WorldWideScience

Sample records for addfam study protocol

  1. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  2. Optimizing the high-resolution manometry (HRM) study protocol.

    Science.gov (United States)

    Patel, A; Ding, A; Mirza, F; Gyawali, C P

    2015-02-01

    Intolerance of the esophageal manometry catheter may prolong high-resolution manometry (HRM) studies and increase patient distress. We assessed the impact of obtaining the landmark phase at the end of the study when the patient has acclimatized to the HRM catheter. 366 patients (mean age 55.4 ± 0.8 years, 62.0% female) undergoing esophageal HRM over a 1-year period were studied. The standard protocol consisted of the landmark phase, 10 5 mL water swallows 20-30 s apart, and multiple rapid swallows where 4-6 2 mL swallows were administered in rapid succession. The modified protocol consisted of the landmark phase at the end of the study after test swallows. Study duration, technical characteristics, indications, and motor findings were compared between standard and modified protocols. Of the 366 patients, 89.6% underwent the standard protocol (study duration 12.9 ± 0.3 min). In 10.4% with poor catheter tolerance undergoing the modified protocol, study duration was significantly longer (15.6 ± 1.0 min, p = 0.004) despite similar duration of study maneuvers. Only elevated upper esophageal sphincter basal pressures at the beginning of the study segregated modified protocol patients. The 95th percentile time to landmark phase in the standard protocol patients was 6.1 min; as many as 31.4% of modified protocol patients could not obtain their first study maneuver within this period (p = 0.0003). Interpretation was not impacted by shifting the landmark phase to the end of the study. Modification of the HRM study protocol with the landmark phase obtained at the end of the study optimizes study duration without compromising quality. © 2014 John Wiley & Sons Ltd.

  3. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  4. Extraction protocols for orthodontic treatment: A retrospective study

    Directory of Open Access Journals (Sweden)

    Vaishnevi N Thirunavukkarasu

    2016-01-01

    Full Text Available Background and Objectives: Various extraction protocols have been followed for successful orthodontic treatment. The purpose of this study was to evaluate the extraction protocols in patients who had previously undergone orthodontic treatment and also who had reported for continuing orthodontic treatment from other clinics. Materials and Methods: One hundred thirty eight patients who registered for orthodontic treatment at the Faculty of Dentistry were divided into 10 extraction protocols based on the Orthodontic treatment protocol given by Janson et al. and were evaluated for statistical significance. Results: The descriptive statistics of the study revealed a total of 40 (29% patients in protocol 1, 43 (31.2% in protocol 2, 18 (13% in protocol 3, 16 (11.6% in protocol 5, and 12 (8.7% in Type 3 category of protocol 9. The Type 3 category in protocol 9 was statistically significant compared to other studies. Midline shift and collapse of the arch form were noticed in these individuals. Conclusion: Extraction of permanent teeth such as canine and lateral incisors without rational reasons could have devastating consequences on the entire occlusion. The percentage of cases wherein extraction of permanent teeth in the crowded region was adopted as a treatment option instead of orthodontic treatment is still prevalent in dental practice. The shortage of orthodontists in Malaysia, the long waiting period, and lack of subjective need for orthodontic treatment at an earlier age group were the reasons for the patient's to choose extraction of the mal-aligned teeth such as the maxillary canine or maxillary lateral incisors.

  5. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  6. Interactive verification of Markov chains: Two distributed protocol case studies

    Directory of Open Access Journals (Sweden)

    Johannes Hölzl

    2012-12-01

    Full Text Available Probabilistic model checkers like PRISM only check probabilistic systems of a fixed size. To guarantee the desired properties for an arbitrary size, mathematical analysis is necessary. We show for two case studies how this can be done in the interactive proof assistant Isabelle/HOL. The first case study is a detailed description of how we verified properties of the ZeroConf protocol, a decentral address allocation protocol. The second case study shows the more involved verification of anonymity properties of the Crowds protocol, an anonymizing protocol.

  7. Study protocol for the Cities Changing Diabetes programme

    DEFF Research Database (Denmark)

    Napier, A David; Nolan, John J; Bagger, Malene

    2017-01-01

    and management are improving, complications remain common, and diabetes is among the leading causes of vision loss, amputation, neuropathy and renal and cardiovascular disease worldwide. We present a research protocol for exploring the drivers of type 2 diabetes and its complications in urban settings through...... the Cities Changing Diabetes (CCD) partnership programme. METHODS AND ANALYSIS: A global study protocol is implemented in eight collaborating CCD partner cities. In each city, academic institutions, municipal representatives and local stakeholders collaborate to set research priorities and plan...... Assessment explores the urban context in vulnerability to type 2 diabetes and identifies social factors and cultural determinants relevant to health, well-being and diabetes. ETHICS AND DISSEMINATION: The protocol steers the collection of primary and secondary data across the study sites. Research ethics...

  8. A Study of Shared-Memory Mutual Exclusion Protocols Using CADP

    Science.gov (United States)

    Mateescu, Radu; Serwe, Wendelin

    Mutual exclusion protocols are an essential building block of concurrent systems: indeed, such a protocol is required whenever a shared resource has to be protected against concurrent non-atomic accesses. Hence, many variants of mutual exclusion protocols exist in the shared-memory setting, such as Peterson's or Dekker's well-known protocols. Although the functional correctness of these protocols has been studied extensively, relatively little attention has been paid to their non-functional aspects, such as their performance in the long run. In this paper, we report on experiments with the performance evaluation of mutual exclusion protocols using Interactive Markov Chains. Steady-state analysis provides an additional criterion for comparing protocols, which complements the verification of their functional properties. We also carefully re-examined the functional properties, whose accurate formulation as temporal logic formulas in the action-based setting turns out to be quite involved.

  9. Identification of a research protocol to study orthodontic tooth movement

    Directory of Open Access Journals (Sweden)

    Annalisa Dichicco

    2014-06-01

    Full Text Available Aim: The orthodontic movement is associated with a process of tissue remodeling together with the release of several chemical mediators in periodontal tissues. Each mediator is a potential marker of tooth movement and expresses biological processes as: tissue inflammation and bone remodeling. Different amounts of every mediator are present in several tissues and fluids of the oral cavity. Therefore, there are different methods that allow sampling with several degrees of invasiveness. Chemical mediators are also substances of different molecular nature, and multiple kind of analysis methods allow detection. The purpose of this study was to draft the best research protocol for an optimal study on orthodontic movement efficiency. Methods: An analysis of the international literature have been made, to identify the gold standard of each aspect of the protocol: type of mediator, source and method of sampling and analysis method. Results: From the analysis of the international literature was created an original research protocol for the study and the assessment of the orthodontic movement, by using the biomarkers of the tooth movement. Conclusions: The protocol created is based on the choice of the gold standard of every aspect already analyzed in the literature and in existing protocols for the monitoring of orthodontic tooth movement through the markers of tooth movement. Clinical trials re required for the evaluation and validation of the protocol created.

  10. Study and development of a remote biometric authentication protocol

    OpenAIRE

    Bistarelli, Stefano; Claudio, Viti

    2003-01-01

    This paper reports the phases of study and implementation of a remote biometric authentication protocol developed during my internship at the I.i.t. of the C.n.r. in Pisa. Starting from the study of authentication history we had a look from the first system used since the 60ies to the latest technology; this helped us understand how we could realize a demonstration working protocol that could achieve a web remote authentication granting good reliability: to do this we choosed to modify the SS...

  11. Studying protocol-based pain management in the emergency department

    Directory of Open Access Journals (Sweden)

    Akkamahadevi Patil

    2017-01-01

    Full Text Available Background: Majority of the patients presenting to emergency department (ED have pain. ED oligoanalgesia remains a challenge. Aims: This study aims to study the effect of implementing a protocol-based pain management in the ED on (1 time to analgesia and (2 adequacy of analgesia obtained. Settings and Design: Cross-sectional study in the ED. Methods: Patients aged 18–65 years of age with pain of numeric rating scale (NRS ≥4 were included. A series of 100 patients presenting before introduction of the protocol-based pain management were grouped “pre-protocol,” and managed as per existing practice. Following this, a protocol for management of all patients presenting to ED with pain was implemented. Another series of 100 were grouped as “post-protocol” and managed as per the new pain management protocol. The data of patients from both the groups were collected and analyzed. Statistical Analysis Used: Descriptive statistical tests such as percentage, mean and standard deviation and inferential statistical tests such as Pearson coefficient, Student's t-test were applied. Differences were interpreted as significant when P < 0.05. Results: Mean time to administer analgesic was significantly lesser in the postprotocol group (preprotocol 20.30 min vs. postprotocol 13.05 min; P < 0.001. There was significant difference in the pain relief achieved (change in NRS between the two groups, with greater pain relief achieved in the postprotocol group (preprotocol group 4.6800 vs. postprotocol group 5.3600; P < 0.001. Patients' rating of pain relief (assessed on E5 scale was significantly higher in the postprotocol group (preprotocol 3.91 vs. postprotocol 4.27; P = 0.001. Patients' satisfaction (North American Spine Society scale with the overall treatment was also compared and found to be significantly higher in postprotocol group (mean: preprotocol 1.59 vs. postprotocol 1.39; P = 0.008. Conclusion: Protocol-based pain management provided timely and

  12. Study on Cloud Security Based on Trust Spanning Tree Protocol

    Science.gov (United States)

    Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing

    2015-09-01

    Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.

  13. A Comparative Study of Wireless Sensor Networks and Their Routing Protocols

    Directory of Open Access Journals (Sweden)

    Subhajit Pal

    2010-11-01

    Full Text Available Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs. Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.

  14. Fate of clinical research studies after ethical approval--follow-up of study protocols until publication.

    Directory of Open Access Journals (Sweden)

    Anette Blümle

    Full Text Available Many clinical studies are ultimately not fully published in peer-reviewed journals. Underreporting of clinical research is wasteful and can result in biased estimates of treatment effect or harm, leading to recommendations that are inappropriate or even dangerous.We assembled a cohort of clinical studies approved 2000-2002 by the Research Ethics Committee of the University of Freiburg, Germany. Published full articles were searched in electronic databases and investigators contacted. Data on study characteristics were extracted from protocols and corresponding publications. We characterized the cohort, quantified its publication outcome and compared protocols and publications for selected aspects.Of 917 approved studies, 807 were started and 110 were not, either locally or as a whole. Of the started studies, 576 (71% were completed according to protocol, 128 (16% discontinued and 42 (5% are still ongoing; for 61 (8% there was no information about their course. We identified 782 full publications corresponding to 419 of the 807 initiated studies; the publication proportion was 52% (95% CI: 0.48-0.55. Study design was not significantly associated with subsequent publication. Multicentre status, international collaboration, large sample size and commercial or non-commercial funding were positively associated with subsequent publication. Commercial funding was mentioned in 203 (48% protocols and in 205 (49% of the publications. In most published studies (339; 81% this information corresponded between protocol and publication. Most studies were published in English (367; 88%; some in German (25; 6% or both languages (27; 6%. The local investigators were listed as (co-authors in the publications corresponding to 259 (62% studies.Half of the clinical research conducted at a large German university medical centre remains unpublished; future research is built on an incomplete database. Research resources are likely wasted as neither health care

  15. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  16. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  17. Standardization of a Videofluoroscopic Swallow Study Protocol to Investigate Dysphagia in Dogs.

    Science.gov (United States)

    Harris, R A; Grobman, M E; Allen, M J; Schachtel, J; Rawson, N E; Bennett, B; Ledyayev, J; Hopewell, B; Coates, J R; Reinero, C R; Lever, T E

    2017-03-01

    Videofluoroscopic swallow study (VFSS) is the gold standard for diagnosis of dysphagia in veterinary medicine but lacks standardized protocols that emulate physiologic feeding practices. Age impacts swallow function in humans but has not been evaluated by VFSS in dogs. To develop a protocol with custom kennels designed to allow free-feeding of 3 optimized formulations of contrast media and diets that address limitations of current VFSS protocols. We hypothesized that dogs evaluated by a free-feeding VFSS protocol would show differences in objective swallow metrics based on age. Healthy juvenile, adult, and geriatric dogs (n = 24). Prospective, experimental study. Custom kennels were developed to maintain natural feeding behaviors during VFSS. Three food consistencies (thin liquid, pureed food, and dry kibble) were formulated with either iohexol or barium to maximize palatability and voluntary prehension. Dogs were evaluated by 16 swallow metrics and compared across age groups. Development of a standardized VFSS protocol resulted in successful collection of swallow data in healthy dogs. No significant differences in swallow metrics were observed among age groups. Substantial variability was observed in healthy dogs when evaluated under these physiologic conditions. Features typically attributed to pathologic states, such as gastric reflux, were seen in healthy dogs. Development of a VFSS protocol that reflects natural feeding practices may allow emulation of physiology resulting in clinical signs of dysphagia. Age did not result in significant changes in swallow metrics, but additional studies are needed, particularly in light of substantial normal variation. Copyright © 2017 The Authors. Journal of Veterinary Internal Medicine published by Wiley Periodicals, Inc. on behalf of the American College of Veterinary Internal Medicine.

  18. Development of a systematic observation protocol of physical exposure of the back: a preliminary study.

    Science.gov (United States)

    Tousignant, M; Tougas, G; Rossignol, M; Goulet, L

    2002-04-01

    At present there is no systematic observation protocol for the assessment of the multi-factorial aspects of physical exposure related to the back used within the constraints of occupational epidemiological research. In this context, a new preliminary systematic observation protocol is proposed to assess exposure to physical loading of the back using nine categories of physical risk factors: the SOPE back protocol. The objective of this study was to investigate whether the new protocol can correctly identify the level of exposure related to measured physical loading of the back. The subjects of this closed cohort study were 451 manual workers at a natural gas distribution company. The assessment of exposure was made with the protocol using groups with different job titles. The workers were followed for a 2 yr period to establish the risk of a new occurrence of complete disability related to the back (NOCD back injury) in each job grouping. Based on the median of the total scores derived from the protocol, two levels of exposure were identified (high and low). Taking into account the limitations of this study, the protocol in development may be a good tool to establish two levels of exposure to physical loading of the back in large epidemiological studies of occupational low back pain. Further research is needed to replicate these results with larger samples and to test the reliability and predictive validity of the protocol.

  19. Pregnancy outcome of “delayed start” GnRH antagonist protocol versus GnRH antagonist protocol in poor responders: A clinical trial study

    Directory of Open Access Journals (Sweden)

    Abbas Aflatoonian

    2017-08-01

    Full Text Available Background: Management of poor-responding patients is still major challenge in assisted reproductive techniques (ART. Delayed-start GnRH antagonist protocol is recommended to these patients, but little is known in this regards. Objective: The goal of this study was assessment of delayed-start GnRH antagonist protocol in poor responders, and in vitro fertilization (IVF outcomes. Materials and Methods: This randomized clinical trial included sixty infertile women with Bologna criteria for ovarian poor responders who were candidate for IVF. In case group (n=30, delayed-start GnRH antagonist protocol administered estrogen priming followed by early follicular-phase GnRH antagonist treatment for 7 days before ovarian stimulation with gonadotropin. Control group (n=30 treated with estrogen priming antagonist protocol. Finally, endometrial thickness, the rates of oocytes maturation, , embryo formation, and pregnancy were compared between two groups. Results: Rates of implantation, chemical, clinical, and ongoing pregnancy in delayed-start cycles were higher although was not statistically significant. Endometrial thickness was significantly higher in case group. There were no statistically significant differences in the rates of oocyte maturation, embryo formation, and IVF outcomes between two groups. Conclusion: There is no significant difference between delayed-start GnRH antagonist protocol versus GnRH antagonist protocol.

  20. A Performance Study of LEACH and Direct Diffusion Routing Protocols in Wireless Sensor Network

    International Nuclear Information System (INIS)

    Fakher, S.; Sharshar, K.; Moawad, M.I.; Shokair, M.

    2016-01-01

    The Wireless Sensor Network (WSN) is composed of a large number of sensor nodes with limited computation communication, and battery facilities. One of the common applications of this network is environment monitoring through sensing motion, measuring temperature, humidity and radiation. One of the basic activities in WSN is data gathering which represents a great challenge. Many routing protocols are proposed for that network to collect and aggregate the data. The most popular ones are hierarchy and data centric routing protocols. The main goal of this study is to identify the most preferable routing protocol, to be used in each mobility model. This paper studies the performance of LEACH (Low Energy Adaptive Clustering Hierarchy) from hierarchy routing protocol and direct diffusion from data centric routing protocol which is not clarified until now. Moreover, a comparison between LEACH and direct diffusion protocol using NS2 simulator will be made, and an analysis of these protocols will be conducted. The comparison includes packet delivery ratio, throughput, average energy ratio, average delay, network lifetime, and routing overhead. The performance is evaluated by varying the number of sensor nodes under three mobility models Reference Point Group Mobility Model (RPGM), Manhattan and random waypoint mobility model. Simulation results show that LEACH routing protocol has a good performance in RPGM and Manhattan than random waypoint mobility model. Direct diffusion has a good performance in random waypoint mobility model than in RPGM and Manhattan mobility model

  1. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  2. Statistical principles for prospective study protocols:

    DEFF Research Database (Denmark)

    Christensen, Robin; Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research...... to quantify relationships in data. Despite an increased focus on statistical content and complexity of biomedical research these topics remain difficult for most researchers. Statistical methods enable researchers to condense large spreadsheets with data into means, proportions, and difference between means...... the statistical principles for trial protocols in terms of design, analysis, and reporting of findings....

  3. Combined Protocol for Acute Malnutrition Study (ComPAS) in rural South Sudan and urban Kenya

    DEFF Research Database (Denmark)

    Bailey, Jeanette; Lelijveld, Natasha; Marron, Bethany

    2018-01-01

    Background: Acute malnutrition is a continuum condition, but severe and moderate forms are treated separately, with different protocols and therapeutic products, managed by separate United Nations agencies. The Combined Protocol for Acute Malnutrition Study (ComPAS) aims to simplify and unify...... the treatment of uncomplicated severe and moderate acute malnutrition (SAM and MAM) for children 6-59 months into one protocol in order to improve the global coverage, quality, continuity of care and cost-effectiveness of acute malnutrition treatment in resource-constrained settings.  Methods/design: This study...... is a multi-site, cluster randomized non-inferiority trial with 12 clusters in Kenya and 12 clusters in South Sudan. Participants are 3600 children aged 6-59 months with uncomplicated acute malnutrition. This study will evaluate the impact of a simplified and combined protocol for the treatment of SAM and MAM...

  4. Conduct of a personal radiofrequency electromagnetic field measurement study: proposed study protocol.

    Science.gov (United States)

    Röösli, Martin; Frei, Patrizia; Bolte, John; Neubauer, Georg; Cardis, Elisabeth; Feychting, Maria; Gajsek, Peter; Heinrich, Sabine; Joseph, Wout; Mann, Simon; Martens, Luc; Mohler, Evelyn; Parslow, Roger C; Poulsen, Aslak Harbo; Radon, Katja; Schüz, Joachim; Thuroczy, György; Viel, Jean-François; Vrijheid, Martine

    2010-05-20

    The development of new wireless communication technologies that emit radio frequency electromagnetic fields (RF-EMF) is ongoing, but little is known about the RF-EMF exposure distribution in the general population. Previous attempts to measure personal exposure to RF-EMF have used different measurement protocols and analysis methods making comparisons between exposure situations across different study populations very difficult. As a result, observed differences in exposure levels between study populations may not reflect real exposure differences but may be in part, or wholly due to methodological differences. The aim of this paper is to develop a study protocol for future personal RF-EMF exposure studies based on experience drawn from previous research. Using the current knowledge base, we propose procedures for the measurement of personal exposure to RF-EMF, data collection, data management and analysis, and methods for the selection and instruction of study participants. We have identified two basic types of personal RF-EMF measurement studies: population surveys and microenvironmental measurements. In the case of a population survey, the unit of observation is the individual and a randomly selected representative sample of the population is needed to obtain reliable results. For microenvironmental measurements, study participants are selected in order to represent typical behaviours in different microenvironments. These two study types require different methods and procedures. Applying our proposed common core procedures in future personal measurement studies will allow direct comparisons of personal RF-EMF exposures in different populations and study areas.

  5. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  6. A quality analysis of clinical anaesthesia study protocols from the Chinese clinical trials registry according to the SPIRIT statement.

