jason D Thompson

    Full Text Available Rare mutations in cell populations are known to be hallmarks of many diseases and cancers. Similarly, differential DNA methylation patterns arise in rare cell populations with diagnostic potential such as fetal cells circulating in maternal blood. Unfortunately, the frequency of alleles with diagnostic potential, relative to wild-type background sequence, is often well below the frequency of errors in currently available methods for sequence analysis, including very high throughput DNA sequencing. We demonstrate a DNA preparation and purification method that through non-linear electrophoretic separation in media containing oligonucleotide probes, achieves 10,000 fold enrichment of target DNA with single nucleotide specificity, and 100 fold enrichment of unmodified methylated DNA differing from the background by the methylation of a single cytosine residue.

  3. Winnowing DNA for rare sequences: highly specific sequence and methylation based enrichment.

    Science.gov (United States)

    Thompson, Jason D; Shibahara, Gosuke; Rajan, Sweta; Pel, Joel; Marziali, Andre

    2012-01-01

    Rare mutations in cell populations are known to be hallmarks of many diseases and cancers. Similarly, differential DNA methylation patterns arise in rare cell populations with diagnostic potential such as fetal cells circulating in maternal blood. Unfortunately, the frequency of alleles with diagnostic potential, relative to wild-type background sequence, is often well below the frequency of errors in currently available methods for sequence analysis, including very high throughput DNA sequencing. We demonstrate a DNA preparation and purification method that through non-linear electrophoretic separation in media containing oligonucleotide probes, achieves 10,000 fold enrichment of target DNA with single nucleotide specificity, and 100 fold enrichment of unmodified methylated DNA differing from the background by the methylation of a single cytosine residue.

  4. Uranium enrichment activities: the SILVA program

    International Nuclear Information System (INIS)

    Guyot, J.; Cazalet, J.; Camarcat, N.; Figuet, J.

    1994-01-01

    Through its commitment to a nuclear electricity generation policy, France holds today a specific position in the uranium enrichment market thanks to the modern multinational EURODIF gaseous diffusion plant. France has, altogether, a long-term goal in developing SILVA, a laser uranium enrichment process, based on the selective photo-ionization of U-235. After reviewing the fundamentals of SILVA (the laser system with copper vapor lasers and dye lasers and the separator system), a description of the general organization of the R and D program is provided going through basic research, subsystems assessment, production demonstrations and simulations (with the LACAN code), plant design and economics. The general schedule of SILVA is outlined, leading to the possible construction of a commercial plant. 7 figs., 11 refs

  5. Individualized music for dementia: Evolution and application of evidence-based protocol.

    Science.gov (United States)

    Gerdner, Linda A

    2012-04-22

    The theory-based intervention of individualized music has been evaluated clinically and empirically leading to advancement and refinement of an evidence-based protocol, currently in its 5th edition. An expanded version of the protocol was written for professional health care providers with a consumer version tailored for family caregivers. The underlying mid-range theory is presented along with a seminal study that was followed by further research in the United States, Canada, Great Britain, France, Sweden, Norway, Japan and Taiwan. Key studies are summarized. Given its efficacy when implemented by research staff, studies have advanced to testing the intervention under real-life conditions when implemented and evaluated by trained nursing assistants in long-term care facilities and visiting family members. In addition, one study evaluated the implementation of music by family members in the home setting. Initial research focused on agitation as the dependent variable with subsequent research indicating a more holistic response such as positive affect, expressed satisfaction, and meaningful interaction with others. The article advances by describing on-line programs designed to train health care professionals in the assessment, implementation and evaluation of individualized music. In addition, Gerdner has written a story for a picture book intended for children and their families (in press). The story models principles of individualized music to elicit positive memories, reduce anxiety and agitation, and promote communication. The article concludes with implications for future research.