    Science.gov (United States)

    Yang, Lei; Chen, Shouming; Yang, Di; Li, Jiajin; Wu, Taixiang; Zuo, Yunxia

    2018-05-15

    To learn about the overall quality of clinical anaesthesia study protocols from the Chinese Clinical Trials Registry and to discuss the way to improve study protocol quality. We defined completeness of each sub-item in SPIRIT as N/A (not applicable) or with a score of 0, 1, or 2. For each protocol, we calculated the proportion of adequately reported items (score = 2 and N/A) and unreported items (score = 0). Protocol quality was determined according to the proportion of reported items, with values >50% indicating high quality. Protocol quality was determined according to the proportion of reported items. For each sub-item in SPIRIT, we calculated the adequately reported rate (percentage of all protocols with score 2 and NA on one sub-item) as well as the unreported rate (percentage of all protocols with score 0 on one sub-item). Total 126 study protocols were available for assessment. Among these, 88.1% were assessed as being of low quality. By comparison, the percentage of low-quality protocols was 88.9% after the publication of the SPIRIT statement. Among the 51 SPIRIT sub-items, 18 sub-items had an unreported rate above 90% while 16 had a higher adequately reported rate than an unreported rate. The overall quality of clinical anaesthesia study protocols registered in the ChiCTR was poor. A mandatory protocol upload and self-check based on the SPIRIT statement during the trial registration process may improve protocol quality in the future.

  7. Conduct of a personal radiofrequency electromagnetic field measurement study: proposed study protocol

    Directory of Open Access Journals (Sweden)

    Radon Katja

    2010-05-01

    Full Text Available Abstract Background The development of new wireless communication technologies that emit radio frequency electromagnetic fields (RF-EMF is ongoing, but little is known about the RF-EMF exposure distribution in the general population. Previous attempts to measure personal exposure to RF-EMF have used different measurement protocols and analysis methods making comparisons between exposure situations across different study populations very difficult. As a result, observed differences in exposure levels between study populations may not reflect real exposure differences but may be in part, or wholly due to methodological differences. Methods The aim of this paper is to develop a study protocol for future personal RF-EMF exposure studies based on experience drawn from previous research. Using the current knowledge base, we propose procedures for the measurement of personal exposure to RF-EMF, data collection, data management and analysis, and methods for the selection and instruction of study participants. Results We have identified two basic types of personal RF-EMF measurement studies: population surveys and microenvironmental measurements. In the case of a population survey, the unit of observation is the individual and a randomly selected representative sample of the population is needed to obtain reliable results. For microenvironmental measurements, study participants are selected in order to represent typical behaviours in different microenvironments. These two study types require different methods and procedures. Conclusion Applying our proposed common core procedures in future personal measurement studies will allow direct comparisons of personal RF-EMF exposures in different populations and study areas.

  8. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  9. Constant round group key agreement protocols: A comparative study

    NARCIS (Netherlands)

    Makri, E.; Konstantinou, Elisavet

    2011-01-01

    The scope of this paper is to review and evaluate all constant round Group Key Agreement (GKA) protocols proposed so far in the literature. We have gathered all GKA protocols that require 1,2,3,4 and 5 rounds and examined their efficiency. In particular, we calculated each protocol’s computation and

  10. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  11. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

    Science.gov (United States)

    Rajeswari, S. Raja; Seenivasagam, V.

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272

  12. Protocol: using virus-induced gene silencing to study the arbuscular mycorrhizal symbiosis in Pisum sativum

    DEFF Research Database (Denmark)

    Grønlund, Mette; Olsen, Anne; Johansen, Elisabeth

    2010-01-01

    , the available PEBV-VIGS protocols are inadequate for studying genes involved in the symbiosis with arbuscular mycorrhizal fungi (AMF). Here we describe a PEBV-VIGS protocol suitable for reverse genetics studies in pea of genes involved in the symbiosis with AMF and show its effectiveness in silencing genes...... involved in the early and late stages of AMF symbiosis....

  13. Protocol adherence for continuously titrated interventions in randomized trials: an overview of the current methodology and case study.

    Science.gov (United States)

    Lauzier, F; Adhikari, N K; Seely, A; Koo, K K Y; Belley-Côté, E P; Burns, K E A; Cook, D J; D'Aragon, F; Rochwerg, B; Kho, M E; Oczkowksi, S J W; Duan, E H; Meade, M O; Day, A G; Lamontagne, F

    2017-07-17

    The standard definition for protocol adherence is the proportion of all scheduled doses that are delivered. In clinical research, this definition has several limitations when evaluating protocol adherence in trials that study interventions requiring continuous titration. Building upon a specific case study, we analyzed a recent trial of a continuously titrated intervention to assess the impact of different definitions of protocol deviations on the interpretation of protocol adherence. The OVATION pilot trial was an open-label randomized controlled trial of higher (75-80 mmHg) versus lower (60-65 mmHg) mean arterial pressure (MAP) targets for vasopressor therapy in shock. In this trial, potential protocol deviations were defined as MAP values outside the targeted range for >4 consecutive hours during vasopressor therapy without synchronous and consistent adjustments of vasopressor doses. An adjudication committee reviewed each potential deviation to determine if it was clinically-justified or not. There are four reasons for this contextual measurement and reporting of protocol adherence. First, between-arm separation is a robust measure of adherence to complex protocols. Second, adherence assessed by protocol deviations varies in function of the definition of deviations and the frequency of measurements. Third, distinguishing clinically-justified vs. not clinically-justified protocol deviations acknowledges clinically sensible bedside decision-making and offers a clear terminology before the trial begins. Finally, multiple metrics exist to report protocol deviations, which provides different information but complementary information on protocol adherence. In trials of interventions requiring continuous titration, metrics used for defining protocol deviations have a considerable impact on the interpretation of protocol adherence. Definitions for protocol deviations should be prespecified and correlated with between-arm separation, if it can be measured.

  14. Subgroup analyses in randomised controlled trials: cohort study on trial protocols and journal publications.

    Science.gov (United States)

    Kasenda, Benjamin; Schandelmaier, Stefan; Sun, Xin; von Elm, Erik; You, John; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Rosenthal, Rachel; Ebrahim, Shanil; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias

    2014-07-16

    To investigate the planning of subgroup analyses in protocols of randomised controlled trials and the agreement with corresponding full journal publications. Cohort of protocols of randomised controlled trial and subsequent full journal publications. Six research ethics committees in Switzerland, Germany, and Canada. 894 protocols of randomised controlled trial involving patients approved by participating research ethics committees between 2000 and 2003 and 515 subsequent full journal publications. Of 894 protocols of randomised controlled trials, 252 (28.2%) included one or more planned subgroup analyses. Of those, 17 (6.7%) provided a clear hypothesis for at least one subgroup analysis, 10 (4.0%) anticipated the direction of a subgroup effect, and 87 (34.5%) planned a statistical test for interaction. Industry sponsored trials more often planned subgroup analyses compared with investigator sponsored trials (195/551 (35.4%) v 57/343 (16.6%), P<0.001). Of 515 identified journal publications, 246 (47.8%) reported at least one subgroup analysis. In 81 (32.9%) of the 246 publications reporting subgroup analyses, authors stated that subgroup analyses were prespecified, but this was not supported by 28 (34.6%) corresponding protocols. In 86 publications, authors claimed a subgroup effect, but only 36 (41.9%) corresponding protocols reported a planned subgroup analysis. Subgroup analyses are insufficiently described in the protocols of randomised controlled trials submitted to research ethics committees, and investigators rarely specify the anticipated direction of subgroup effects. More than one third of statements in publications of randomised controlled trials about subgroup prespecification had no documentation in the corresponding protocols. Definitive judgments regarding credibility of claimed subgroup effects are not possible without access to protocols and analysis plans of randomised controlled trials. © The DISCO study group 2014.

  15. Investigation of the Study Characteristics Affecting Clinical Trial Quality Using the Protocol Deviations Leading to Exclusion of Subjects From the Per Protocol Set Data in Studies for New Drug Application: A Retrospective Analysis.

    Science.gov (United States)

    Kohara, Norihito; Kaneko, Masayuki; Narukawa, Mamoru

    2018-01-01

    The concept of the risk-based approach has been introduced as an effort to secure the quality of clinical trials. In the risk-based approach, identification and evaluation of risk in advance are considered important. For recently completed clinical trials, we investigated the relationship between study characteristics and protocol deviations leading to the exclusion of subjects from Per Protocol Set (PPS) efficacy analysis. New drugs approved in Japan in the fiscal year 2014-2015 were targeted in the research. The reasons for excluding subjects from the PPS efficacy analysis were described in 102 trials out of 492 in the summary of new drug application documents, which was publicly disclosed after the drug's regulatory approval. The author extracted these reasons along with the numbers of the cases and the study characteristics of each clinical trial. Then, the direct comparison, univariate regression analysis, and multivariate regression analysis was carried out based on the exclusion rate. The study characteristics for which exclusion of subjects from the PPS efficacy analysis were frequently observed was multiregional clinical trials in study region; inhalant and external use in administration route; Anti-infective for systemic use; Respiratory system, Dermatologicals, and Nervous system in therapeutic drug under the Anatomical Therapeutic Chemical Classification. In the multivariate regression analysis, the clinical trial variables of inhalant, Respiratory system, or Dermatologicals were selected as study characteristics leading to a higher exclusion rate. The characteristics of the clinical trial that is likely to cause protocol deviations that will affect efficacy analysis were suggested. These studies should be considered for specific attention and priority observation in the trial protocol or its monitoring plan and execution, such as a clear description of inclusion/exclusion criteria in the protocol, development of training materials to site staff, and

  16. Comparison between stress myocardial perfusion SPECT recorded with cadmium-zinc-telluride and Anger cameras in various study protocols

    International Nuclear Information System (INIS)

    Verger, Antoine; Karcher, Gilles; Djaballah, Wassila; Fourquet, Nicolas; Rouzet, Francois; Le Guludec, Dominique; Koehl, Gregoire; Roch, Veronique; Imbert, Laetitia; Poussier, Sylvain; Fay, Renaud; Marie, Pierre-Yves

    2013-01-01

    The results of stress myocardial perfusion SPECT could be enhanced by new cadmium-zinc-telluride (CZT) cameras, although differences compared to the results with conventional Anger cameras remain poorly known for most study protocols. This study was aimed at comparing the results of CZT and Anger SPECT according to various study protocols while taking into account the influence of obesity. The study population, which was from three different institutions equipped with identical CZT cameras, comprised 276 patients referred for study using protocols involving 201 Tl (n = 120) or 99m Tc-sestamibi injected at low dose at stress ( 99m Tc-Low; stress/rest 1-day protocol; n = 110) or at high dose at stress ( 99m Tc-High; rest/stress 1-day or 2-day protocol; n = 46). Each Anger SPECT scan was followed by a high-speed CZT SPECT scan (2 to 4 min). Agreement rates between CZT and Anger SPECT were good irrespective of the study protocol (for abnormal SPECT, 201 Tl 92 %, 99m Tc-Low 86 %, 99m Tc-High 98 %), although quality scores were much higher for CZT SPECT with all study protocols. Overall correlations were high for the extent of myocardial infarction (r = 0.80) and a little lower for ischaemic areas (r = 0.72), the latter being larger on Anger SPECT (p 201 Tl or 99m Tc-Low group and in whom stress myocardial counts were particularly low with Anger SPECT (228 ± 101 kcounts) and dramatically enhanced with CZT SPECT (+279 ± 251 %). Concordance between the results of CZT and Anger SPECT is good regardless of study protocol and especially when excluding obese patients who have low-count Anger SPECT and for whom myocardial counts are dramatically enhanced on CZT SPECT. (orig.)

  17. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  18. Protocol adherence for continuously titrated interventions in randomized trials: an overview of the current methodology and case study

    Directory of Open Access Journals (Sweden)

    F. Lauzier

    2017-07-01

    Full Text Available Abstract Background The standard definition for protocol adherence is the proportion of all scheduled doses that are delivered. In clinical research, this definition has several limitations when evaluating protocol adherence in trials that study interventions requiring continuous titration. Discussion Building upon a specific case study, we analyzed a recent trial of a continuously titrated intervention to assess the impact of different definitions of protocol deviations on the interpretation of protocol adherence. The OVATION pilot trial was an open-label randomized controlled trial of higher (75–80 mmHg versus lower (60–65 mmHg mean arterial pressure (MAP targets for vasopressor therapy in shock. In this trial, potential protocol deviations were defined as MAP values outside the targeted range for >4 consecutive hours during vasopressor therapy without synchronous and consistent adjustments of vasopressor doses. An adjudication committee reviewed each potential deviation to determine if it was clinically-justified or not. There are four reasons for this contextual measurement and reporting of protocol adherence. First, between-arm separation is a robust measure of adherence to complex protocols. Second, adherence assessed by protocol deviations varies in function of the definition of deviations and the frequency of measurements. Third, distinguishing clinically-justified vs. not clinically-justified protocol deviations acknowledges clinically sensible bedside decision-making and offers a clear terminology before the trial begins. Finally, multiple metrics exist to report protocol deviations, which provides different information but complementary information on protocol adherence. Conclusions In trials of interventions requiring continuous titration, metrics used for defining protocol deviations have a considerable impact on the interpretation of protocol adherence. Definitions for protocol deviations should be prespecified and correlated

  19. Stream Control Transmission Protocol as a Transport for SIP: a case study

    Directory of Open Access Journals (Sweden)

    Giuseppe De Marco

    2004-06-01

    Full Text Available The dominant signalling protocol both in future wireless and wired networks will be the Session Initiation Protocol (SIP, as pointed out in the 3G IP-based mobile networks specifications, entailing a fully Internet integrated network. The use of SIP in the IP Multimedia Subsytem (IMS of Release 5 involves the development of servers capable to handle a large number of call requests. The signaling traffic associated to such requests could explode, if an intelligent congestion control were not introduced. Stream Control Transmission Protocol (SCTP was born to support transport of SS7 signaling messages. However, many of the SCTP features are also useful for transport of SIP messages, as: congestion control mechanism, good separation among independent messages, multihoming. Indeed, adoption of SCTP as transport of SIP signaling might prove useful in some situations where usual transport protocols, like TCP and UDP, suffer performance degradation. In this paper, we analyse the general framework wherein SIP operates and we discuss the benefits of using SCTP as a transport for SIP, toward fair sharing of network resources. This study is carried on in the context of the implementation of an high-performance SIP Proxy Server. We also present some preliminar results of an implementation of SIP over SCTP/UDP in a real LAN environment.

  20. Comparison of the ultrashort gonadotropin-releasing hormone agonist-antagonist protocol with microdose flare -up protocol in poor responders: a preliminary study.

    Science.gov (United States)

    Berker, Bülent; Duvan, Candan İltemir; Kaya, Cemil; Aytaç, Ruşen; Satıroğlu, Hakan

    2010-01-01

    To determine the potential effect of the ultrashort gonadotropin-releasing hormone (GnRH) agonist/GnRH antagonist protocol versus the microdose GnRH agonist protocol in poor responders undergoing intracytoplasmic sperm injection (ICSI). The patients in the Agonist-Antagonist Group (n=41) were administered the ultrashort GnRH-agonist/ antagonist protocol, while the patients in the Microdose Group (n=41) were stimulated according to the microdose flare-up protocol. The mean number of mature oocytes retrieved was the primary outcome measure. Fertilization rate, implantation rate per embryo and clinical pregnancy rates were secondary outcome measures. There was no differenc between the mean number of mature oocytes retrieved in the two groups. There were also no statistical differences between the two groups in terms of peak serum E2 level, canceled cycles, endometrial thickness on hCG day, number of 2 pronucleus and number of embryos transferred. However, the total gonadotropin consumption and duration of stimulation were significantly higher with the Agonist-Antagonist Group compared with the Microdose Group. The implantation and clinical pregnancy rates were similar between the two groups. Despite the high dose of gonadotropin consumption and longer duration of stimulation with the ultrashort GnRH agonist/ antagonist protocol, it seems that the Agonist-Antagonist Protocol is not inferior to the microdose protocol in poor responders undergoing ICSI.

  1. Protocols to Study Growth and Metabolism in Drosophila.

    Science.gov (United States)

    Strassburger, Katrin; Teleman, Aurelio A

    2016-01-01

    Signaling pathways such as the insulin/insulin-like growth factor pathway concurrently regulate organismal growth and metabolism. Drosophila has become a popular model system for studying both organismal growth and metabolic regulation. Care must be taken, however, when assessing such phenotypes because they are quantitative in nature, and influenced by environment. This chapter first describes how to control animal age and nutrient availability, since growth and metabolism are sensitive to these parameters. It then provides protocols for measuring tissue growth, cell size, and metabolic parameters such as stored lipids and glycogen, and circulating sugars.

  2. Improving post-stroke dysphagia outcomes through a standardized and multidisciplinary protocol: an exploratory cohort study.

    Science.gov (United States)

    Gandolfi, Marialuisa; Smania, Nicola; Bisoffi, Giulia; Squaquara, Teresa; Zuccher, Paola; Mazzucco, Sara

    2014-12-01

    Stroke is a major cause of dysphagia. Few studies to date have reported on standardized multidisciplinary protocolized approaches to the management of post-stroke dysphagia. The aim of this retrospective cohort study was to evaluate the impact of a standardized multidisciplinary protocol on clinical outcomes in patients with post-stroke dysphagia. We performed retrospective chart reviews of patients with post-stroke dysphagia admitted to the neurological ward of Verona University Hospital from 2004 to 2008. Outcomes after usual treatment for dysphagia (T- group) were compared versus outcomes after treatment under a standardized diagnostic and rehabilitative multidisciplinary protocol (T+ group). Outcome measures were death, pneumonia on X-ray, need for respiratory support, and proportion of patients on tube feeding at discharge. Of the 378 patients admitted with stroke, 84 had dysphagia and were enrolled in the study. A significantly lower risk of in-hospital death (odds ratio [OR] 0.20 [0.53-0.78]), pneumonia (OR 0.33 [0.10-1.03]), need for respiratory support (OR 0.48 [0.14-1.66]), and tube feeding at discharge (OR 0.30 [0.09-0.91]) was recorded for the T+ group (N = 39) as compared to the T- group (N = 45). The adjusted OR showed no difference between the two groups for in-hospital death and tube feeding at discharge. Use of a standardized multidisciplinary protocolized approach to the management of post-stroke dysphagia may significantly reduce rates of aspiration pneumonia, in-hospital mortality, and tube feeding in dysphagic stroke survivors. Consistent with the study's exploratory purposes, our findings suggest that the multidisciplinary protocol applied in this study offers an effective model of management of post-stroke dysphagia.

  3. Comparison between stress myocardial perfusion SPECT recorded with cadmium-zinc-telluride and Anger cameras in various study protocols

    Energy Technology Data Exchange (ETDEWEB)

    Verger, Antoine; Karcher, Gilles [CHU-Nancy, Department of Nuclear Medicine, Nancy (France); INSERM U947, Nancy (France); Nancyclotep Experimental Imaging Platform, Nancy (France); Djaballah, Wassila [CHU-Nancy, Department of Nuclear Medicine, Nancy (France); INSERM U947, Nancy (France); Fourquet, Nicolas [Clinique Pasteur, Toulouse (France); Rouzet, Francois; Le Guludec, Dominique [AP-HP, Hopital Bichat, Department of Nuclear Medicine, Paris (France); INSERM U 773 Inserm and Denis Diderot University, Paris (France); Koehl, Gregoire; Roch, Veronique [CHU-Nancy, Department of Nuclear Medicine, Nancy (France); Nancyclotep Experimental Imaging Platform, Nancy (France); Imbert, Laetitia [CHU-Nancy, Department of Nuclear Medicine, Nancy (France); Nancyclotep Experimental Imaging Platform, Nancy (France); Centre Alexis Vautrin, Department of Radiotherapy, Vandoeuvre (France); Poussier, Sylvain [INSERM U947, Nancy (France); Nancyclotep Experimental Imaging Platform, Nancy (France); Fay, Renaud [INSERM, Centre d' Investigation Clinique CIC-P 9501, Nancy (France); Marie, Pierre-Yves [CHU-Nancy, Department of Nuclear Medicine, Nancy (France); Nancyclotep Experimental Imaging Platform, Nancy (France); INSERM U961, Nancy (France); Hopital de Brabois, CHU-Nancy, Medecine Nucleaire, Vandoeuvre-les-Nancy (France)

    2013-03-15

    The results of stress myocardial perfusion SPECT could be enhanced by new cadmium-zinc-telluride (CZT) cameras, although differences compared to the results with conventional Anger cameras remain poorly known for most study protocols. This study was aimed at comparing the results of CZT and Anger SPECT according to various study protocols while taking into account the influence of obesity. The study population, which was from three different institutions equipped with identical CZT cameras, comprised 276 patients referred for study using protocols involving {sup 201}Tl (n = 120) or {sup 99m}Tc-sestamibi injected at low dose at stress ({sup 99m}Tc-Low; stress/rest 1-day protocol; n = 110) or at high dose at stress ({sup 99m}Tc-High; rest/stress 1-day or 2-day protocol; n = 46). Each Anger SPECT scan was followed by a high-speed CZT SPECT scan (2 to 4 min). Agreement rates between CZT and Anger SPECT were good irrespective of the study protocol (for abnormal SPECT, {sup 201}Tl 92 %, {sup 99m}Tc-Low 86 %, {sup 99m}Tc-High 98 %), although quality scores were much higher for CZT SPECT with all study protocols. Overall correlations were high for the extent of myocardial infarction (r = 0.80) and a little lower for ischaemic areas (r = 0.72), the latter being larger on Anger SPECT (p < 0.001). This larger extent was mainly observed in 50 obese patients who were in the {sup 201}Tl or {sup 99m}Tc-Low group and in whom stress myocardial counts were particularly low with Anger SPECT (228 {+-} 101 kcounts) and dramatically enhanced with CZT SPECT (+279 {+-} 251 %). Concordance between the results of CZT and Anger SPECT is good regardless of study protocol and especially when excluding obese patients who have low-count Anger SPECT and for whom myocardial counts are dramatically enhanced on CZT SPECT. (orig.)

  4. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  5. Shortened protocol in practical [11C]SA4503-PET studies for sigma1 receptor quantification

    International Nuclear Information System (INIS)

    Sakata, Muneyuki; Kimura, Yuichi; Ishikawa, Masatomo; Oda, Keiichi; Ishii, Kenji; Ishiwata, Kiichi; Naganawa, Mika; Hashimoto, Kenji; Chihara, Kunihiro

    2008-01-01

    In practical positron emission tomography (PET) diagnosis, a shortened protocol is preferred for patients with brain disorders. In this study, the applicability of a shortened protocol as an alternative to the 90-min PET scan with [ 11 C]SA4503 for quantitative sigma 1 receptor measurement was investigated. Tissue time-activity curves of 288 regions of interest in the brain from 32 [ 11 C]SA4503-PET scans of 16 healthy subjects prior to and following administration of a selective serotonin reuptake inhibitor (fluvoxamine or paroxetine) were applied to two algorithms of quantitative analysis; binding potential (BP) was derived from compartmental analysis based on nonlinear estimation, and total distribution volume (tDV) was derived from Logan plot analysis. As a result, although both BP and tDV tended to be underestimated by the shortened method, the estimates from the shortened protocol had good linear relationships with those of the full-length protocol. In conclusion, if approximately 10% differences in the estimated results are acceptable for a specific purpose, then a 60-min measurement protocol is capable of providing reliable results. (author)

  6. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  7. Prenatal diagnosis and prevention of toxoplasmosis in pregnant women in Northern Vietnam: study protocol.

    Science.gov (United States)

    Smit, G Suzanne A; Vu, Thi Lam Binh; Do, Trung Dung; Speybroeck, Niko; Devleesschauwer, Brecht; Padalko, Elizaveta; Roets, Ellen; Dorny, Pierre

    2017-05-25

    In Vietnam, no systematic prenatal toxoplasmosis screening is in place, and only few studies have assessed the prevalence and importance of this zoonotic parasite infection. In addition, no studies have been conducted to assess the risk factors associated with toxoplasmosis. This study protocol was developed to determine the seroprevalence of toxoplasmosis in pregnant women in Hanoi and Thai Binh, Northern Vietnam, and to evaluate the association with risk factors and congenital toxoplasmosis. The protocol was developed in a way that it could potentially evolve into a countrywide prenatal diagnosis and prevention program, with the main focus on primary prevention. The collaborating gynaecologists will invite eligible pregnant women attending antenatal care for the first time to participate in the study. At first consult, information about toxoplasmosis and its prevention will be provided. All participants will be asked to fill in a questionnaire, which is designed to analyse socio-demographic and biologically plausible risk factors associated with toxoplasmosis, and blood samples will be collected to determine the seroprevalence of toxoplasmosis in pregnant women. In case there is suspicion of a primary infection during pregnancy, the concerned women will be followed-up by the gynaecologists according to a predefined protocol. Every participant will be informed on her serological status, risk factors and prevention measures and is offered appropriate medical information and medical follow-up if required. The hypothesis is that congenital toxoplasmosis is an important but currently under-diagnosed public health problem in Vietnam. This study can strengthen sustainable control of toxoplasmosis in Vietnam, provide a protocol for prenatal diagnosis, boost overall awareness, improve the knowledge about toxoplasmosis prevention and can be essential for evidence-based health policy.

  8. Regional gastrointestinal transit and pH studied in 215 healthy volunteers using the wireless motility capsule: influence of age, gender, study country and testing protocol.

    Science.gov (United States)

    Wang, Y T; Mohammed, S D; Farmer, A D; Wang, D; Zarate, N; Hobson, A R; Hellström, P M; Semler, J R; Kuo, B; Rao, S S; Hasler, W L; Camilleri, M; Scott, S M

    2015-09-01

    The wireless motility capsule (WMC) offers the ability to investigate luminal gastrointestinal (GI) physiology in a minimally invasive manner. To investigate the effect of testing protocol, gender, age and study country on regional GI transit times and associated pH values using the WMC. Regional GI transit times and pH values were determined in 215 healthy volunteers from USA and Sweden studied using the WMC over a 6.5-year period. The effects of test protocol, gender, age and study country were examined. For GI transit times, testing protocol was associated with differences in gastric emptying time (GET; shorter with protocol 2 (motility capsule ingested immediately after meal) vs. protocol 1 (motility capsule immediately before): median difference: 52 min, P = 0.0063) and colonic transit time (CTT; longer with protocol 2: median 140 min, P = 0.0189), but had no overall effect on whole gut transit time. Females had longer GET (by median 17 min, P = 0.0307), and also longer CTT by (104 min, P = 0.0285) and whole gut transit time by (263 min, P = 0.0077). Increasing age was associated with shorter small bowel transit time (P = 0.002), and study country also influenced small bowel and CTTs. Whole gut and CTTs showed clustering of data at values separated by 24 h, suggesting that describing these measures as continuous variables is invalid. Testing protocol, gender and study country also significantly influenced pH values. Regional GI transit times and pH values, delineated using the wireless motility capsule (WMC), vary based on testing protocol, gender, age and country. Standardisation of testing is crucial for cross-referencing in clinical practice and future research. © 2015 John Wiley & Sons Ltd.

  9. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  10. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  11. Factors influencing ambulance nurses' adherence to a national protocol ambulance care: an implementation study in the Netherlands

    NARCIS (Netherlands)

    Ebben, R.H.; Vloet, L.C.M.; Grunsven, P.M. van; Breeman, W.; Goosselink, B.; Lichtveld, R.A.; Groot, J. de; Achterberg, T. van

    2015-01-01

    OBJECTIVES: Adherence to prehospital guidelines and protocols is suboptimal. Insight into influencing factors is necessary to improve adherence. The aim of this study was to identify factors that influence ambulance nurses' adherence to a National Protocol Ambulance Care (NPAC). METHODS: A

  12. The Comparative Study Some of Reactive and Proactive Routing Protocols in The Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Anas Ali Hussien

    2018-02-01

    Full Text Available The wireless sensor network (WSN consists mostly of a large number of nodes in a large area where not all nodes are directly connected. The applications of comprise a wide variety of scenarios.The mobile nodes are free to move because this network has selfــstructured topology. Routing protocols are responsible for detecting and maintaining paths in the network, and it classified into reactive (OnـــDemand, proactive (Table driven, and hybrid. In this paper represents a performance study of some WSN routing protocols: the Dynamic Source Routing (DSR, Ad hoc On-Demand Distance Vector (AODV, and Destination-Sequenced Distance-Vector (DSDV. The comparison made according to important metrics like packet delivery ratio (PDR, total packets dropped, Average end-to-end delay (Avg EED, and normalized routing load under the Transmission Control Protocol (TCP and User Datagram Protocol (UDP traffic connection and with varying number of nodes, pause time; and  varying speed. In this work used (NSــ2.35 that installed on (Ubuntu 14.04 operating system to implementing the scenario. Conclude that the DSR has better performance in TCP connection; while the DSDV has better performance in UDP protocol.

  13. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  14. Study protocol for the Cities Changing Diabetes programme: a global mixed-methods approach.

    Science.gov (United States)

    Napier, A David; Nolan, John J; Bagger, Malene; Hesseldal, Louise; Volkmann, Anna-Maria

    2017-11-08

    Urban living has been shown to affect health in various ways. As the world is becoming more urbanised and almost two-thirds of people with diabetes now live in cities, research into the relationship between urban living, health and diabetes is key to improving the lives of many. The majority of people with diabetes have type 2 diabetes, a subset linked to overweight and obesity, decreased physical activity and unhealthy diets. Diabetes has significant consequences for those living with the condition as well as their families, relationships and wider society. Although care and management are improving, complications remain common, and diabetes is among the leading causes of vision loss, amputation, neuropathy and renal and cardiovascular disease worldwide. We present a research protocol for exploring the drivers of type 2 diabetes and its complications in urban settings through the Cities Changing Diabetes (CCD) partnership programme. A global study protocol is implemented in eight collaborating CCD partner cities. In each city, academic institutions, municipal representatives and local stakeholders collaborate to set research priorities and plan implementation of findings. Local academic teams execute the study following the global study protocol presented here. A quantitative Rule of Halves analysis obtains measures of the magnitude of the diabetes burden, the diagnosis rates in each city and the outcomes of care. A qualitative Diabetes Vulnerability Assessment explores the urban context in vulnerability to type 2 diabetes and identifies social factors and cultural determinants relevant to health, well-being and diabetes. The protocol steers the collection of primary and secondary data across the study sites. Research ethics board approval has been sought and obtained in each site. Findings from each of the local studies as well as the result from combined multisite (global) analyses will be reported in a series of core scientific journal papers. © Article author

  15. Treatment influencing down-staging in EORTC Melanoma Group sentinel node histological protocol compared with complete step-sectioning: a national multicentre study.

    Science.gov (United States)

    Riber-Hansen, Rikke; Hastrup, Nina; Clemmensen, Ole; Behrendt, Nille; Klausen, Siri; Ramsing, Mette; Spaun, Eva; Hamilton-Dutoit, Stephen Jacques; Steiniche, Torben

    2012-02-01

    Metastasis size in melanoma sentinel lymph nodes (SLNs) is an emerging prognostic factor. Two European melanoma treatment trials include SLN metastasis diameters as inclusion criteria. Whilst diameter estimates are sensitive to the number of sections examined, the level of this bias is largely unknown. We performed a prospective multicentre study to compare the European Organisation for Research and Treatment of Cancer (EORTC) recommended protocol with a protocol of complete step-sectioning. One hundred and thirty-three consecutive SLNs from seven SLN centres were analysed by five central sections 50μm apart (EORTC Protocol) followed by complete 250μm step-sectioning. Overall, 29 patients (21.8%) were SLN-positive. The EORTC Protocol missed eight of these metastases (28%), one metastasis measuring less than 0.1mm in diameter, seven measuring between 0.1 and 1mm. Complete step-sectioning at 250μm intervals (Extensive Protocol) missed one metastasis (3%) that measured less than 0.1mm. Thirteen treatment courses (34%) performed if inclusion was based on the Combined Protocol would not be performed if assessed by the EORTC Protocol. Thus, 10 patients would be without completion lymph node dissection (EORTC MINITUB study), whilst three patients would not be eligible for anti-CTLA4 trial (EORTC protocol 18071). The corresponding number with the Extensive Protocol would be three; one patient for the MINITUB registration study and two patients for the anti-CTLA4 study. Examining SLNs by close central sectioning alone (EORTC Protocol) misses a substantial number of metastases and underestimates the maximum metastasis diameter, leading to important changes in patient eligibility for various treatment protocols. Copyright © 2011 Elsevier Ltd. All rights reserved.

  16. Supporting Tablet Configuration, Tracking, and Infection Control Practices in Digital Health Interventions: Study Protocol.

    Science.gov (United States)

    Furberg, Robert D; Ortiz, Alexa M; Zulkiewicz, Brittany A; Hudson, Jordan P; Taylor, Olivia M; Lewis, Megan A

    2016-06-27

    Tablet-based health care interventions have the potential to encourage patient care in a timelier manner, allow physicians convenient access to patient records, and provide an improved method for patient education. However, along with the continued adoption of tablet technologies, there is a concomitant need to develop protocols focusing on the configuration, management, and maintenance of these devices within the health care setting to support the conduct of clinical research. Develop three protocols to support tablet configuration, tablet management, and tablet maintenance. The Configurator software, Tile technology, and current infection control recommendations were employed to develop three distinct protocols for tablet-based digital health interventions. Configurator is a mobile device management software specifically for iPhone operating system (iOS) devices. The capabilities and current applications of Configurator were reviewed and used to develop the protocol to support device configuration. Tile is a tracking tag associated with a free mobile app available for iOS and Android devices. The features associated with Tile were evaluated and used to develop the Tile protocol to support tablet management. Furthermore, current recommendations on preventing health care-related infections were reviewed to develop the infection control protocol to support tablet maintenance. This article provides three protocols: the Configurator protocol, the Tile protocol, and the infection control protocol. These protocols can help to ensure consistent implementation of tablet-based interventions, enhance fidelity when employing tablets for research purposes, and serve as a guide for tablet deployments within clinical settings.

  17. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  18. Prayer Healing: A Case Study Research Protocol.

    Science.gov (United States)

    Kruijthoff, Dirk J; van der Kooi, Cornelis; Glas, Gerrit; Abma, Tineke A

    2017-01-01

    Context • Prayer healing is a common practice in many religious communities around the world. Even in the highly secularized Dutch society, cases of prayer healing are occasionally reported in the media, often generating public attention. There is an ongoing debate regarding whether such miraculous cures do actually occur and how to interpret them. Objective • The aim of the article was to present a research protocol for the investigation of reported cases of remarkable and/or unexplained healing after prayer. Design • The research team developed a method to perform a retrospective, case-based study of prayer healing. Reported prayer healings can be investigated systematically in accordance with a step-by-step methodology. The focus is on understanding the healing by studying it from multiple perspectives, using both medical judgment and patients' narratives collected by qualitative methods Setting • The study occurred at Vrije Universiteit (VU) and VU Medical Center (Amsterdam, Netherlands) as well as the general medical practice of the first author. Participants • Potential participants could be any individuals in the Netherlands or neighboring countries who claim to have been healed through prayer. The reports of healing came from multiple sources, including the research team's medical practices and their direct vicinities, newspaper articles, prayer healers, and medical colleagues. Outcome Measures • Medical data were obtained before and after prayer. Subsequently, a member of a research team and of a medical assessment committee made a standardized judgment that evaluated whether a cure was clinically remarkable or scientifically unexplained. The participants' experiences and insider perspectives were studied, using in-depth interviews in accordance with a qualitative research methodology, to gain insight into the perceptions and explanations of the cures that were offered by participants and by the members of the medical assessment committee. The

  19. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication......’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture...

  20. A novel protocol for dispatcher assisted CPR improves CPR quality and motivation among rescuers-A randomized controlled simulation study.

    Science.gov (United States)

    Rasmussen, Stinne Eika; Nebsbjerg, Mette Amalie; Krogh, Lise Qvirin; Bjørnshave, Katrine; Krogh, Kristian; Povlsen, Jonas Agerlund; Riddervold, Ingunn Skogstad; Grøfte, Thorbjørn; Kirkegaard, Hans; Løfgren, Bo

    2017-01-01

    Emergency dispatchers use protocols to instruct bystanders in cardiopulmonary resuscitation (CPR). Studies changing one element in the dispatcher's protocol report improved CPR quality. Whether several changes interact is unknown and the effect of combining multiple changes previously reported to improve CPR quality into one protocol remains to be investigated. We hypothesize that a novel dispatch protocol, combining multiple beneficial elements improves CPR quality compared with a standard protocol. A novel dispatch protocol was designed including wording on chest compressions, using a metronome, regular encouragements and a 10-s rest each minute. In a simulated cardiac arrest scenario, laypersons were randomized to perform single-rescuer CPR guided with the novel or the standard protocol. a composite endpoint of time to first compression, hand position, compression depth and rate and hands-off time (maximum score: 22 points). Afterwards participants answered a questionnaire evaluating the dispatcher assistance. The novel protocol (n=61) improved CPR quality score compared with the standard protocol (n=64) (mean (SD): 18.6 (1.4)) points vs. 17.5 (1.7) points, pCPR. A novel bundle of care protocol improved CPR quality score and motivation among rescuers. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  1. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  2. EVA Human Health and Performance Benchmarking Study Overview and Development of a Microgravity Protocol

    Science.gov (United States)

    Norcross, Jason; Jarvis, Sarah; Bekdash, Omar; Cupples, Scott; Abercromby, Andrew

    2017-01-01

    The primary objective of this study is to develop a protocol to reliably characterize human health and performance metrics for individuals working inside various EVA suits under realistic spaceflight conditions. Expected results and methodologies developed during this study will provide the baseline benchmarking data and protocols with which future EVA suits and suit configurations (e.g., varied pressure, mass, center of gravity [CG]) and different test subject populations (e.g., deconditioned crewmembers) may be reliably assessed and compared. Results may also be used, in conjunction with subsequent testing, to inform fitness-for-duty standards, as well as design requirements and operations concepts for future EVA suits and other exploration systems.

  3. [Colombia 2015 National Mental Health Survey. Study Protocol].

    Science.gov (United States)

    Gómez-Restrepo, Carlos; de Santacruz, Cecilia; Rodriguez, María Nelcy; Rodriguez, Viviana; Tamayo Martínez, Nathalie; Matallana, Diana; Gonzalez, Lina M

    2016-12-01

    The 2015 National Mental Health Survey (NMHS) is the fourth mental survey conducted in Colombia, and is part of the National System of Surveys and Population Studies for health. A narrative description is used to explain the background, references, the preparation, and characteristics of the 2015 NMHS. The 2015 NMHS and its protocol emerge from the requirements that support the national and international policies related to mental health. Together with the Ministry of Health and Social Protection, the objectives, the collection tools, the sample, and the operational plan are defined. The main objective was to obtain updated information about the mental health, mental problems and disorders, accessibility to health services, and an evaluation of health conditions. Participants were inhabitants from both urban and rural areas, over 7 years old, and in whom the comprehension of social determinants and equity were privileged. An observational cross-sectional design with national, regional and age group representativity, was used. The age groups selected were 7-11, 12-17, and over 18 years old. The regions considered were Central, Orient, Atlantic, Pacific, and Bogota. The calculated sample had a minimum of 12,080 and a maximum of 14,496 participants. A brief summary of the protocol of the 2015 NMHS is presented. The full document with all the collection tools can be consulted on the Health Ministry webpage. Copyright © 2016. Publicado por Elsevier España.

  4. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  5. A Study on IP Network Recovery through Routing Protocols

    Directory of Open Access Journals (Sweden)

    K. Karthik

    2016-09-01

    Full Text Available Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.

  6. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  7. Risk of bias and confounding of observational studies of Zika virus infection: A scoping review of research protocols.

    Science.gov (United States)

    Reveiz, Ludovic; Haby, Michelle M; Martínez-Vega, Ruth; Pinzón-Flores, Carlos E; Elias, Vanessa; Smith, Emma; Pinart, Mariona; Broutet, Nathalie; Becerra-Posada, Francisco; Aldighieri, Sylvain; Van Kerkhove, Maria D

    2017-01-01

    Given the severity and impact of the current Zika virus (ZIKV) outbreak in the Americas, numerous countries have rushed to develop research studies to assess ZIKV and its potential health consequences. In an effort to ensure that studies are comprehensive, both internally and externally valid, and with reliable results, the World Health Organization, the Pan American Health Organization, Institut Pasteur, the networks of Fiocruz, the Consortia for the Standardization of Influenza Seroepidemiology (CONSISE) and the International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC) have generated six standardized clinical and epidemiological research protocols and questionnaires to address key public health questions on ZIKV. We conducted a systematic search of ongoing study protocols related to ZIKV research. We analyzed the content of protocols of 32 cohort studies and 13 case control studies for systematic bias that could produce erroneous results. Additionally we aimed to characterize the risks of bias and confounding in observational studies related to ZIKV and to propose ways to minimize them, including the use of six newly standardized research protocols. Observational studies of ZIKV face an array of challenges, including measurement of exposure and outcomes (microcephaly and Guillain-Barré Syndrome). Potential confounders need to be measured where known and controlled for in the analysis. Selection bias due to non-random selection is a significant issue, particularly in the case-control design, and losses to follow-up is equally important for the cohort design. Observational research seeking to answer key questions on the ZIKV should consider these restrictions and take precautions to minimize bias in an effort to provide reliable and valid results. Utilization of the standardized research protocols developed by the WHO, PAHO, Institut Pasteur, and CONSISE will harmonize the key methodological aspects of each study design to minimize bias at

  8. Risk of bias and confounding of observational studies of Zika virus infection: A scoping review of research protocols.