  6. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  7. Integrated and Contextual Basic Science Instruction in Preclinical Education: Problem-Based Learning Experience Enriched with Brain/Mind Learning Principles

    Science.gov (United States)

    Gülpinar, Mehmet Ali; Isoglu-Alkaç, Ümmühan; Yegen, Berrak Çaglayan

    2015-01-01

    Recently, integrated and contextual learning models such as problem-based learning (PBL) and brain/mind learning (BML) have become prominent. The present study aimed to develop and evaluate a PBL program enriched with BML principles. In this study, participants were 295 first-year medical students. The study used both quantitative and qualitative…

  8. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  9. Analysis of security protocols based on challenge-response

    Institute of Scientific and Technical Information of China (English)

    LUO JunZhou; YANG Ming

    2007-01-01

    Security protocol is specified as the procedure of challenge-response, which uses applied cryptography to confirm the existence of other principals and fulfill some data negotiation such as session keys. Most of the existing analysis methods,which either adopt theorem proving techniques such as state exploration or logic reasoning techniques such as authentication logic, face the conflicts between analysis power and operability. To solve the problem, a new efficient method is proposed that provides SSM semantics-based definition of secrecy and authentication goals and applies authentication logic as fundamental analysis techniques,in which secrecy analysis is split into two parts: Explicit-Information-Leakage and Implicit-Information-Leakage, and correspondence analysis is concluded as the analysis of the existence relationship of Strands and the agreement of Strand parameters. This new method owns both the power of the Strand Space Model and concision of authentication logic.

  10. Implementation of a Rapid, Protocol-based TIA Management Pathway

    Directory of Open Access Journals (Sweden)

    Susann J. Jarhult

    2018-02-01

    Full Text Available Introduction: Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED with symptoms of transient ischemic attack (TIA. Methods: We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6–12 months after implementation. Outcomes included ED length of stay (LOS, hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. Results: From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18. Following the intervention, the inpatient admission rate decreased from 62% to 24% (p<0.001, median ED LOS decreased by 1.2 hours (5.7 to 4.9 hours, p=0.027, and median total hospital LOS from 29.4 hours to 23.1 hours (p=0.019. The proportion of patients receiving head computed tomography (CT went from 68% to 58% (p=0.087; brain magnetic resonance (MR imaging from 83% to 88%, (p=0.44 neck CT angiography from 32% to 22% (p=0.039; and neck MR angiography from 61% to 72% (p=0.046. Ninety-day stroke or recurrent TIA among those with final diagnosis of TIA was 3% for both periods. Conclusion: Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  11. PCR-Free Enrichment of Mitochondrial DNA from Human Blood and Cell Lines for High Quality Next-Generation DNA Sequencing.

    Directory of Open Access Journals (Sweden)

    Meetha P Gould

    Full Text Available Recent advances in sequencing technology allow for accurate detection of mitochondrial sequence variants, even those in low abundance at heteroplasmic sites. Considerable sequencing cost savings can be achieved by enriching samples for mitochondrial (relative to nuclear DNA. Reduction in nuclear DNA (nDNA content can also help to avoid false positive variants resulting from nuclear mitochondrial sequences (numts. We isolate intact mitochondrial organelles from both human cell lines and blood components using two separate methods: a magnetic bead binding protocol and differential centrifugation. DNA is extracted and further enriched for mitochondrial DNA (mtDNA by an enzyme digest. Only 1 ng of the purified DNA is necessary for library preparation and next generation sequence (NGS analysis. Enrichment methods are assessed and compared using mtDNA (versus nDNA content as a metric, measured by using real-time quantitative PCR and NGS read analysis. Among the various strategies examined, the optimal is differential centrifugation isolation followed by exonuclease digest. This strategy yields >35% mtDNA reads in blood and cell lines, which corresponds to hundreds-fold enrichment over baseline. The strategy also avoids false variant calls that, as we show, can be induced by the long-range PCR approaches that are the current standard in enrichment procedures. This optimization procedure allows mtDNA enrichment for efficient and accurate massively parallel sequencing, enabling NGS from samples with small amounts of starting material. This will decrease costs by increasing the number of samples that may be multiplexed, ultimately facilitating efforts to better understand mitochondria-related diseases.

  12. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  13. Experimental Validation of a Permeability Model for Enrichment Membranes

    International Nuclear Information System (INIS)

    Orellano, Pablo; Brasnarof, Daniel; Florido Pablo

    2003-01-01

    An experimental loop with a real scale diffuser, in a single enrichment-stage configuration, was operated with air at different process conditions, in order to characterize the membrane permeability.Using these experimental data, an analytical geometric-and-morphologic-based model was validated.It is conclude that a new set of independent measurements, i.e. enrichment, is necessary in order to fully characterize diffusers, because of its internal parameters are not univocally determinated with permeability experimental data only

  14. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  15. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  16. The competitive enrichment market

    International Nuclear Information System (INIS)

    Parks, J.W.; Huffman, F.C.