    Directory of Open Access Journals (Sweden)

    Ludovic Reveiz

    Full Text Available Given the severity and impact of the current Zika virus (ZIKV outbreak in the Americas, numerous countries have rushed to develop research studies to assess ZIKV and its potential health consequences. In an effort to ensure that studies are comprehensive, both internally and externally valid, and with reliable results, the World Health Organization, the Pan American Health Organization, Institut Pasteur, the networks of Fiocruz, the Consortia for the Standardization of Influenza Seroepidemiology (CONSISE and the International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC have generated six standardized clinical and epidemiological research protocols and questionnaires to address key public health questions on ZIKV.We conducted a systematic search of ongoing study protocols related to ZIKV research. We analyzed the content of protocols of 32 cohort studies and 13 case control studies for systematic bias that could produce erroneous results. Additionally we aimed to characterize the risks of bias and confounding in observational studies related to ZIKV and to propose ways to minimize them, including the use of six newly standardized research protocols.Observational studies of ZIKV face an array of challenges, including measurement of exposure and outcomes (microcephaly and Guillain-Barré Syndrome. Potential confounders need to be measured where known and controlled for in the analysis. Selection bias due to non-random selection is a significant issue, particularly in the case-control design, and losses to follow-up is equally important for the cohort design.Observational research seeking to answer key questions on the ZIKV should consider these restrictions and take precautions to minimize bias in an effort to provide reliable and valid results. Utilization of the standardized research protocols developed by the WHO, PAHO, Institut Pasteur, and CONSISE will harmonize the key methodological aspects of each study design to

  9. Systematic Review Protocol to Assess the Effectiveness of Usability Questionnaires in mHealth App Studies.

    Science.gov (United States)

    Zhou, Leming; Bao, Jie; Parmanto, Bambang

    2017-08-01

    Usability questionnaires have a wide use in mobile health (mHealth) app usability studies. However, no systematic review has been conducted for assessing the effectiveness of these questionnaires. This paper describes a protocol for conducting a systematic review of published questionnaire-based mHealth app usability studies. In this systematic review, we will select recently published (2008-2017) articles from peer-reviewed journals and conferences that describe mHealth app usability studies and implement at least one usability questionnaire. The search strategy will include terms such as "mobile app" and "usability." Multiple databases such as PubMed, CINAHL, IEEE Xplore, ACM Digital Library, and INSPEC will be searched. There will be 2 independent reviewers in charge of screening titles and abstracts as well as determining those articles that should be included for a full-text review. The third reviewer will act as a mediator between the other 2 reviewers. Moreover, a data extraction form will be created and used during the full article data analysis. Notably, the Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols (PRISMA-P) guidelines will be followed in reporting this protocol. A preliminary search produced 1271 articles, 40 of which are duplicate records. The inclusion-exclusion criteria are being strictly followed in performing the ongoing study selection. Usability questionnaires are an important tool in mHealth app usability studies. This review will summarize the usability questionnaires used in published research articles while assessing the efficacy of these questionnaires in determining the usability of mHealth apps. ©Leming Zhou, Jie Bao, Bambang Parmanto. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 01.08.2017.

  10. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  11. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  12. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  13. Split bolus technique in polytrauma: a prospective study on scan protocols for trauma analysis

    NARCIS (Netherlands)

    Beenen, Ludo F. M.; Sierink, Joanne C.; Kolkman, Saskia; Nio, C. Yung; Saltzherr, Teun Peter; Dijkgraaf, Marcel G. W.; Goslings, J. Carel

    2015-01-01

    For the evaluation of severely injured trauma patients a variety of total body computed tomography (CT) scanning protocols exist. Frequently multiple pass protocols are used. A split bolus contrast protocol can reduce the number of passes through the body, and thereby radiation exposure, in this

  14. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  15. Why standard brain-computer interface (BCI) training protocols should be changed: an experimental study

    Science.gov (United States)

    Jeunet, Camille; Jahanpour, Emilie; Lotte, Fabien

    2016-06-01

    Objective. While promising, electroencephaloraphy based brain-computer interfaces (BCIs) are barely used due to their lack of reliability: 15% to 30% of users are unable to control a BCI. Standard training protocols may be partly responsible as they do not satisfy recommendations from psychology. Our main objective was to determine in practice to what extent standard training protocols impact users’ motor imagery based BCI (MI-BCI) control performance. Approach. We performed two experiments. The first consisted in evaluating the efficiency of a standard BCI training protocol for the acquisition of non-BCI related skills in a BCI-free context, which enabled us to rule out the possible impact of BCIs on the training outcome. Thus, participants (N = 54) were asked to perform simple motor tasks. The second experiment was aimed at measuring the correlations between motor tasks and MI-BCI performance. The ten best and ten worst performers of the first study were recruited for an MI-BCI experiment during which they had to learn to perform two MI tasks. We also assessed users’ spatial ability and pre-training μ rhythm amplitude, as both have been related to MI-BCI performance in the literature. Main results. Around 17% of the participants were unable to learn to perform the motor tasks, which is close to the BCI illiteracy rate. This suggests that standard training protocols are suboptimal for skill teaching. No correlation was found between motor tasks and MI-BCI performance. However, spatial ability played an important role in MI-BCI performance. In addition, once the spatial ability covariable had been controlled for, using an ANCOVA, it appeared that participants who faced difficulty during the first experiment improved during the second while the others did not. Significance. These studies suggest that (1) standard MI-BCI training protocols are suboptimal for skill teaching, (2) spatial ability is confirmed as impacting on MI-BCI performance, and (3) when faced

  16. An Outcomes Study on the Effects of the Singapore General Hospital Burns Protocol.

    Science.gov (United States)

    Liang, Weihao; Kok, Yee Onn; Tan, Bien Keem; Chong, Si Jack

    2018-01-01

    The Singapore General Hospital Burns Protocol was implemented in May 2014 to standardize treatment for all burns patients, incorporate new techniques and materials, and streamline the processes and workflow of burns management. This study aims to analyze the effects of the Burns Protocol 2 years after its implementation. Using a REDCap electronic database, all burns patients admitted from May 2013 to April 2016 were included in the study. The historical preimplementation control group composed of patients admitted from May 2013 to April 2014 (n = 96). The postimplementation prospective study cohort consisted of patients admitted from May 2014 to April 2016 (n = 243). Details of the patients collected included age, sex, comorbidities, total body surface area (TBSA) burns, time until surgery, number of surgeries, number of positive tissue and blood cultures, and length of hospital stay. There was no statistically significant difference in the demographics of both groups. The study group had a statistically significant shorter time to surgery compared with the control group (20.8 vs 38.1, P burns, was statistically significant (number of surgeries/TBSA, 0.324 vs 0.506; P = 0.0499). The study group also had significantly shorter length of stay (12.5 vs 16.8, P = 0.0273), a shorter length of stay/TBSA burns (0.874 vs 1.342, P = 0.0101), and fewer positive tissue cultures (0.6 vs 1.3, P = 0.0003). The study group also trended toward fewer positive blood culture results (0.09 vs 0.35, P = 0.0593), although the difference was just shy of statistical significance. The new Singapore General Hospital Burns Protocol had revolutionized Singapore burns care by introducing a streamlined, multidisciplinary burns management, resulting in improved patient outcomes, lowered health care costs, and improved system resource use.

  17. Biomass to energy : GHG reduction quantification protocols and case study

    Energy Technology Data Exchange (ETDEWEB)

    Reusing, G.; Taylor, C. [Conestoga - Rovers and Associates, Waterloo, ON (Canada); Nolan, W. [Liberty Energy, Hamilton, ON (Canada); Kerr, G. [Index Energy, Ajax, ON (Canada)

    2009-07-01

    With the growing concerns over greenhouses gases and their contribution to climate change, it is necessary to find ways of reducing environmental impacts by diversifying energy sources to include non-fossil fuel energy sources. Among the fastest growing green energy sources is energy from waste facilities that use biomass that would otherwise be landfilled or stockpiled. The quantification of greenhouse gas reductions through the use of biomass to energy systems can be calculated using various protocols and methodologies. This paper described each of these methodologies and presented a case study comparing some of these quantification methodologies. A summary and comparison of biomass to energy greenhouse gas reduction protocols in use or under development by the United Nations, the European Union, the Province of Alberta and Environment Canada was presented. It was concluded that regulatory, environmental pressures, and public policy will continue to impact the practices associated with biomass processing or landfill operations, such as composting, or in the case of landfills, gas collection systems, thus reducing the amount of potential credit available for biomass to energy facility offset projects. 10 refs., 2 tabs., 6 figs.

  18. Biomass to energy : GHG reduction quantification protocols and case study

    International Nuclear Information System (INIS)

    Reusing, G.; Taylor, C.; Nolan, W.; Kerr, G.

    2009-01-01

    With the growing concerns over greenhouses gases and their contribution to climate change, it is necessary to find ways of reducing environmental impacts by diversifying energy sources to include non-fossil fuel energy sources. Among the fastest growing green energy sources is energy from waste facilities that use biomass that would otherwise be landfilled or stockpiled. The quantification of greenhouse gas reductions through the use of biomass to energy systems can be calculated using various protocols and methodologies. This paper described each of these methodologies and presented a case study comparing some of these quantification methodologies. A summary and comparison of biomass to energy greenhouse gas reduction protocols in use or under development by the United Nations, the European Union, the Province of Alberta and Environment Canada was presented. It was concluded that regulatory, environmental pressures, and public policy will continue to impact the practices associated with biomass processing or landfill operations, such as composting, or in the case of landfills, gas collection systems, thus reducing the amount of potential credit available for biomass to energy facility offset projects. 10 refs., 2 tabs., 6 figs

  19. Atlas-based analysis of cardiac shape and function: correction of regional shape bias due to imaging protocol for population studies.

    Science.gov (United States)

    Medrano-Gracia, Pau; Cowan, Brett R; Bluemke, David A; Finn, J Paul; Kadish, Alan H; Lee, Daniel C; Lima, Joao A C; Suinesiaputra, Avan; Young, Alistair A

    2013-09-13

    Cardiovascular imaging studies generate a wealth of data which is typically used only for individual study endpoints. By pooling data from multiple sources, quantitative comparisons can be made of regional wall motion abnormalities between different cohorts, enabling reuse of valuable data. Atlas-based analysis provides precise quantification of shape and motion differences between disease groups and normal subjects. However, subtle shape differences may arise due to differences in imaging protocol between studies. A mathematical model describing regional wall motion and shape was used to establish a coordinate system registered to the cardiac anatomy. The atlas was applied to data contributed to the Cardiac Atlas Project from two independent studies which used different imaging protocols: steady state free precession (SSFP) and gradient recalled echo (GRE) cardiovascular magnetic resonance (CMR). Shape bias due to imaging protocol was corrected using an atlas-based transformation which was generated from a set of 46 volunteers who were imaged with both protocols. Shape bias between GRE and SSFP was regionally variable, and was effectively removed using the atlas-based transformation. Global mass and volume bias was also corrected by this method. Regional shape differences between cohorts were more statistically significant after removing regional artifacts due to imaging protocol bias. Bias arising from imaging protocol can be both global and regional in nature, and is effectively corrected using an atlas-based transformation, enabling direct comparison of regional wall motion abnormalities between cohorts acquired in separate studies.

  20. The Study of MSADQ/CDMA Protocol in Voice/Data Integration Packet Networks

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A new packet medium access protocol, namely, minislot signalingaccess based on distributed queues(MSADQ/CDMA), is proposed in voice and data intergration CDMA networks. The MSADQ protocol is based on distributed queues and collision resolution algorithm. Through proper management of the PN codes, the number of random competition collision reduces greatly, the multiple access interference (MAI) decreases. It has several special access signaling channels to carry the voice and data access request. Each slot is devided into several control minislots (CMSs), in which the Data Terminals (DT) or Voice Terminals (VT) transmit their request. According to the voice and data traffic character, the signaling access structure is proposed. The code assign rules and queue managing rules are also proposed to ensure the QoS requirement of each traffic. Comparisions with other three protocol are developed by simulation, which shows that MSADQ/CDMA protocol occupies less PN codes, but still has very good performance.

  1. Security of the arbitrated quantum signature protocols revisited

    International Nuclear Information System (INIS)

    Kejia, Zhang; Dan, Li; Qi, Su

    2014-01-01

    Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided. (paper)

  2. Histomorphometric assessment of bone necrosis produced by two cryosurgery protocols using liquid nitrogen: an experimental study on rat femurs.

    Science.gov (United States)

    Costa, Fábio Wildson Gurgel; Brito, Gerly Anne de Castro; Pessoa, Rosana Maria Andrade; Studart-Soares, Eduardo Costa

    2011-01-01

    The aim of this study was to evaluate the effects of liquid nitrogen cryosurgery on the femoral diaphysis of rats. The femoral diaphyses of 42 Wistar rats were exposed to three local and sequential applications of liquid nitrogen for 1 or 2 min, intercalated with periods of 5 min of passive thawing. The animals were sacrificed after 1, 2, 4 and 12 weeks and the specimens obtained were processed and analyzed histomorphometrically. The depth and extent of peak bone necrosis were 124.509 µm and 2087.094 µm for the 1-min protocol, respectively, and 436.424 µm and 12046.426 µm for the 2-min protocol. Peak necrosis was observed in the second experimental week with both cryotherapy protocols. The present results indicate that the 2-min protocol produced more marked bone necrosis than the 1-min protocol. Although our results cannot be entirely extrapolated to clinical practice, they contribute to the understanding of the behavior of bone tissue submitted to different cycles of liquid nitrogen freezing and may serve as a basis for new studies.

  3. The Sports-Related Injuries and Illnesses in Paralympic Sport Study (SRIIPSS): a study protocol for a prospective longitudinal study.

    Science.gov (United States)

    Fagher, Kristina; Jacobsson, Jenny; Timpka, Toomas; Dahlström, Örjan; Lexell, Jan

    2016-01-01

    Paralympic sport provides sporting opportunities for athletes with a disability, with the Paralympic Games as the main event. Participation in sport is, however, associated with a significant risk for sustaining injuries and illnesses. Our knowledge of sports-related injuries and illnesses in Paralympic sport is very limited and there are no large-scale epidemiological cohort studies. The purpose here is to present a protocol for a prospective longitudinal study: The Sports-Related Injuries and Illnesses in Paralympic Sport Study (SRIIPSS). An argument-based method for investigation of design problems was used to structure the study protocol. The primary requirement of the protocol is to allow prospective studies over time and include exposure to both training and competition. To reflect the complexity of Paralympic sport with athletes' pre-existing impairments, use of assistive equipment, pain and other and medical issues, it is required that the data collection system is specifically adapted to Paralympic sport. To allow the collection of data, at the same time as there is limited access to coaches and medical personnel, it is advantageous that data can be collected online directly from the athletes. Based on this a self-report athlete monitoring system will be developed, where the athletes can enter data weekly via their mobile phones or lap-tops. Data will be collected from around 100 Swedish Paralympic athletes for approximately 1 year, which will allow us to i) prospectively estimate the annual incidence of sports-related injuries and illnesses and ii) explore risk factors and mechanisms for sustaining sports-related injuries and illnesses based on athlete exposure and training loads. For effective implementation of injury and illness prevention measures, comprehensive epidemiological knowledge is required. This study will be the first prospective longitudinal self-report study of sports-related injuries and illnesses in Paralympic sport over a longer period

  4. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  5. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  6. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  7. Effectiveness of a transdiagnostic internet-based protocol for the treatment of emotional disorders versus treatment as usual in specialized care: study protocol for a randomized controlled trial.

    Science.gov (United States)

    González-Robles, Alberto; García-Palacios, Azucena; Baños, Rosa; Riera, Antonio; Llorca, Ginés; Traver, Francisco; Haro, Gonzalo; Palop, Vicente; Lera, Guillem; Romeu, José Enrique; Botella, Cristina

    2015-10-31

    Emotional disorders (depression and anxiety disorders) are highly prevalent mental health problems. Although evidence showing the effectiveness of disorder-specific treatments exists, high comorbidity rates among emotional disorders limit the utility of these protocols. This has led some researchers to focus their interest on transdiagnostic interventions, a treatment perspective that might be more widely effective across these disorders. Also, the current way of delivering treatments makes it difficult provide assistance to all of the population in need. The use of the Internet in the delivery of evidence-based treatments may help to disseminate treatments among the population. In this study, we aim to test the effectiveness of EmotionRegulation, a new transdiagnostic Internet-based protocol for unipolar mood disorders, five anxiety disorders (panic disorder, agoraphobia, social anxiety disorder, generalized anxiety disorder and anxiety disorder not otherwise specified), and obsessive-compulsive disorder in comparison to treatment as usual as provided in Spanish public specialized mental health care. We will also study its potential impact on basic temperament dimensions (neuroticism/behavioral inhibition and extraversion/behavioral activation). Expectations and opinions of patients about this protocol will also be studied. The study is a randomized controlled trial. 200 participants recruited in specialized care will be allocated to one of two treatment conditions: a) EmotionRegulation or b) treatment as usual. Primary outcome measures will be the BAI and the BDI-II. Secondary outcomes will include a specific measure of the principal disorder, and measures of neuroticism/behavioral inhibition and extraversion/behavioral activation. Patients will be assessed at baseline, post-treatment, and 3- and 12-month follow-ups. Intention to treat and per protocol analyses will be performed. Although the effectiveness of face-to-face transdiagnostic protocols has been

  8. Optimal Scanning Protocols for Dual-Energy CT Angiography in Peripheral Arterial Stents: An in Vitro Phantom Study

    Directory of Open Access Journals (Sweden)

    Abdulrahman Almutairi

    2015-05-01

    Full Text Available Objective: To identify the optimal dual-energy computed tomography (DECT scanning protocol for peripheral arterial stents while achieving a low radiation dose, while still maintaining diagnostic image quality, as determined by an in vitro phantom study. Methods: Dual-energy scans in monochromatic spectral imaging mode were performed on a peripheral arterial phantom with use of three gemstone spectral imaging (GSI protocols, three pitch values, and four kiloelectron volts (keV ranges. A total of 15 stents of different sizes, materials, and designs were deployed in the phantom. Image noise, the signal-to-noise ratio (SNR, different levels of adaptive statistical iterative reconstruction (ASIR, and the four levels of monochromatic energy for DECT imaging of peripheral arterial stents were measured and compared to determine the optimal protocols. Results: A total of 36 scans with 180 datasets were reconstructed from a combination of different protocols. There was a significant reduction of image noise with a higher SNR from monochromatic energy images between 65 and 70 keV in all investigated preset GSI protocols (p < 0.05. In addition, significant effects were found from the main effect analysis for these factors: GSI, pitch, and keV (p = 0.001. In contrast, there was significant interaction on the unstented area between GSI and ASIR (p = 0.015 and a very high significant difference between keV and ASIR (p < 0.001. A radiation dose reduction of 50% was achieved. Conclusions: The optimal scanning protocol and energy level in the phantom study were GSI-48, pitch value 0.984, and 65 keV, which resulted in lower image noise and a lower radiation dose, but with acceptable diagnostic images.

  9. On shaky ground - A study of security vulnerabilities in control protocols

    Energy Technology Data Exchange (ETDEWEB)

    Byres, E. J. [Wurldtech Research Inc., 7178 Lancrest Tr., Lantzville, BC V0R 2H0 (Canada); Huffman, D. [Wurldtech Analytics Inc., 208-1040 Hamilton St., Vancouver, BC V6B 2R9 (Canada); Kube, N. [Univ. of Victoria, Dept. of Computer Science, PO Box 3055 STN CSC, Victoria BC V8W 3P6 (Canada)

    2006-07-01

    The recent introduction of information technologies such as Ethernet R into nuclear industry control devices has resulted in significantly less isolation from the outside world. This raises the question of whether these systems could be attacked by malware, network hackers or professional criminals to cause disruption to critical operations in a manner similar to the impacts now felt in the business world. To help answer this question, a study was undertaken to test a representative control protocol to determine if it had vulnerabilities that could be exploited. A framework was created in which a test could express a large number of test cases in very compact formal language. This in turn, allowed for the economical automation of both the generation of selectively malformed protocol traffic and the measurement of device under test's (DUT) behavior in response to this traffic. Approximately 5000 protocol conformance tests were run against two major brands of industrial controller. More than 60 categories of errors were discovered, the majority of which were in the form of incorrect error responses to malformed traffic. Several malformed packets however, caused the device to respond or communicate in inappropriate ways. These would be relatively simple for an attacker to inject into a system and could result in the plant operator losing complete view or control of the control device. Based on this relatively small set of devices, we believe that the nuclear industry urgently needs to adopt better security robustness testing of control devices as standard practice. (authors)

  10. On shaky ground - A study of security vulnerabilities in control protocols

    International Nuclear Information System (INIS)

    Byres, E. J.; Huffman, D.; Kube, N.

    2006-01-01

    The recent introduction of information technologies such as Ethernet R into nuclear industry control devices has resulted in significantly less isolation from the outside world. This raises the question of whether these systems could be attacked by malware, network hackers or professional criminals to cause disruption to critical operations in a manner similar to the impacts now felt in the business world. To help answer this question, a study was undertaken to test a representative control protocol to determine if it had vulnerabilities that could be exploited. A framework was created in which a test could express a large number of test cases in very compact formal language. This in turn, allowed for the economical automation of both the generation of selectively malformed protocol traffic and the measurement of device under test's (DUT) behavior in response to this traffic. Approximately 5000 protocol conformance tests were run against two major brands of industrial controller. More than 60 categories of errors were discovered, the majority of which were in the form of incorrect error responses to malformed traffic. Several malformed packets however, caused the device to respond or communicate in inappropriate ways. These would be relatively simple for an attacker to inject into a system and could result in the plant operator losing complete view or control of the control device. Based on this relatively small set of devices, we believe that the nuclear industry urgently needs to adopt better security robustness testing of control devices as standard practice. (authors)

  11. The precautionary principle as a provisional instrument in environmental policy: The Montreal Protocol case study

    International Nuclear Information System (INIS)

    Jacobs, J. Roger

    2014-01-01

    Highlights: • I examine whether a policy invoked under the Precautionary Principle can move beyond provisional status. • I review the certainty of conclusions based upon the Global Ozone Research and Monitoring Project. • There is high certainty that anthropogenic ozone depletion has health consequences in polar regions. • Current research focuses on long term projections of risk that perpetuates high uncertainty. • Establishment of a community to generate Assessments acts to perpetuate the period of uncertainty. - Abstract: Environmental studies identify possible threats to the health of the public or the environment when the scientific certainty of risk is low, but the potential cost is high. Governments may respond by invoking the Precautionary Principle, holding that scientific certainty is not required to take actions that reduce possible risk. EU guidelines suggest that precautionary measures remain provisional until sufficient scientific certainty is generated. Here I study the Scientific Assessments produced for the Montreal Protocol, and the scientific community that generates them, and ask whether a long-standing program of scientific investigation and monitoring can generate sufficient scientific certainty to move beyond dependence on the Precautionary Principle. When the Montreal Protocol was ratified, many scientists strongly suspected that anthropogenic substances like chlorofluorocarbons were depleting stratospheric ozone. Although the risk was uncertain, the perceived cost to public health of ozone depletion was high. A quarter century after formulating the Montreal Protocol, science can define the conditions for ozone depletion with great certainty, but uncertainty remains in determining the scale and distribution of the attributable increase in damaging ultra-violet (UV) radiation. Organisations, such as NASA, and scientists that contribute to the Scientific Assessments comprise the community in which the scientific consensus of risk is

  12. A Field-Based Testing Protocol for Assessing Gross Motor Skills in Preschool Children: The Children's Activity and Movement in Preschool Study Motor Skills Protocol

    Science.gov (United States)

    Williams, Harriet G.; Pfeiffer, Karin A.; Dowda, Marsha; Jeter, Chevy; Jones, Shaverra; Pate, Russell R.

    2009-01-01

    The purpose of this study was to develop a valid and reliable tool for use in assessing motor skills in preschool children in field-based settings. The development of the Children's Activity and Movement in Preschool Study Motor Skills Protocol included evidence of its reliability and validity for use in field-based environments as part of large…

  13. Disinfection Contact Time study plan (100-N Area tracer protocol). Revision 1

    International Nuclear Information System (INIS)

    Kretzschmar, S.P.; Bedi, G.S.; Martinez, P.; Ervin, K.

    1996-07-01

    Bechtel Hanford, Inc. will prepare an Engineering Tracer Study Protocol for the determination of contact time for the disinfection process at Group A Non-transient Non-community water treatment plant for the 100-N Water Plant at the Hanford Site in Richland, Washington. Included in this report are the results of a study that determine the actual detention time within the plant clearwell, and thus the disinfection contact time at several clearwell effluent flow rates

  14. Recommended Protocol for Round Robin Studies in Additive Manufacturing

    Science.gov (United States)

    Moylan, Shawn; Brown, Christopher U.; Slotwinski, John

    2016-01-01

    One way to improve confidence and encourage proliferation of additive manufacturing (AM) technologies and parts is by generating more high quality data describing the performance of AM processes and parts. Many in the AM community see round robin studies as a way to generate large data sets while distributing the cost among the participants, thereby reducing the cost to individual users. The National Institute of Standards and Technology (NIST) has conducted and participated in several of these AM round robin studies. While the results of these studies are interesting and informative, many of the lessons learned in conducting these studies concern the logistics and methods of the study and unique issues presented by AM. Existing standards for conducting interlaboratory studies of measurement methods, along with NIST’s experience, form the basis for recommended protocols for conducting AM round robin studies. The role of round robin studies in AM qualification, some of the limitations of round robin studies, and the potential benefit of less formal collaborative experiments where multiple factors, AM machine being only one, are varied simultaneously are also discussed. PMID:27274602

  15. Protocol adaptations to conduct Systematic Literature Reviews in Software Engineering: a chronological study

    Directory of Open Access Journals (Sweden)

    Samuel Sepúlveda

    2015-09-01

    Full Text Available Systematic literature reviews (SLR have reached a considerable level of adoption in Software Engineering (SE, how-ever protocol adaptations for its implementation remain tangentially addressed. This work provides a chronological framework for the use and adaptation of the SLR protocol, including its current status. A systematic literature search was performed, reviewing a set of twelve articles being selected in accordance with the inclusion and exclusion criteria between 2004 and 2013, using digital data sources recognized by the SE community. A chronological framework is provided that includes the current state of the protocol adaptations to conduct SLR in SE. The results indicate areas where the quantity and quality of investigations needs to be increased and the identi- fication of the main proposals providing adaptations for the protocol conducting SLR in SE.

  16. Game-theoretic perspective of Ping-Pong protocol

    Science.gov (United States)

    Kaur, Hargeet; Kumar, Atul

    2018-01-01

    We analyse Ping-Pong protocol from the point of view of a game. The analysis helps us in understanding the different strategies of a sender and an eavesdropper to gain the maximum payoff in the game. The study presented here characterizes strategies that lead to different Nash equilibriums. We further demonstrate the condition for Pareto optimality depending on the parameters used in the game. Moreover, we also analysed LM05 protocol and compared it with PP protocol from the point of view of a generic two-way QKD game with or without entanglement. Our results provide a deeper understanding of general two-way QKD protocols in terms of the security and payoffs of different stakeholders in the protocol.

  17. Transitions of Care from Child and Adolescent Mental Health Services to Adult Mental Health Services (TRACK Study: A study of protocols in Greater London

    Directory of Open Access Journals (Sweden)

    Ford Tamsin

    2008-06-01

    Full Text Available Abstract Background Although young people's transition from Child and Adolescent Mental Health Services (CAMHS to Adult Mental Health Services (AMHS in England is a significant health issue for service users, commissioners and providers, there is little evidence available to guide service development. The TRACK study aims to identify factors which facilitate or impede effective transition from CAHMS to AMHS. This paper presents findings from a survey of transition protocols in Greater London. Methods A questionnaire survey (Jan-April 2005 of Greater London CAMHS to identify transition protocols and collect data on team size, structure, transition protocols, population served and referral rates to AMHS. Identified transition protocols were subjected to content analysis. Results Forty two of the 65 teams contacted (65% responded to the survey. Teams varied in type (generic/targeted/in-patient, catchment area (locality-based, wider or national and transition boundaries with AMHS. Estimated annual average number of cases considered suitable for transfer to AMHS, per CAMHS team (mean 12.3, range 0–70, SD 14.5, n = 37 was greater than the annual average number of cases actually accepted by AMHS (mean 8.3, range 0–50, SD 9.5, n = 33. In April 2005, there were 13 active and 2 draft protocols in Greater London. Protocols were largely similar in stated aims and policies, but differed in key procedural details, such as joint working between CAHMS and AMHS and whether protocols were shared at Trust or locality level. While the centrality of service users' involvement in the transition process was identified, no protocol specified how users should be prepared for transition. A major omission from protocols was procedures to ensure continuity of care for patients not accepted by AMHS. Conclusion At least 13 transition protocols were in operation in Greater London in April 2005. Not all protocols meet all requirements set by government policy. Variation in

  18. Metacognitive Protocols: A Qualitative Study of Perceptions of "Smartness" of Adults and Children.

    Science.gov (United States)

    Morse, Linda W.; Smith-Mallette, Geraldine; Talento-Miller, Eileen

    Metacognition is a theoretical construct used to describe individuals' perceptions of their thinking processes and their own control over their thinking processes. This study examined the protocols of 78 undergraduates who responded to 3 questions from the Swanson Metacognitive Questionnaire: (1) What makes someone really smart? (2) How do…

  19. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  20. Continuous sweep versus discrete step protocols for studying effects of wearable robot assistance magnitude.

    Science.gov (United States)

    Malcolm, Philippe; Rossi, Denise Martineli; Siviy, Christopher; Lee, Sangjun; Quinlivan, Brendan Thomas; Grimmer, Martin; Walsh, Conor J

    2017-07-12

    Different groups developed wearable robots for walking assistance, but there is still a need for methods to quickly tune actuation parameters for each robot and population or sometimes even for individual users. Protocols where parameters are held constant for multiple minutes have traditionally been used for evaluating responses to parameter changes such as metabolic rate or walking symmetry. However, these discrete protocols are time-consuming. Recently, protocols have been proposed where a parameter is changed in a continuous way. The aim of the present study was to compare effects of continuously varying assistance magnitude with a soft exosuit against discrete step conditions. Seven participants walked on a treadmill wearing a soft exosuit that assists plantarflexion and hip flexion. In Continuous-up, peak exosuit ankle moment linearly increased from approximately 0 to 38% of biological moment over 10 min. Continuous-down was the opposite. In Discrete, participants underwent five periods of 5 min with steady peak moment levels distributed over the same range as Continuous-up and Continuous-down. We calculated metabolic rate for the entire Continuous-up and Continuous-down conditions and the last 2 min of each Discrete force level. We compared kinematics, kinetics and metabolic rate between conditions by curve fitting versus peak moment. Reduction in metabolic rate compared to Powered-off was smaller in Continuous-up than in Continuous-down at most peak moment levels, due to physiological dynamics causing metabolic measurements in Continuous-up and Continuous-down to lag behind the values expected during steady-state testing. When evaluating the average slope of metabolic reduction over the entire peak moment range there was no significant difference between Continuous-down and Discrete. Attempting to correct the lag in metabolics by taking the average of Continuous-up and Continuous-down removed all significant differences versus Discrete. For kinematic and

  1. A customised cold-water immersion protocol favours one-size-fits-all protocols in improving acute performance recovery

    NARCIS (Netherlands)

    Zandvoort, Coen S.; de Zwart, Jelmer R.; van Keeken, Brenda L.; Viroux, Patrick J.F.; Tiemessen, Ivo J.H.

    The purpose of the present study was to investigate whether a customised cold-water immersion (CWIc) protocol was more effective in enhancing acute performance recovery than a one-size-fits-all CWI (CWIs) or active recovery (AR) protocol. On three separate testing days, 10 healthy, physically

  2. Establishment and optimization of NMR-based cell metabonomics study protocols for neonatal Sprague-Dawley rat cardiomyocytes.

    Science.gov (United States)

    Zhang, Ming; Sun, Bo; Zhang, Qi; Gao, Rong; Liu, Qiao; Dong, Fangting; Fang, Haiqin; Peng, Shuangqing; Li, Famei; Yan, Xianzhong

    2017-01-15

    A quenching, harvesting, and extraction protocol was optimized for cardiomyocytes NMR metabonomics analysis in this study. Trypsin treatment and direct scraping cells in acetonitrile were compared for sample harvesting. The results showed trypsin treatment cause normalized concentration increasing of phosphocholine and metabolites leakage, since the trypsin-induced membrane broken and long term harvesting procedures. Then the intracellular metabolite extraction efficiency of methanol and acetonitrile were compared. As a result, washing twice with phosphate buffer, direct scraping cells and extracting with acetonitrile were chosen to prepare cardiomyocytes extracts samples for metabonomics studies. This optimized protocol is rapid, effective, and exhibits greater metabolite retention. Copyright © 2016 Elsevier Inc. All rights reserved.

  3. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  4. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  5. An entanglement concentration protocol for cluster states using ...

    Indian Academy of Sciences (India)

    Permanent link: http://www.ias.ac.in/article/fulltext/pram/086/05/0973-0983 ... The purpose of this paper is a proposal on entanglement concentration protocol forcluster states. The protocol ... We also make a comparative numerical study of the residual entanglement left out after the execution of each step of the protocol.

  6. THE NEED TO STUDY PROTOCOL IN HIGHER EDUCATION STUDIES OF SOCIAL CHARACTER

    Directory of Open Access Journals (Sweden)

    Ana Belén Fernández Souto

    2013-04-01

    Full Text Available It seems clear that globalization today reaches all areas of society, business and, of course, science and knowledge. The University cannot escape this reality and should strive more than ever, to train professionals to meet the daily challenges of a weak economy and total global markets. Is in this framework in which we intend to justify the need for senior school and college students to learn and acquire training related to international protocol, so they become competent in international negotiating, to know potential communication noises that may arise interacting with different cultures and to take advantage of resources and synergies for the success of the relationship, whether or not commercial. Thus, we propose a theoretical and practical justification of why senior school students related to social area must possess protocol knowledge to leave for the labor market better prepared and to get a higher real return from its formative stage.

  7. Declarative Specification of Fault Tolerant Auction Protocols: The English Auction Case Study

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Gaspari, Mauro

    2012-01-01

    Auction mechanisms are nowadays widely used in electronic commerce Web sites for buying and selling items among different users. The increasing importance of auction protocols in the negotiation phase is not limited to online marketplaces. In fact, the wide applicability of auctions as resource‐a...... about the specification of an English Auction protocol which tolerate crashes of bidding agents and we discuss its properties....

  8. Pilot studies for the North American Soil Geochemical Landscapes Project - Site selection, sampling protocols, analytical methods, and quality control protocols

    Science.gov (United States)

    Smith, D.B.; Woodruff, L.G.; O'Leary, R. M.; Cannon, W.F.; Garrett, R.G.; Kilburn, J.E.; Goldhaber, M.B.

    2009-01-01

    In 2004, the US Geological Survey (USGS) and the Geological Survey of Canada sampled and chemically analyzed soils along two transects across Canada and the USA in preparation for a planned soil geochemical survey of North America. This effort was a pilot study to test and refine sampling protocols, analytical methods, quality control protocols, and field logistics for the continental survey. A total of 220 sample sites were selected at approximately 40-km intervals along the two transects. The ideal sampling protocol at each site called for a sample from a depth of 0-5 cm and a composite of each of the O, A, and C horizons. The Ca, Fe, K, Mg, Na, S, Ti, Ag, As, Ba, Be, Bi, Cd, Ce, Co, Cr, Cs, Cu, Ga, In, La, Li, Mn, Mo, Nb, Ni, P, Pb, Rb, Sb, Sc, Sn, Sr, Te, Th, Tl, U, V, W, Y, and Zn by inductively coupled plasma-mass spectrometry and inductively coupled plasma-atomic emission spectrometry following a near-total digestion in a mixture of HCl, HNO3, HClO4, and HF. Separate methods were used for Hg, Se, total C, and carbonate-C on this same size fraction. Only Ag, In, and Te had a large percentage of concentrations below the detection limit. Quality control (QC) of the analyses was monitored at three levels: the laboratory performing the analysis, the USGS QC officer, and the principal investigator for the study. This level of review resulted in an average of one QC sample for every 20 field samples, which proved to be minimally adequate for such a large-scale survey. Additional QC samples should be added to monitor within-batch quality to the extent that no more than 10 samples are analyzed between a QC sample. Only Cr (77%), Y (82%), and Sb (80%) fell outside the acceptable limits of accuracy (% recovery between 85 and 115%) because of likely residence in mineral phases resistant to the acid digestion. A separate sample of 0-5-cm material was collected at each site for determination of organic compounds. A subset of 73 of these samples was analyzed for a suite of

  9. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  10. An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Lauritsen, Rasmus; Toft, Tomas

    2014-01-01

    Recent developments in Multi-party Computation (MPC) has resulted in very efficient protocols for dishonest majority in the preprocessing model. In particular, two very promising protocols for Boolean circuits have been proposed by Nielsen et al. (nicknamed TinyOT) and by Damg˚ard and Zakarias...... suggest a modification of MiniMac that achieves increased parallelism at no extra communication cost. This gives an asymptotic improvement of the original protocol as well as an 8-fold speed-up of our implementation. We compare the resulting protocol to TinyOT for the case of secure computation in parallel...... of a large number of AES encryptions and find that it performs better than results reported so far on TinyOT, on the same hardware.p...

  11. Using salivary cortisol to measure the effects of a Wilbarger protocol-based procedure on sympathetic arousal: a pilot study.

    Science.gov (United States)

    Kimball, Judith G; Lynch, Keara M; Stewart, Kelli C; Williams, Nicole E; Thomas, Meghan A; Atwood, Kam D

    2007-01-01

    This study investigated changes in salivary cortisol, the stress hormone, after administration of a procedure based on the Wilbarger protocol to children diagnosed with sensory defensiveness (SD), a type of sensory modulation dysfunction. Using a single-subject design across participants, we studied 4 boys with SD ages 3 to 5 years. Each participant completed four sessions consisting of the collection of a saliva sample, administration of a procedure based on the Wilbarger protocol, 15 min of quiet neutral activities to allow time for any changes in cortisol level to manifest in the saliva, and the second collection of saliva. Saliva samples were analyzed using enzyme-linked immunosorbent assay (ELISA). Salivary cortisol levels in all participants changed after each of four applications of a procedure based on the Wilbarger protocol. The cortisol levels of 2 children whose levels were relatively higher on pretest decreased at each posttest. The levels of 1 child whose cortisol was higher on pretest three times decreased those three times and increased the one time the pretest cortisol was lower. The levels of 1 child who had the lowest cortisol levels of any of the children increased each time. Therefore, in all participants, cortisol moved in the direction of modulation. In these 4 boys, a procedure based on the Wilbarger protocol modulated cortisol levels toward a middle range. This pilot study indicates that there is an association between sympathetic nervous system response and the Wilbarger protocol-based procedure, as indicated by salivary cortisol levels.

  12. IoT real time data acquisition using MQTT protocol

    Science.gov (United States)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  13. An electronic specimen collection protocol schema (eSCPS). Document architecture for specimen management and the exchange of specimen collection protocols between biobanking information systems.

    Science.gov (United States)

    Eminaga, O; Semjonow, A; Oezguer, E; Herden, J; Akbarov, I; Tok, A; Engelmann, U; Wille, S

    2014-01-01

    The integrity of collection protocols in biobanking is essential for a high-quality sample preparation process. However, there is not currently a well-defined universal method for integrating collection protocols in the biobanking information system (BIMS). Therefore, an electronic schema of the collection protocol that is based on Extensible Markup Language (XML) is required to maintain the integrity and enable the exchange of collection protocols. The development and implementation of an electronic specimen collection protocol schema (eSCPS) was performed at two institutions (Muenster and Cologne) in three stages. First, we analyzed the infrastructure that was already established at both the biorepository and the hospital information systems of these institutions and determined the requirements for the sufficient preparation of specimens and documentation. Second, we designed an eSCPS according to these requirements. Finally, a prospective study was conducted to implement and evaluate the novel schema in the current BIMS. We designed an eSCPS that provides all of the relevant information about collection protocols. Ten electronic collection protocols were generated using the supplementary Protocol Editor tool, and these protocols were successfully implemented in the existing BIMS. Moreover, an electronic list of collection protocols for the current studies being performed at each institution was included, new collection protocols were added, and the existing protocols were redesigned to be modifiable. The documentation time was significantly reduced after implementing the eSCPS (5 ± 2 min vs. 7 ± 3 min; p = 0.0002). The eSCPS improves the integrity and facilitates the exchange of specimen collection protocols in the existing open-source BIMS.

  14. Gender-Specific Combination HIV Prevention for Youth in High-Burden Settings: The MP3 Youth Observational Pilot Study Protocol.

    Science.gov (United States)

    Buttolph, Jasmine; Inwani, Irene; Agot, Kawango; Cleland, Charles M; Cherutich, Peter; Kiarie, James N; Osoti, Alfred; Celum, Connie L; Baeten, Jared M; Nduati, Ruth; Kinuthia, John; Hallett, Timothy B; Alsallaq, Ramzi; Kurth, Ann E

    2017-03-08

    Nearly three decades into the epidemic, sub-Saharan Africa (SSA) remains the region most heavily affected by human immunodeficiency virus (HIV), with nearly 70% of the 34 million people living with HIV globally residing in the region. In SSA, female and male youth (15 to 24 years) are at a disproportionately high risk of HIV infection compared to adults. As such, there is a need to target HIV prevention strategies to youth and to tailor them to a gender-specific context. This protocol describes the process for the multi-staged approach in the design of the MP3 Youth pilot study, a gender-specific, combination, HIV prevention intervention for youth in Kenya. The objective of this multi-method protocol is to outline a rigorous and replicable methodology for a gender-specific combination HIV prevention pilot study for youth in high-burden settings, illustrating the triangulated methods undertaken to ensure that age, sex, and context are integral in the design of the intervention. The mixed-methods, cross-sectional, longitudinal cohort pilot study protocol was developed by first conducting a systematic review of the literature, which shaped focus group discussions around prevention package and delivery options, and that also informed age- and sex- stratified mathematical modeling. The review, qualitative data, and mathematical modeling created a triangulated evidence base of interventions to be included in the pilot study protocol. To design the pilot study protocol, we convened an expert panel to select HIV prevention interventions effective for youth in SSA, which will be offered in a mobile health setting. The goal of the pilot study implementation and evaluation is to apply lessons learned to more effective HIV prevention evidence and programming. The combination HIV prevention package in this protocol includes (1) offering HIV testing and counseling for all youth; (2) voluntary medical circumcision and condoms for males; (3) pre-exposure prophylaxis (Pr

  15. A Pilot Study on the effects of Music Therapy on Frontotemporal Dementia - developing a research protocol

    DEFF Research Database (Denmark)

    Ridder, Hanne Mette Ochsner; Wigram, Tony; Ottesen, Anne Marie

    2009-01-01

    , and pharmacological treatment of the psychiatric symptoms is difficult, requiring specialist proficiency in the field. Pilot study: As there is not yet sufficient research that examines the effects of non-pharmacologic treatment with this group there is a need to develop valid and reliable research protocols....... As an example of a non-pharmacologic treatment procedure music therapy was investigated. With the focus to develop a research protocol for a future larger population study a pilot study was carried out. In two case studies a combination of data collection methods were examined with the overall goal to document...... changes in intersubjectivity. In this pilot testing there was a specific interest in selecting a relevant and manageable dementia specific instrument for measuring quality of life and relating it with other instruments. Following three instruments were tested: the Altzheimers Disease-Related Quality...