    1984-01-01

    With the enactment of the ''Private Ownership of Special Nuclear Materials Act'' in 1964, the U.S. Government made provisions to enter into the uranium enrichment services business. Since nuclear power was in its infancy and the Government was promoting its growth as well as trying to help U.S. industry sell reactors overseas, the initial contracts (Requirements Contracts) for enrichment services placed most of the risks associated with the supplying of the services on the Government. Projections of nuclear power additions continued to grow and in 1972 the Atomic Energy Commission (AEC) stopped contracting under Requirements Contracts in order to study which mode of contracting best suited the commercial development of the industry. In mid-1973, the AEC introduced the Long-Term Fixed Commitment (LTFC) contract which shifted the risk to the customer. By mid-1974, AEC had contracts which completely used the enrichment capacity of its complex and refused to accept requests for additional contracts. This action further convinced European nations that they should continue to develop their own enrichment capacity and resulted in the EURODIF and URENCO projects. Before this time the U.S. supplied 100% of the world market for enriching services

  17. Enrichment: Dealing with overcapacity

    International Nuclear Information System (INIS)

    Peterson, C.H.

    1989-01-01

    Today's surplus of enrichment capacity will continue until at least the end of this century. This will challenge the ingenuity of the separative work unit (SWU) suppliers as they attempt to keep market share and remain profitable in a very competitive marketplace. The utilities will be faced with attractive choices, but making the best choice will require careful analysis and increased attention to market factors. Current demand projections will probably prove too high to the extent that more reactors are canceled or delayed. The DOE has the vast majority of the unused capacity, so it will feel the most immediate impact of this large surplus in productive capacity. The DOE has responded to these market challenges by planning another reorganization of its enriching operations. Without a major agreement among the governments affected by the current surplus in enrichment capacity, the future will see lower prices, more competitive terms, and the gradual substitution of centrifuge or laser enrichment for the gaseous diffusion plants. The competition that is forcing the gaseous diffusion prices down to marginal cost will provide the long-term price basis for the enrichment industry

  18. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  19. Use of enriched uranium in Canada's power reactors

    International Nuclear Information System (INIS)

    Dormuth, K.W.; Jackson, D.P.

    2011-01-01

    Recent trends in Canadian nuclear power reactor design and proposed development of nuclear power in Canada have indicated the possibility that Canada will break with its tradition of natural uranium fuelled systems, designed for superior neutron economy and, hence, superior uranium utilization. For instance, the Darlington B new reactor project procurement process included three reactor designs, all employing enriched fuel, although a natural uranium reactor design was included at a late stage in the ensuing environmental assessment for the project as an alternative technology. An evaluation of the alternative designs should include an assessment of the environmental implications through the entire fuel cycle, which unfortunately is not required by the environmental assessment process. Examples of comparative environmental implications of the reactor designs throughout the fuel cycle indicate the importance of these considerations when making a design selection. As Canada does not have enrichment capability, a move toward the use of enriched fuel would mean that Canada would be exporting natural uranium and buying back enriched uranium with value added. From a waste management perspective, Canada would need to deal with mill, refinery, and conversion tailings, as well as with the used fuel from its own reactors, while the enrichment supplier would retain depleted uranium with some commercial value. On the basis of reasoned estimates based on publicly available information, it is expected that enrichment in Canada is likely to be more profitable than exporting natural uranium and buying back enriched uranium. Further, on the basis of environmental assessments for enrichment facilities in other countries, it is expected that an environmental assessment of a properly sited enrichment facility would result in approval. (author)

  20. Development of on-line uranium enrichment monitor of gaseous UF6 for uranium enrichment plant

    International Nuclear Information System (INIS)

    Lu Xuesheng; Liu Guorong; Jin Huimin; Zhao Yonggang; Li Jinghuai; Hao Xueyuan; Ying Bin; Yu Zhaofei

    2013-01-01

    An on-line enrichment monitor was developed to measure the enrichment of UF 6 , flowing through the processing pipes in uranium enrichment plant. A Nal (Tl) detector was used to measure the count rates of the 185.7 keV γ-ray emitted from 235 U, and the total quantity of uranium was determined from thermodynamic characteristics of gaseous uranium hexafluoride. The results show that the maximum relative standard deviation is less than 1% when the measurement time is 120 s or more and the pressure is more than 2 kPa in the measurement chamber. Uranium enrichment of gaseous uranium hexafluoride in the output end of cascade can be monitored continuously by using the device. It should be effective for nuclear materials accountability verifications and materials balance verification at uranium enrichment plant. (authors)