  16. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  17. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  18. Formal Test Automation: The Conference Protocol with PHACT

    NARCIS (Netherlands)

    Heerink, A.W.; Ural, Hasan; Probert, Robert L.; Feenstra, J.; Tretmans, G.J.; von Bochmann, Gregor

    2000-01-01

    We discuss a case study of automatic test generation and test execution based on formal methods. The case is the Conference Protocol, a simple, chatbox-like protocol, for which (formal) specifications and multiple implementations are publicly available and which is also used in other case study

  19. Reproductive studies with the anti-inflammatory agent, piroxicam: modification of classical protocols.

    Science.gov (United States)

    Perraud, J; Stadler, J; Kessedjian, M J; Monro, A M

    1984-02-14

    Reproductive toxicology studies were conducted in rabbits and rats given piroxicam, a non-steroidal anti-inflammatory agent (NSAI), orally at 2, 5 and 10 mg/kg/day. In teratology studies there was neither drug-related embryotoxicity nor teratogenicity. As piroxicam, like other NSAI, affects parturition in rats and leads to a progressive toxicity in lactating females, standard protocols were modified: dams of the female fertility study were treated from 2 weeks prior to mating until day 6 of gestation and females of the post-natal toxicity study were treated from parturition until day 12 of lactation. No other adverse effects on reproduction, fertility and postnatal development were observed.

  20. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  1. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  2. Automated extraction protocol for quantification of SARS-Coronavirus RNA in serum: an evaluation study

    Directory of Open Access Journals (Sweden)

    Lui Wing-bong

    2006-02-01

    Full Text Available Abstract Background We have previously developed a test for the diagnosis and prognostic assessment of the severe acute respiratory syndrome (SARS based on the detection of the SARS-coronavirus RNA in serum by real-time quantitative reverse transcriptase polymerase chain reaction (RT-PCR. In this study, we evaluated the feasibility of automating the serum RNA extraction procedure in order to increase the throughput of the assay. Methods An automated nucleic acid extraction platform using the MagNA Pure LC instrument (Roche Diagnostics was evaluated. We developed a modified protocol in compliance with the recommended biosafety guidelines from the World Health Organization based on the use of the MagNA Pure total nucleic acid large volume isolation kit for the extraction of SARS-coronavirus RNA. The modified protocol was compared with a column-based extraction kit (QIAamp viral RNA mini kit, Qiagen for quantitative performance, analytical sensitivity and precision. Results The newly developed automated protocol was shown to be free from carry-over contamination and have comparable performance with other standard protocols and kits designed for the MagNA Pure LC instrument. However, the automated method was found to be less sensitive, less precise and led to consistently lower serum SARS-coronavirus concentrations when compared with the column-based extraction method. Conclusion As the diagnostic efficiency and prognostic value of the serum SARS-CoV RNA RT-PCR test is critically associated with the analytical sensitivity and quantitative performance contributed both by the RNA extraction and RT-PCR components of the test, we recommend the use of the column-based manual RNA extraction method.

  3. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  4. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  5. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  6. Conservative Treatment Protocol for Keratocystic Odontogenic Tumour: a Follow-up Study of 3 Cases

    Directory of Open Access Journals (Sweden)

    Gülsün Yildirim

    2010-07-01

    Full Text Available Background: The keratocystic odontogenic tumour is classified as a developmental cyst derived from the enamel organ or from the dental lamina. The treatment of keratocystic odontogenic tumour of the jaw remains controversial. The aim of this study was to report the outcome of our conservative treatment protocol for keratocystic odontogenic tumour.Methods: Three patients with different complaints referred to Oral and Maxillofacial Surgery Clinic, Faculty of Dentistry, Selçuk University. Initial biopsy was carried out in all patients and keratocystic odontogenic tumours was diagnosed subsequent to histopathological examination. The patients with keratocystic odontogenic tumours were treated by enucleation followed by open packing. This conservative treatment protocol was selected because of existing young aged patients. The average follow-up duration of the cases was 2 years.Results: Out of 3 cases, 2 lesions were present in mandible and 1 lesion in maxilla. There was no evidence of recurrence during follow-up. All the cases were monitored continuously with panoramic radiographs, computed tomography and clinical evaluations.Conclusions: This conservative treatment protocol for keratocystic odontogenic tumours, based on enucleation followed by open packing would be a possible choice with a view of offering low recurrence rate and low morbidity rate particularly in young patients.

  7. Protocol of study and pursuit of the radioinduced burns

    International Nuclear Information System (INIS)

    Portas, Mercedes; Glustein, Daniel; Pomerane, Armando; Peragallo, Mabel; Guzman, Alejandra; Ciordia, Irma; Genovese, Jorge; Cymberknoh, Manuel; Dubner, Diana; Michelin, Severino; Perez, Maria del Rosario; Trano, Jose Luis Di; Gisone, Pablo

    2001-01-01

    A study of localized overexposures based on local experience and international criteria is being carried out within the framework of a cooperation agreement between the Buenos Aires Burned Hospital and the Nuclear Regulatory Authority. This protocol was designed considering separately acute and chronic reactions, including the following aspects: patient reception: clinical findings, laboratory tests, photographic recording, and multidisciplinary evaluation; dose reconstruction: evaluation of the dose distribution by biophysical and biological procedures; extension and depth estimation: telethermography, computed tomography, magnetic resonance, radioisotopic procedures, capillaroscopy and percutaneous oxymetry; therapeutic strategies: pain treatment, prevention of infections, systemic administration of pentoxiphyllin and alpha-tocopherol, local application of trolamine and antioxidants, prevention and treatment of radioinduced fibrosis. When it is indicated, surgical treatment includes partial or total excision followed by covering by graft or flap. The application of tissue-engineering techniques will be considered. Study of individual radiosensitivity: evaluation of apoptosis in peripheral lymphocytes and clonogenic assays in dermal fibroblasts 'in vitro' irradiated. (author)

  8. Health care access for rural youth on equal terms? A mixed methods study protocol in northern Sweden.

    Science.gov (United States)

    Goicolea, Isabel; Carson, Dean; San Sebastian, Miguel; Christianson, Monica; Wiklund, Maria; Hurtig, Anna-Karin

    2018-01-11

    The purpose of this paper is to propose a protocol for researching the impact of rural youth health service strategies on health care access. There has been no published comprehensive assessment of the effectiveness of youth health strategies in rural areas, and there is no clearly articulated model of how such assessments might be conducted. The protocol described here aims to gather information to; i) Assess rural youth access to health care according to their needs, ii) Identify and understand the strategies developed in rural areas to promote youth access to health care, and iii) Propose actions for further improvement. The protocol is described with particular reference to research being undertaken in the four northernmost counties of Sweden, which contain a widely dispersed and diverse youth population. The protocol proposes qualitative and quantitative methodologies sequentially in four phases. First, to map youth access to health care according to their health care needs, including assessing horizontal equity (equal use of health care for equivalent health needs,) and vertical equity (people with greater health needs should receive more health care than those with lesser needs). Second, a multiple case study design investigates strategies developed across the region (youth clinics, internet applications, public health programs) to improve youth access to health care. Third, qualitative comparative analysis of the 24 rural municipalities in the region identifies the best combination of conditions leading to high youth access to health care. Fourth, a concept mapping study involving rural stakeholders, care providers and youth provides recommended actions to improve rural youth access to health care. The implementation of this research protocol will contribute to 1) generating knowledge that could contribute to strengthening rural youth access to health care, as well as to 2) advancing the application of mixed methods to explore access to health care.

  9. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  10. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  11. A protocol for isolating insect mitochondrial genomes: a case study of NUMT in Melipona flavolineata (Hymenoptera: Apidae).

    Science.gov (United States)

    Françoso, Elaine; Gomes, Fernando; Arias, Maria Cristina

    2016-07-01

    Nuclear mitochondrial DNA insertions (NUMTs) are mitochondrial DNA sequences that have been transferred into the nucleus and are recognized by the presence of indels and stop codons. Although NUMTs have been identified in a diverse range of species, their discovery was frequently accidental. Here, our initial goal was to develop and standardize a simple method for isolating NUMTs from the nuclear genome of a single bee. Subsequently, we tested our new protocol by determining whether the indels and stop codons of the cytochrome c oxidase subunit I (COI) sequence of Melipona flavolineata are of nuclear origin. The new protocol successfully demonstrated the presence of a COI NUMT. In addition to NUMT investigations, the protocol described here will also be very useful for studying mitochondrial mutations related to diseases and for sequencing complete mitochondrial genomes with high read coverage by Next-Generation technology.

  12. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  13. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  14. Replication protocol analysis: a method for the study of real-world design thinking

    DEFF Research Database (Denmark)

    Galle, Per; Kovacs, L. B.

    1996-01-01

    ’ is refined into a method called ‘replication protocol analysis’ (RPA), and discussed from a methodological perspective of design research. It is argued that for the study of real-world design thinking this method offers distinct advantages over traditional ‘design protocol analysis’, which seeks to capture......Given the brief of an architectural competition on site planning, and the design awarded the first prize, the first author (trained as an architect but not a participant in the competition) produced a line of reasoning that might have led from brief to design. In the paper, such ‘design replication...... the designer’s authentic line of reasoning. To illustrate how RPA can be used, the site planning case is briefly presented, and part of the replicated line of reasoning analysed. One result of the analysis is a glimpse of a ‘logic of design’; another is an insight which sheds new light on Darke’s classical...

  15. Minimizing variance in Care of Pediatric Blunt Solid Organ Injury through Utilization of a hemodynamic-driven protocol: a multi-institution study.

    Science.gov (United States)

    Cunningham, Aaron J; Lofberg, Katrine M; Krishnaswami, Sanjay; Butler, Marilyn W; Azarow, Kenneth S; Hamilton, Nicholas A; Fialkowski, Elizabeth A; Bilyeu, Pamela; Ohm, Erika; Burns, Erin C; Hendrickson, Margo; Krishnan, Preetha; Gingalewski, Cynthia; Jafri, Mubeen A

    2017-12-01

    An expedited recovery protocol for management of pediatric blunt solid organ injury (spleen, liver, and kidney) was instituted across two Level 1 Trauma Centers, managed by nine pediatric surgeons within three hospital systems. Data were collected for 18months on consecutive patients after protocol implementation. Patient demographics (including grade of injury), surgeon compliance, National Surgical Quality Improvement Program (NSQIP) complications, direct hospital cost, length of stay, time in the ICU, phlebotomy, and re-admission were compared to an 18-month control period immediately preceding study initiation. A total of 106 patients were treated (control=55, protocol=51). Demographics were similar among groups, and compliance was 78%. Hospital stay (4.6 vs. 3.5days, p=0.04), ICU stay (1.9 vs. 1.0days, p=0.02), and total phlebotomy (7.7 vs. 5.3 draws, p=0.007) were significantly less in the protocol group. A decrease in direct hospital costs was also observed ($11,965 vs. $8795, p=0.09). Complication rates (1.8% vs. 3.9%, p=0.86, no deaths) were similar. An expedited, hemodynamic-driven, pediatric solid organ injury protocol is achievable across hospital systems and surgeons. Through implementation we maintained quality while impacting length of stay, ICU utilization, phlebotomy, and cost. Future protocols should work to further limit resource utilization. Retrospective cohort study. Level II. Copyright © 2017 Elsevier Inc. All rights reserved.

  16. Effects of a peer support programme for youth social services employees experiencing potentially traumatic events: a protocol for a prospective cohort study.

    Science.gov (United States)

    Guay, Stephane; Tremblay, Nicole; Goncalves, Jane; Bilodeau, Henriette; Geoffrion, Steve

    2017-06-24

    The use of peer support programmes to help workers experiencing potentially traumatic events (PTE) has increased in high-risk organisations in the last decades. However, the scientific evidence of its effectiveness is still very limited. This paper aims to describe the protocol of a prospective cohort study that assesses the efficacy of a peer support programme among youth social services employees exposed to a PTE at work on psychological well-being, work functioning and needs of support. This is a mixed-methods prospective study that will examine workers' evolution four times over a 12-month period in Canada. This study involves: (1) quantitative data obtained through self-administrated questionnaires among 222 workers, and (2) qualitative in-depth interviews with a subsample of 45 workers. This study will compare findings from a cohort who received the support of a peer following a PTE (peer support-experimental protocol) as part of the experimental protocol of the Montreal Youth Social Services-University Institute (MYSS-UI), the second group of workers did not ask for the peer support (no peer support-experimental protocol) but was part of MYSS-UI, and the third group received standard organisational support from the Monteregie Youth Social Services (MYSS) (standard organisational protocol). The protocol and informed consent form complied with the ethics guidelines of the MYSS-UI. The Research Ethics Board of MYSS-UI and MYSS reviewed and accepted the protocol as required. The results of the study will be published in peer-reviewed journals, presented at research and general public conferences, disseminated via a public report for the institute that funded the project and for all workers. Results of this study will influence decision making regarding intervention policies following PTE and peer support interventions may be expanded throughout the youth social services in Canada and worldwide. © Article author(s) (or their employer(s) unless otherwise stated

  17. Protocols for pressure ulcer prevention: are they evidence-based?

    Science.gov (United States)

    Chaves, Lidice M; Grypdonck, Mieke H F; Defloor, Tom

    2010-03-01

    This study is a report of a study to determine the quality of protocols for pressure ulcer prevention in home care in the Netherlands. If pressure ulcer prevention protocols are evidence-based and practitioners use them correctly in practice, this will result a reduction in pressure ulcers. Very little is known about the evidence-based content and quality of the pressure ulcer prevention protocols. In 2008, current pressure ulcer prevention protocols from 24 home-care agencies in the Netherlands were evaluated. A checklist developed and validated by two pressure ulcer prevention experts was used to assess the quality of the protocols, and weighted and unweighted quality scores were computed and analysed using descriptive statistics. The 24 pressure ulcer prevention protocols had a mean weighted quality score of 63.38 points out of a maximum of 100 (sd 5). The importance of observing the skin at the pressure points at least once a day was emphasized in 75% of the protocols. Only 42% correctly warned against the use of materials that were 'less effective or that could potentially cause harm'. Pressure ulcer prevention commands a reasonable amount of attention in home care, but the incidence of pressure ulcers and lack of a consistent, standardized document for use in actual practice indicate a need for systematic implementation of national pressure ulcer prevention standards in the Netherlands to ensure adherence to the established protocols.

  18. Benchmarking pediatric cranial CT protocols using a dose tracking software system: a multicenter study

    Energy Technology Data Exchange (ETDEWEB)

    Bondt, Timo de; Parizel, Paul M. [Antwerp University Hospital and University of Antwerp, Department of Radiology, Antwerp (Belgium); Mulkens, Tom [H. Hart Hospital, Department of Radiology, Lier (Belgium); Zanca, Federica [GE Healthcare, DoseWatch, Buc (France); KU Leuven, Imaging and Pathology Department, Leuven (Belgium); Pyfferoen, Lotte; Casselman, Jan W. [AZ St. Jan Brugge-Oostende AV Hospital, Department of Radiology, Brugge (Belgium)

    2017-02-15

    To benchmark regional standard practice for paediatric cranial CT-procedures in terms of radiation dose and acquisition parameters. Paediatric cranial CT-data were retrospectively collected during a 1-year period, in 3 different hospitals of the same country. A dose tracking system was used to automatically gather information. Dose (CTDI and DLP), scan length, amount of retakes and demographic data were stratified by age and clinical indication; appropriate use of child-specific protocols was assessed. In total, 296 paediatric cranial CT-procedures were collected. Although the median dose of each hospital was below national and international diagnostic reference level (DRL) for all age categories, statistically significant (p-value < 0.001) dose differences among hospitals were observed. The hospital with lowest dose levels showed smallest dose variability and used age-stratified protocols for standardizing paediatric head exams. Erroneous selection of adult protocols for children still occurred, mostly in the oldest age-group. Even though all hospitals complied with national and international DRLs, dose tracking and benchmarking showed that further dose optimization and standardization is possible by using age-stratified protocols for paediatric cranial CT. Moreover, having a dose tracking system revealed that adult protocols are still applied for paediatric CT, a practice that must be avoided. (orig.)

  19. The safety of a novel early mobilization protocol conducted by ICU physicians: a prospective observational study

    Directory of Open Access Journals (Sweden)

    Keibun Liu

    2018-02-01

    Full Text Available Abstract Background There are numerous barriers to early mobilization (EM in a resource-limited intensive care unit (ICU without a specialized team or an EM culture, regarding patient stability while critically ill or in the presence of medical devices. We hypothesized that ICU physicians can overcome these barriers. The aim of this study was to investigate the safety of EM according to the Maebashi EM protocol conducted by ICU physicians. Methods This was a single-center prospective observational study. All consecutive patients with an unplanned emergency admission were included in this study, according to the exclusion criteria. The observation period was from June 2015 to June 2016. Data regarding adverse events, medical devices in place during rehabilitation, protocol adherence, and rehabilitation outcomes were collected. The primary outcome was safety. Results A total of 232 consecutively enrolled patients underwent 587 rehabilitation sessions. Thirteen adverse events occurred (2.2%; 95% confidence interval, 1.2–3.8% and no specific treatment was needed. There were no instances of dislodgement or obstruction of medical devices, tubes, or lines. The incidence of adverse events associated with mechanical ventilation or extracorporeal membrane oxygenation (ECMO was 2.4 and 3.6%, respectively. Of 587 sessions, 387 (66% sessions were performed at the active rehabilitation level, including sitting out of the bed, active transfer to a chair, standing, marching, and ambulating. ICU physicians attended over 95% of these active rehabilitation sessions. Of all patients, 143 (62% got out of bed within 2 days (median 1.2 days; interquartile range 0.1–2.0. Conclusions EM according to the Maebashi EM protocol conducted by ICU physicians, without a specialized team or EM culture, was performed at a level of safety similar to previous studies performed by specialized teams, even with medical devices in place, including mechanical ventilation or ECMO

  20. Dosimetry study on the conventional and three dimensional conformal radiation treatment planning protocols for rectal cancer

    International Nuclear Information System (INIS)

    Cai Yong; He Yuxiang; Han Shukui; Wu Hao; Gong Jian; Xu Bo

    2007-01-01

    Objective: To compare the dose distribution of clinical target volume (CTV), in normal tissues and organs for patients with rectal cancer on the conventional radiotherapy (2D) and three dimension- al conformal radiation treatment (3DCRT). Methods: The CT image data of 36 rectal cancer patients treated with 3DCRT were studied. The CTV, small bowel, colon, bladder, pelvic bone marrow, and femoral head and neck were contoured on consecutive axial slices of CT images. Two 3DCRT and three conventional treatment planning protocols were simulated using three dimensional treatment planning system (CMS Focus 2.31), were defined as 3D-3, 3D-4, 2D-2, 2D-3, 2D-4. The difference of five treatment planning protocols on the CTV and normal structure by analysis of dose-volume histograms (DVHs) were compared. Results: The D 95 and V 95 of these five protocols all exceeded 97%. The conformity index(CI) of 3D was obviously larger than that of 2D protocol. The dose inhomogeneity(DI) in 4 DCRT was less than that of 3 DCRT. The 3D as compared with the 2D, significantly reduced the mean dose of 45 Gy to the small bowel and colon. The 3D-3 as compared with the 2D-3, the 3D-4 as compared with the 2D-4, the mean dose of small bowel and colon was reduced by 28.5% and 25.7%, respectively. The 3D-3 as compared with the 2D-2, the 3D-3 as compared with the 2D-3 and the 3D4 as compared with the 2D-4, the percentage volume of small bowel and colon which received 45 Gy was reduced by 80.8% , 51.1% and 54.7% , respectively. Either the mean dose, or the percentage volume receiving 35 Gy and 45 Gy to the pelvic bone and bladder, the 3D planning protocols had advanage over the 2D planning protocols. The V 45 of bladder in 2D-2 planning proto- col was the highest in all planning protocols, exceeding 98%, but the highest V 45 of bladder was only 50% in the other planning protocols. Conclusions: Even though the difference in pelvic CTV of rectal cancer patients between the conventional radiotherapy and 3

  1. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  2. The Spectrum of Histopathological Changes in the Renal Allograft - a 12 Months Protocol Biopsy Study

    Directory of Open Access Journals (Sweden)

    Galina Severova-Andreevska

    2018-03-01

    CONCLUSION: Our 12-month protocol biopsy study revealed the presence of different forms of mixed subclinical rejection. Use of recent BANFF classification and scoring system enables more precise diagnosis and subsequently different approach to the further treatment of the KTR. More correlative long-term studies including Anti HLA antibodies and Endothelial Cell Activation- Associated Transcripts (ENDAT are needed.

  3. The Interface of Clinical Decision-Making With Study Protocols for Knowledge Translation From a Walking Recovery Trial.

    Science.gov (United States)

    Hershberg, Julie A; Rose, Dorian K; Tilson, Julie K; Brutsch, Bettina; Correa, Anita; Gallichio, Joann; McLeod, Molly; Moore, Craig; Wu, Sam; Duncan, Pamela W; Behrman, Andrea L

    2017-01-01

    Despite efforts to translate knowledge into clinical practice, barriers often arise in adapting the strict protocols of a randomized, controlled trial (RCT) to the individual patient. The Locomotor Experience Applied Post-Stroke (LEAPS) RCT demonstrated equal effectiveness of 2 intervention protocols for walking recovery poststroke; both protocols were more effective than usual care physical therapy. The purpose of this article was to provide knowledge-translation tools to facilitate implementation of the LEAPS RCT protocols into clinical practice. Participants from 2 of the trial's intervention arms: (1) early Locomotor Training Program (LTP) and (2) Home Exercise Program (HEP) were chosen for case presentation. The two cases illustrate how the protocols are used in synergy with individual patient presentations and clinical expertise. Decision algorithms and guidelines for progression represent the interface between implementation of an RCT standardized intervention protocol and clinical decision-making. In each case, the participant presents with a distinct clinical challenge that the therapist addresses by integrating the participant's unique presentation with the therapist's expertise while maintaining fidelity to the LEAPS protocol. Both participants progressed through an increasingly challenging intervention despite their own unique presentation. Decision algorithms and exercise progression for the LTP and HEP protocols facilitate translation of the RCT protocol to the real world of clinical practice. The two case examples to facilitate translation of the LEAPS RCT into clinical practice by enhancing understanding of the protocols, their progression, and their application to individual participants.Video Abstract available for more insights from the authors (see Supplemental Digital Content 1, available at: http://links.lww.com/JNPT/A147).

  4. Centralization of politrauma. Study of Ferrara’s reality and simulation of an agreed-upon protocol

    Directory of Open Access Journals (Sweden)

    Luigi Melcarne

    2011-09-01

    Full Text Available In a time in which everybody’s asked a big effort to use hospitals, resources and emergency departments in a rational way, the Centralization – that is sending the right patient to the right hospital at the right time – allows an optimization of the resources and a better management of medical patients. In this study we examined the actual state of Centralization in the city of Ferrara where an experimental protocol of “centralization” has been introduced. This study has the purpose of simulating reality if the protocol had been introduced in the years 2008/2009. The results confirm not only that an important number of patients that were meant to be sent to the CTZ of Ferrara where instead sent to the PST but also that, on the contrary, patients from the suburbs that didn’t require advanced treatments were sent to the Sant’Anna hospital of Ferrara. So if medical literature already points out the advantages of a correct Centralization for patients with polytraumas; the study, based on the reality in Ferrara , shows how the creation of an agreed protocol with the goal to guide health workers at sending polytrauma patients to the right destination , instead of creating an excessive flow th the main hub, can improve the overall organization of health services, with an equal distribution between hub and spoke. When considering First Aid not always speed and rapidity guarantee survival; this is so much more real in the case of patients with polytrauma, where quality of cures assumes more importance than time.

  5. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  6. Novel protocol for persister cells isolation.

    Directory of Open Access Journals (Sweden)

    Silvia J Cañas-Duarte

    Full Text Available Bacterial persistence, where a fraction of a population presents a transient resistance to bactericidal substances, has great medical importance due to its relation with the appearance of antibiotic resistances and untreatable bacterial chronic infections. The mechanisms behind this phenomenon remain largely unknown in spite of recent advances, in great part because of the difficulty in isolating the very small fraction of the population that is in this state at any given time. Current protocols for persister isolation have resulted in possible biases because of the induction of this state by the protocol itself. Here we present a novel protocol that allows rapid isolation of persister cells both from exponential and stationary phase. Moreover, it is capable of differentiating between type I and type II persister cells, which should allow the field to move beyond its current state of studying only one type. While this protocol prompts a revision of many of the current results, it should greatly facilitate further advances in the field.

  7. New View of Ping-Pong Protocol Security

    International Nuclear Information System (INIS)

    Zawadzki Piotr

    2012-01-01

    The ping-pong protocol offers confidential transmission of classic information without a prior key agreement. It is believed that it is quasi secure in lossless quantum channels. Serious doubts related to the analysis paradigm which has been used so far are presented in the study. The security of the protocol is reconsidered. (general)

  8. Two-party quantum key agreement protocols under collective noise channel

    Science.gov (United States)

    Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong

    2018-06-01

    Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.

  9. [Multidisciplinary protocol for computed tomography imaging and angiographic embolization of splenic injury due to trauma: assessment of pre-protocol and post-protocol outcomes].

    Science.gov (United States)

    Koo, M; Sabaté, A; Magalló, P; García, M A; Domínguez, J; de Lama, M E; López, S

    2011-11-01

    To assess conservative treatment of splenic injury due to trauma, following a protocol for computed tomography (CT) and angiographic embolization. To quantify the predictive value of CT for detecting bleeding and need for embolization. The care protocol developed by the multidisciplinary team consisted of angiography with embolization of lesions revealed by contrast extravasation under CT as well as embolization of grade III-V injuries observed, or grade I-II injuries causing hemodynamic instability and/or need for blood transfusion. We collected data on demographic variables, injury severity score (ISS), angiographic findings, and injuries revealed by CT. Pre-protocol and post-protocol outcomes were compared. The sensitivity and specificity of CT findings were calculated for all patients who required angiographic embolization. Forty-four and 30 angiographies were performed in the pre- and post-protocol periods, respectively. The mean (SD) ISSs in the two periods were 25 (11) and 26 (12), respectively. A total of 24 (54%) embolizations were performed in the pre-protocol period and 28 (98%) after implementation of the protocol. Two and 7 embolizations involved the spleen in the 2 periods, respectively; abdominal laparotomies numbered 32 and 25, respectively, and 10 (31%) vs 4 (16%) splenectomies were performed. The specificity and sensitivity values for contrast extravasation found on CT and followed by embolization were 77.7% and 79.5%. The implementation of this multidisciplinary protocol using CT imaging and angiographic embolization led to a decrease in the number of splenectomies. The protocol allows us to take a more conservative treatment approach.

  10. Past and Future of the Kyoto Protocol. Final report

    International Nuclear Information System (INIS)

    Wijen, F.; Zoeteman, K.

    2004-01-01

    The present report reflects findings from a study on the realization of and prospects for the Kyoto Protocol. The purpose of the study was (1) to obtain insights into the factors that enabled the realization of the Kyoto Protocol, in particular the interactions among major parties involved; (2) to assess the future opportunities and threats of the Kyoto Protocol, in particular against the backdrop of an increasingly globalised world. The study was conducted from February up to December 2003 by (a) reviewing the literature, especially publications on the negotiation history of the Kyoto process, the social interactions enabling the realization of the Protocol, analyses of strengths and weaknesses, and future climate regimes; (b) conducting a series of interviews with representatives from government, academia, non-governmental organisations, and business, who have been - directly or indirectly - involved in the Kyoto process; (c) internal discussions,brainstorming and analysing the Protocol's strengths and weaknesses, possible future scenarios (including policy options), and the management of a possible failure of the Kyoto Protocol. The present report reflects and integrates the different sources. The first section deals with the past and the present. It discusses how the Kyoto Protocol could be realized despite the divergent interests, reflects on its architecture, and analyses major strengths and weaknesses. In the second section, we present possible future scenarios. We explore how different combinations of domestic and international commitment provide possible realities that national government may face when crafting climate policy. The third section provides an in-depth analysis of the possible event that the Kyoto Protocol fails. We discuss its definition and policy implications. The final section is reserved for overall conclusions and policy recommendations

  11. Protocol of a Multicenter International Randomized Controlled Manikin Study on Different Protocols of Cardiopulmonary Resuscitation for laypeople (MANI-CPR).

    Science.gov (United States)

    Baldi, Enrico; Contri, Enrico; Burkart, Roman; Borrelli, Paola; Ferraro, Ottavia Eleonora; Tonani, Michela; Cutuli, Amedeo; Bertaia, Daniele; Iozzo, Pasquale; Tinguely, Caroline; Lopez, Daniel; Boldarin, Susi; Deiuri, Claudio; Dénéréaz, Sandrine; Dénéréaz, Yves; Terrapon, Michael; Tami, Christian; Cereda, Cinzia; Somaschini, Alberto; Cornara, Stefano; Cortegiani, Andrea

    2018-04-19

    Out-of-hospital cardiac arrest is one of the leading causes of death in industrialised countries. Survival depends on prompt identification of cardiac arrest and on the quality and timing of cardiopulmonary resuscitation (CPR) and defibrillation. For laypeople, there has been a growing interest on hands-only CPR, meaning continuous chest compression without interruption to perform ventilations. It has been demonstrated that intentional interruptions in hands-only CPR can increase its quality. The aim of this randomised trial is to compare three CPR protocols performed with different intentional interruptions with hands-only CPR. This is a prospective randomised trial performed in eight training centres. Laypeople who passed a basic life support course will be randomised to one of the four CPR protocols in an 8 min simulated cardiac arrest scenario on a manikin: (1) 30 compressions and 2 s pause; (2) 50 compressions and 5 s pause; (3) 100 compressions and 10 s pause; (4) hands-only. The calculated sample size is 552 people. The primary outcome is the percentage of chest compression performed with correct depth evaluated by a computerised feedback system (Laerdal QCPR). ETHICS AND DISSEMINATION: . Due to the nature of the study, we obtained a waiver from the Ethics Committee (IRCCS Policlinico San Matteo, Pavia, Italy). All participants will sign an informed consent form before randomisation. The results of this study will be published in peer-reviewed journal. The data collected will also be made available in a public data repository. NCT02632500. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  12. Study of accent-based music speech protocol development for improving voice problems in stroke patients with mixed dysarthria.

    Science.gov (United States)

    Kim, Soo Ji; Jo, Uiri

    2013-01-01

    Based on the anatomical and functional commonality between singing and speech, various types of musical elements have been employed in music therapy research for speech rehabilitation. This study was to develop an accent-based music speech protocol to address voice problems of stroke patients with mixed dysarthria. Subjects were 6 stroke patients with mixed dysarthria and they received individual music therapy sessions. Each session was conducted for 30 minutes and 12 sessions including pre- and post-test were administered for each patient. For examining the protocol efficacy, the measures of maximum phonation time (MPT), fundamental frequency (F0), average intensity (dB), jitter, shimmer, noise to harmonics ratio (NHR), and diadochokinesis (DDK) were compared between pre and post-test and analyzed with a paired sample t-test. The results showed that the measures of MPT, F0, dB, and sequential motion rates (SMR) were significantly increased after administering the protocol. Also, there were statistically significant differences in the measures of shimmer, and alternating motion rates (AMR) of the syllable /K$\\inve$/ between pre- and post-test. The results indicated that the accent-based music speech protocol may improve speech motor coordination including respiration, phonation, articulation, resonance, and prosody of patients with dysarthria. This suggests the possibility of utilizing the music speech protocol to maximize immediate treatment effects in the course of a long-term treatment for patients with dysarthria.

  13. Energy-Aware RFID Anti-Collision Protocol.

    Science.gov (United States)

    Arjona, Laura; Simon, Hugo Landaluce; Ruiz, Asier Perallos

    2018-06-11

    The growing interest in mobile devices is transforming wireless identification technologies. Mobile and battery-powered Radio Frequency Identification (RFID) readers, such as hand readers and smart phones, are are becoming increasingly attractive. These RFID readers require energy-efficient anti-collision protocols to minimize the tag collisions and to expand the reader's battery life. Furthermore, there is an increasing interest in RFID sensor networks with a growing number of RFID sensor tags. Thus, RFID application developers must be mindful of tag anti-collision protocols. Energy-efficient protocols involve a low reader energy consumption per tag. This work presents a thorough study of the reader energy consumption per tag and analyzes the main factor that affects this metric: the frame size update strategy. Using the conclusion of this analysis, the anti-collision protocol Energy-Aware Slotted Aloha (EASA) is presented to decrease the energy consumption per tag. The frame size update strategy of EASA is configured to minimize the energy consumption per tag. As a result, EASA presents an energy-aware frame. The performance of the proposed protocol is evaluated and compared with several state of the art Aloha-based anti-collision protocols based on the current RFID standard. Simulation results show that EASA, with an average of 15 mJ consumed per tag identified, achieves a 6% average improvement in the energy consumption per tag in relation to the strategies of the comparison.

  14. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  15. A Prospective Pilot Study to Validate the Management Protocol for Patients Presenting with Acute Urinary Retention: A Community-Based, Nonhospitalised Protocol

    Directory of Open Access Journals (Sweden)

    Shyamala S. Gopi

    2006-01-01

    Full Text Available Acute urinary retention (AUR in males is managed conventionally by hospital admission, alpha-adrenergic therapy, and trial without catheter. To reduce inpatient bed pressures, we set up a protocol to manage such patients in the community. We review our results in this paper. We performed a prospective study of male patients presenting to our acute admissions ward and Accident and Emergency department over 6 months. Patients with chronic urinary retention, macroscopic haematuria, sepsis, urinary tract infection, and/or serum creatinine >130 mmol/l were excluded from the study. Those enrolled were catheterised, commenced on alfuzosin (10 mg nocte, and discharged to the community. A trial without catheter (TWOC was performed 5—7 days later. QoL/IPSS, peak flow rate, and residual volume assessment were performed following successful TWOC 3 months later.Thirty-one male patients with a median age of 69 years were studied and the median residual volume following catheterisation was 900 ml. The aetiology of AUR was benign prostatic hyperplasia (BPH in 29 patients and constipation in the remaining 2 patients. TWOC was successful in 19 patients (61.3% following first TWOC, 26 (83.9% following second trial of voiding. The mean peak flow rate was 6.5 ml/sec and postvoid scan 165 ml, following an immediate TWOC. At 3 months follow-up, mean peak flow rate was 13.2 ml/sec, postvoid scan 26.5 ml, IPSS 4.5, and QoL score was 2. This study has shown that AUR can be managed safely and effectively in the community. Effective communication with the nurse urology specialist, general practitioner, and emergency department are crucial for the successful implementation of the protocol.

  16. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  17. Towards designing energy-efficient routing protocol for wireless mesh networks

    CSIR Research Space (South Africa)

    Dludla, AG

    2009-08-01

    Full Text Available Different studies have proposed number of routing protocols to overcome data transmission challenges. Very few of these protocols consider node energy. In this study, the state of art work from various studies is reviewed and compared based...

  18. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  19. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2015-02-24

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  20. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal; Tammam, Amr; Alouini, Mohamed-Slim; Aissa, Sonia

    2015-01-01

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  1. Hydrogen peroxide bleaching induces changes in the physical properties of dental restorative materials: Effects of study protocols.

    Science.gov (United States)

    Yu, Hao; Zhang, Chang-Yuan; Wang, Yi-Ning; Cheng, Hui

    2018-03-01

    The purpose of this study was to evaluate the influence of study protocols on the effects of bleaching on the surface roughness, substance loss, flexural strength (FS), flexural modulus (FM), Weibull parameters, and color of 7 restorative materials. The test materials included 4 composite resins, 1 glass-ionomer cement, 1 dental ceramic, and 1 polyacid-modified composite. The specimens were randomly divided into 4 groups (n = 20) according to different study protocols: a bleaching group at 25°C (group 25B), a bleaching group at 37°C (group 37B), a control group at 25°C (group 25C), and a control group at 37°C (group 37C). The specimens in the bleaching group were treated with 40% hydrogen peroxide for 80 min at the respective environmental temperatures. The surface roughness, substance loss, FS, FM, and color of the specimens were measured before and after treatment. FS data were also subjected to Weibull analysis, which was used to estimate of the Weibull modulus (m) and the characteristic strength (σ 0 ). Surface roughness increased and significant color changes were observed for all tested specimens after bleaching treatment, except for the ceramic. After bleaching at 37°C, the polyacid-modified composite showed significantly reduced FS, FM, m, and σ 0 values in comparison to the control specimens stored at 37°C in whole saliva. Significant differences were also found between the 37B and 25B polyacid-modified composite groups in terms of surface roughness, FS, m, σ 0 , and color changes. Varying effects of bleaching on the physical properties of dental restorative materials were observed, and the influences of the study protocols on bleaching effects were found to be material-dependent. The influence of study protocols on the effects of bleaching on the surface roughness, flexural properties, and color of dental restorative materials are material-dependent and should be considered when evaluating the effects of bleaching on dental restorative

  2. A systematic review of protocol studies on conceptual design cognition: design as search and exploration

    OpenAIRE

    Hay, Laura; Duffy, Alex H.B.; McTeague, Chris; Pidgeon, Laura M.; Vuletic, Tijana; Grealy, Madeleine

    2017-01-01

    This paper reports findings from the first systematic review of protocol studies focusing specifically on conceptual design cognition, aiming to answer the following research question: What is our current understanding of the cognitive processes involved in conceptual design tasks carried out by individual designers? We reviewed 47 studies on architectural design, engineering design and product design engineering. This paper reports 24 cognitive processes investigated in a subset of 33 studie...

  3. Abdominal stab wound protocol: prospective study documents applicability for widespread use.

    Science.gov (United States)

    Rosemurgy, A S; Albrink, M H; Olson, S M; Sherman, H; Albertini, J; Kramer, R; Camps, M; Reiss, A

    1995-02-01

    Traditionally, stab wounds violating the abdominal wall fascia led to exploratory celiotomy that was often nontherapeutic. In an attempt to limit the number of nontherapeutic celiotomies (NTC), we devised a protocol to prospectively study stab wounds violating the anterior abdominal wall fascia. Through protocol, abdominal stab wounds were explored in stable adults. If the anterior fascia was violated, paracentesis and, if necessary, peritoneal lavage was undertaken in the absence of previous abdominal surgery. If evisceration was noted, it was reduced and the patient lavaged. Fascial penetration was noted in 72 patients. 46 patients underwent celiotomy: because of shock/peritonitis in 8 (2 NTC), fascial penetration with a history of previous celiotomy in 7 (5 NTC), positive paracentesis in 20 (5 NTC), or positive lavage in 10 (4 NTC). One patient underwent late celiotomy without ill-effect after a negative lavage because she subsequently developed fever and localized peritonitis (ice pick injury to cecum). Eleven patients had evisceration; nine underwent celiotomy. Patients with abdominal stab wounds can be selectively managed safely. More than one-third with fascial penetration, some with evisceration, avoided exploration. Only one patient underwent delayed celiotomy and did so without detriment. Nontherapeutic celiotomy rates were highest in patients with previous abdominal surgery who, thereby, could not undergo paracentesis/lavage; excluding these patients, the nontherapeutic celiotomy rate was 17% (11/65) for those with fascial penetration.

  4. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  5. Clinical outcomes and mortality before and after implementation of a pediatric sepsis protocol in a limited resource setting: A retrospective cohort study in Bangladesh.

    Directory of Open Access Journals (Sweden)

    Teresa Bleakly Kortz

    Full Text Available Pediatric sepsis has a high mortality rate in limited resource settings. Sepsis protocols have been shown to be a cost-effective strategy to improve morbidity and mortality in a variety of populations and settings. At Dhaka Hospital in Bangladesh, mortality from pediatric sepsis in high-risk children previously approached 60%, which prompted the implementation of an evidenced-based protocol in 2010. The clinical effectiveness of this protocol had not been measured. We hypothesized that implementation of a pediatric sepsis protocol improved clinical outcomes, including reducing mortality and length of hospital stay.This was a retrospective cohort study of children 1-59 months old with a diagnosis of sepsis, severe sepsis or septic shock admitted to Dhaka Hospital from 10/25/2009-10/25/2011. The primary outcome was inpatient mortality pre- and post-protocol implementation. Secondary outcomes included fluid overload, heart failure, respiratory insufficiency, length of hospital stay, and protocol compliance, as measured by antibiotic and fluid bolus administration within 60 minutes of hospital presentation.404 patients were identified by a key-word search of the electronic medical record; 328 patients with a primary diagnosis of sepsis, severe sepsis, or septic shock were included (143 pre- and185 post-protocol in the analysis. Pre- and post-protocol mortality were similar and not statistically significant (32.17% vs. 34.59%, p = 0.72. The adjusted odds ratio (AOR for post-protocol mortality was 1.55 (95% CI, 0.88-2.71. The odds for developing fluid overload were significantly higher post-protocol (AOR 3.45, 95% CI, 2.04-5.85, as were the odds of developing heart failure (AOR 4.52, 95% CI, 1.43-14.29 and having a longer median length of stay (AOR 1.81, 95% CI 1.10-2.96. There was no statistically significant difference in respiratory insufficiency (pre- 65.7% vs. post- 70.3%, p = 0.4 or antibiotic administration between the cohorts (pre- 16.08% vs

  6. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    Science.gov (United States)

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  7. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  8. Efficiency of different protocols for enamel clean-up after bracket debonding: an in vitro study

    Directory of Open Access Journals (Sweden)

    Lara Carvalho Freitas Sigilião

    2015-10-01

    Full Text Available Objective: This study aimed to assess the efficiency of six protocols for cleaning-up tooth enamel after bracket debonding.Methods:A total of 60 premolars were divided into six groups, according to the tools used for clean-up: 12-blade bur at low speed (G12L, 12-blade bur at high speed (G12H, 30-blade bur at low speed (G30L, DU10CO ORTHO polisher (GDU, Renew System (GR and Diagloss polisher (GD. Mean roughness (Ra and mean roughness depth (Rz of enamel surface were analyzed with a profilometer. Paired t-test was used to assess Ra and Rz before and after enamel clean-up. ANOVA/Tukey tests were used for intergroup comparison. The duration of removal procedures was recorded. The association between time and variation in enamel roughness (∆Ra, ∆Rz were evaluated by Pearson's correlation test. Enamel topography was assessed by scanning electron microscopy (SEM.Results:In Groups G12L and G12H, original enamel roughness did not change significantly. In Groups G30L, GDU, GR and GD, a smoother surface (p < 0.05 was found after clean-up. In Groups G30L and GD, the protocols used were more time-consuming than those used in the other groups. Negative and moderate correlation was observed between time and (∆Ra, ∆Rz; Ra and (∆Ra, ∆Rz; Rz (r = - 0.445, r = - 0.475, p < 0.01.Conclusion:All enamel clean-up protocols were efficient because they did not result in increased surface roughness. The longer the time spent performing the protocol, the lower the surface roughness.

  9. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  10. Accessibility in Public Buildings: Efficiency of Checklist Protocols.

    Science.gov (United States)

    Andersson, Jonas E; Skehan, Terry

    2016-01-01

    In Sweden, governmental agencies and bodies are required to implement a higher level of accessibility in their buildings than that stipulated by the National Building and Planning Act (PBL). The Swedish Agency for Participation (MFD, Myndigheten för delaktighet) develops holistic guidelines in order to conceptualize this higher level of accessibility. In conjunction to these guidelines, various checklist protocols have been produced. The present study focuses on the efficiency of such checklist protocols. The study revolved around the use of a checklist protocol in assessments of two buildings in Stockholm: the new head office for the National Authority for Social Insurances (ASI) and the School of Architecture at the Royal Institute of Technology (KTH). The study included three groups: Group 1 and Group 2 consisted of 50 real estate managers employed by the ASI, while Group 3 consisted of three participants in a course at the KTH. The results were similar in all of the groups. The use of the checklist protocol generated queries, which related mainly to two factors: (1) the accompanying factsheet consisted of textual explanations with no drawings, photographs or illustrations and (2) the order of the questions in the checklist protocol was difficult to correlate with the two buildings' spatial logic of accessing, egressing and making use of the built space.

  11. Assessing the Efficacy of an App-Based Method of Family Planning: The Dot Study Protocol.

    Science.gov (United States)

    Simmons, Rebecca G; Shattuck, Dominick C; Jennings, Victoria H

    2017-01-18

    assess pregnancy status over time. This paper outlines the protocol for this efficacy trial, following the Standard Protocol Items: Recommendations for Intervention Trials checklist, to provide an overview of the rationale, methodology, and analysis plan. Participants will be asked to provide daily sexual history data and periodically answer surveys administered through a call center or directly on their phone. Funding for the study was provided in 2013 under the United States Agency for International Development Fertility Awareness for Community Transformation project. Recruitment for the study will begin in January of 2017. The study is expected to last approximately 18 months, depending on recruitment. Findings on the study's primary outcomes are expected to be finalized by September 2018. Reproducibility and transparency, important aspects of all research, are particularly critical in developing new approaches to research design. This protocol outlines the first study to prospectively test both the efficacy (correct use) and effectiveness (actual use) of a pregnancy prevention app. This protocol and the processes it describes reflect the dynamic integration of mobile technologies, a call center, and Health Insurance Portability and Accountability Act-compliant study procedures. Future fertility app studies can build on our approaches to develop methodologies that can contribute to the evidence base around app-based methods of contraception. ClinicalTrials.gov NCT02833922; https://clinicaltrials.gov/ct2/show/NCT02833922 (Archived be WebCite at http://www.webcitation.org/6nDkr0e76). ©Rebecca G Simmons, Dominick C Shattuck, Victoria H Jennings. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 18.01.2017.

  12. Comparative study of 2 oral care protocols in intensive care units.

    Science.gov (United States)

    Ory, Jérôme; Raybaud, Evelyne; Chabanne, Russell; Cosserant, Bernard; Faure, Jean Sébastien; Guérin, Renaud; Calvet, Laure; Pereira, Bruno; Mourgues, Charline; Guelon, Dominique; Traore, Ousmane

    2017-03-01

    The quality of oral care is important in limiting the emergence of ventilator-associated pneumonia (VAP) in intubated patients. Our main objective was to measure the quality improvement in oral care following the implementation of a new oral care protocol. We also monitored VAP rates. This was a cohort study of patients in 5 adult ICUs covering different specialties. During period 1, caregivers used a foam stick for oral care and during period 2 a stick and tooth brushing with aspiration. Oral chlorhexidine was used during both periods. The caregivers rated improvement in oral health on the basis of 4 criteria (tongue, mucous membranes, gingivae, and teeth). Caregiver satisfaction was also assessed. The incidence of VAP was monitored. A total of 2,030 intubated patients admitted to intensive care units benefited from oral care. The patient populations during the 2 periods were similar with regard to demographic data and VAP potential risk factors. Oral health was significantly better from the third day of oral care in period 2 onward (period 1, 6.4 ± 2.1; period 2, 5.6 ± 1.8; P = .043). Caregivers found the period 2 protocol easier to implement and more effective. VAP rates decreased significantly between the 2 periods (period 1, 12.8%; period 2, 8.5%; P = .002). Our study showed that the implementation of a simple strategy improved the quality of oral care of patients in intensive care units, and decreased VAP rates. Copyright © 2017 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  13. Analysis of limiting information characteristics of quantum-cryptography protocols

    International Nuclear Information System (INIS)

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-01

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  14. Multi-centred mixed-methods PEPFAR HIV care & support public health evaluation: study protocol

    Directory of Open Access Journals (Sweden)

    Fayers Peter

    2010-09-01

    Full Text Available Abstract Background A public health response is essential to meet the multidimensional needs of patients and families affected by HIV disease in sub-Saharan Africa. In order to appraise curret provision of HIV care and support in East Africa, and to provide evidence-based direction to future care programming, and Public Health Evaluation was commissioned by the PEPFAR programme of the US Government. Methods/Design This paper described the 2-Phase international mixed methods study protocol utilising longitudinal outcome measurement, surveys, patient and family qualitative interviews and focus groups, staff qualitative interviews, health economics and document analysis. Aim 1 To describe the nature and scope of HIV care and support in two African countries, including the types of facilities available, clients seen, and availability of specific components of care [Study Phase 1]. Aim 2 To determine patient health outcomes over time and principle cost drivers [Study Phase 2]. The study objectives are as follows. 1 To undertake a cross-sectional survey of service configuration and activity by sampling 10% of the facilities being funded by PEPFAR to provide HIV care and support in Kenya and Uganda (Phase 1 in order to describe care currently provided, including pharmacy drug reviews to determine availability and supply of essential drugs in HIV management. 2 To conduct patient focus group discussions at each of these (Phase 1 to determine care received. 3 To undertake a longitudinal prospective study of 1200 patients who are newly diagnosed with HIV or patients with HIV who present with a new problem attending PEPFAR care and support services. Data collection includes self-reported quality of life, core palliative outcomes and components of care received (Phase 2. 4 To conduct qualitative interviews with staff, patients and carers in order to explore and understand service issues and care provision in more depth (Phase 2. 5 To undertake document

  15. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    OpenAIRE

    RIBEIRO, CHRISTIE GRAF; MOREIRA, ANA TEREZA RAMOS; PINTO, JOSÉ SIMÃO DE PAULA; MALAFAIA, OSVALDO

    2016-01-01

    ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c)). Methods: this is a descriptive study, with the methodology divided into three phases: (1) development of a theoretical ophthalmologic database with emphasis on strabismus; (2) compute...

  16. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  17. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  18. Energy-efficient TDMA medium access control protocol scheduling

    NARCIS (Netherlands)

    Havinga, Paul J.M.; Smit, Gerard J.M.

    2000-01-01

    In this paper we study the energy efficiency and channel efficiency of TDMA MAC protocol scheduling mechanisms. Most MAC protocols are based on phase grouping that basically has three phases in a frame: uplink, downlink and reservation. We propose a new mechanism in which we have multiple uplink and

  19. Characterisation of exposure to non-ionising electromagnetic fields in the Spanish INMA birth cohort: Study protocol

    NARCIS (Netherlands)

    M. Gallastegi (Mara); M. Guxens Junyent (Mònica); A. Jiménez-Zabala (Ana); I. Calvente (Irene); M. Fernández (Marta); L. Birks (Laura); B. Struchen (Benjamin); M. Vrijheid (Martine); M. Estarlich (Marisa); M.F. Fernandez (Mariana); M. Torrent (Maties); F. Ballester (Ferran); J.J. Aurrekoetxea (Juan José); J. Ibarluzea (Jesús); D. Guerra (David); J. González (Julián); M. Röösli (Martin); L. Santa-Marina (Loreto)

    2016-01-01

    textabstractBackground: Analysis of the association between exposure to electromagnetic fields of non-ionising radiation (EMF-NIR) and health in children and adolescents is hindered by the limited availability of data, mainly due to the difficulties on the exposure assessment. This study protocol

  20. An Experimental Protocol for Maternal Pulmonary Exposure in Developmental Toxicology

    DEFF Research Database (Denmark)

    Jackson, Petra; Lund, Søren P.; Kristiansen, Gitte

    2011-01-01

    To establish a protocol for studying effects of pulmonary exposure in developmental toxicity studies, the effects of intratracheal sham instillation under short-term isoflurane anaesthesia were evaluated with a protocol including multiple instillations during gestation. Twelve time-mated mice (C5...

  1. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  2. The Protocol of Choice for Treatment of Snake Bite

    Directory of Open Access Journals (Sweden)

    Afshin Mohammad Alizadeh

    2016-01-01

    Full Text Available The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF, and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89% were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS. Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values.

  3. Optimised low-dose multidetector CT protocol for children with cranial deformity

    Energy Technology Data Exchange (ETDEWEB)

    Vazquez, Jose Luis [Complejo Hospitalario Universitario de Vigo, Department of Radiology, Vigo, Pontevedra (Spain); Pombar, Miguel Angel [Complejo Hospitalario Universitario de Santiago, Department of Radiophysics, Santiago de Compostela, La Coruna (Spain); Pumar, Jose Manuel [Complejo Hospitalario Universitario de Santiago, Department of Radiology, Santiago de Compostela, La Coruna (Spain); Campo, Victor Miguel del [Complejo Hospitalario Universitario de Vigo, Department of Public Health, Vigo, Pontevedra (Spain)

    2013-08-15

    To present an optimised low-dose multidetector computed tomography (MDCT) protocol for the study of children with cranial deformity. Ninety-one consecutive MDCT studies were performed in 80 children. Studies were performed with either our standard head CT protocol (group 1, n = 20) or a low-dose cranial deformity protocol (groups 2 and 3). Group 2 (n = 38), initial, and group 3 (n = 33), final and more optimised. All studies were performed in the same 64-MDCT equipment. Cranial deformity protocol was gradationally optimised decreasing kVp, limiting mA range, using automatic exposure control (AEC) and increasing the noise index (NI). Image quality was assessed. Dose indicators such us CT dose index volume (CTDIvol), dose-length product (DLP) and effective dose (E) were used. The optimised low-dose protocol reached the following values: 80 kVp, mA range: 50-150 and NI = 23. We achieved a maximum dose reduction of 10-22 times in the 1- to 12-month-old cranium in regard to the 2004 European guidelines for MDCT. A low-dose MDCT protocol that may be used as the first diagnostic imaging option in clinically selected patients with skull abnormalities. (orig.)

  4. Experimental Evaluation of Simulation Abstractions for Wireless Sensor Network MAC Protocols

    Directory of Open Access Journals (Sweden)

    G. P. Halkes

    2010-01-01

    Full Text Available The evaluation of MAC protocols for Wireless Sensor Networks (WSNs is often performed through simulation. These simulations necessarily abstract away from reality in many ways. However, the impact of these abstractions on the results of the simulations has received only limited attention. Moreover, many studies on the accuracy of simulation have studied either the physical layer and per link effects or routing protocol effects. To the best of our knowledge, no other work has focused on the study of the simulation abstractions with respect to MAC protocol performance. In this paper, we present the results of an experimental study of two often used abstractions in the simulation of WSN MAC protocols. We show that a simple SNR-based reception model can provide quite accurate results for metrics commonly used to evaluate MAC protocols. Furthermore, we provide an analysis of what the main sources of deviation are and thereby how the simulations can be improved to provide even better results.

  5. Quantitative methods for studying design protocols

    CERN Document Server

    Kan, Jeff WT

    2017-01-01

    This book is aimed at researchers and students who would like to engage in and deepen their understanding of design cognition research. The book presents new approaches for analyzing design thinking and proposes methods of measuring design processes. These methods seek to quantify design issues and design processes that are defined based on notions from the Function-Behavior-Structure (FBS) design ontology and from linkography. A linkograph is a network of linked design moves or segments. FBS ontology concepts have been used in both design theory and design thinking research and have yielded numerous results. Linkography is one of the most influential and elegant design cognition research methods. In this book Kan and Gero provide novel and state-of-the-art methods of analyzing design protocols that offer insights into design cognition by integrating segmentation with linkography by assigning FBS-based codes to design moves or segments and treating links as FBS transformation processes. They propose and test ...

  6. Application of the Putting Women First protocol in a study on violence against immigrant women in Spain.

    Science.gov (United States)

    Torrubiano-Domínguez, Jordi; Vives-Cases, Carmen

    2013-01-01

    In this paper, we describe our experience of using the Putting Women First protocol in the design and implementation of a cross-sectional study on violence against women (VAW) among 1607 immigrant women from Morocco, Ecuador and Romania living in Spain in 2011. The Putting Women First protocol is an ethical guideline for VAW research, which includes recommendations to ensure the safety of the women involved in studies on this subject. The response rate in this study was 59.3%. The prevalence of VAW cases last year was 11.7%, of which 15.6% corresponded to Ecuadorian women, 10.9% to Moroccan women and 8.6% to Romanian women. We consider that the most important goal for future research is the use of VAW scales validated in different languages, which would help to overcome the language barriers encountered in this study. Copyright © 2012 SESPAS. Published by Elsevier Espana. All rights reserved.

  7. Benchmarking pediatric cranial CT protocols using a dose tracking software system: a multicenter study.

    Science.gov (United States)

    De Bondt, Timo; Mulkens, Tom; Zanca, Federica; Pyfferoen, Lotte; Casselman, Jan W; Parizel, Paul M

    2017-02-01

    To benchmark regional standard practice for paediatric cranial CT-procedures in terms of radiation dose and acquisition parameters. Paediatric cranial CT-data were retrospectively collected during a 1-year period, in 3 different hospitals of the same country. A dose tracking system was used to automatically gather information. Dose (CTDI and DLP), scan length, amount of retakes and demographic data were stratified by age and clinical indication; appropriate use of child-specific protocols was assessed. In total, 296 paediatric cranial CT-procedures were collected. Although the median dose of each hospital was below national and international diagnostic reference level (DRL) for all age categories, statistically significant (p-value benchmarking showed that further dose optimization and standardization is possible by using age-stratified protocols for paediatric cranial CT. Moreover, having a dose tracking system revealed that adult protocols are still applied for paediatric CT, a practice that must be avoided. • Significant differences were observed in the delivered dose between age-groups and hospitals. • Using age-adapted scanning protocols gives a nearly linear dose increase. • Sharing dose-data can be a trigger for hospitals to reduce dose levels.

  8. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  9. Better movers and thinkers (BMT: A quasi-experimental study into the impact of physical education on children's cognition—A study protocol

    Directory of Open Access Journals (Sweden)

    Andrew Dalziell

    2015-01-01

    This protocol provides the details of the rationale and design of the study and details of the intervention, outcome measures, and the recruitment process. The study will address gaps within current research by evaluating if a change of approach in the delivery of PE within schools has an effect on children's cognition, PA habits, and GMC within a Scottish setting.

  10. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-04-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  11. Standardized Duplex Ultrasound-Based Protocol for Early Diagnosis of Transplant Renal Artery Stenosis: Results of a Single-Institution Retrospective Cohort Study

    Directory of Open Access Journals (Sweden)

    Vincenzo Li Marzi

    2018-01-01

    Full Text Available Transplant renal artery stenosis (TRAS is the most frequent vascular complication after kidney transplantation (KT and has been associated with potentially reversible refractory hypertension, graft dysfunction, and reduced patient survival. The aim of the study is to describe the outcomes of a standardized Duplex Ultrasound- (DU- based screening protocol for early diagnosis of TRAS and for selection of patients potentially requiring endovascular intervention. We retrospectively reviewed our prospectively collected database of KT from January 1998 to select patients diagnosed with TRAS. The follow-up protocol was based on a risk-adapted, dynamic subdivision of eligible KT patients in different risk categories (RC with different protocol strategies (PS. Of 598 patients included in the study, 52 (9% patients had hemodynamically significant TRAS and underwent percutaneous angioplasty (PTA and stent placement. Technical and clinical success rates were 97% and 90%, respectively. 7 cases of restenosis were recorded at follow-up and treated with re-PTA plus stenting. Both DU imaging and clinical parameters improved after stent placement. Prospective high-quality studies are needed to test the efficacy and safety of our protocol in larger series. Accurate trial design and standardized reporting of patient outcomes will be key to address the current clinical needs.

  12. Effects of a dynamic balance training protocol on podalic support in older women. Pilot Study.

    Science.gov (United States)

    Battaglia, Giuseppe; Bellafiore, Marianna; Bianco, Antonino; Paoli, Antonio; Palma, Antonio

    2010-01-01

    The foot provides the only direct contact with supporting surfaces and therefore plays an important role in all postural tasks. Changes in the musculoskeletal and neurological characteristics of the foot with advancing age can alter plantar loading patterns and postural balance. Several studies have reported that exercise training improves postural performance in elderly individuals. The aim of our study was to investigate the effectiveness of a dynamic balance training protocol performed for 5 weeks on the support surface, percentage distribution of load in both feet, and body balance performance in healthy elderly women. Ten subjects (68.67±5.50 yrs old; 28.17±3.35 BMI) were evaluated with a monopodalic performance test and baropodometric analyses before and after the training period. We found a significant improvement in balance unipedal performance times on left and right foot by 20.18% and 26.23% respectively (p0.05). The increased support surface and equal redistribution of body weight on both feet obtained in response to our training protocol may be postural adaptations sufficient to improve static balance in elderly women.

  13. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  14. Analysing Password Protocol Security Against Off-line Dictionary Attacks

    NARCIS (Netherlands)

    Corin, R.J.; Doumen, J.M.; Etalle, Sandro; Busi, Nadia; Gorrieri, Roberto; Martinelli, Fabio

    We study the security of password protocols against off-line dictionary attacks. In addition to the standard adversary abilities, we also consider further cryptographic advantages given to the adversary when considering the password protocol being instantiated with particular encryption schemes. We

  15. Protocol dependence of mechanical properties in granular systems.

    Science.gov (United States)

    Inagaki, S; Otsuki, M; Sasa, S

    2011-11-01

    We study the protocol dependence of the mechanical properties of granular media by means of computer simulations. We control a protocol of realizing disk packings in a systematic manner. In 2D, by keeping material properties of the constituents identical, we carry out compaction with various strain rates. The disk packings exhibit the strain rate dependence of the critical packing fraction above which the pressure becomes non-zero. The observed behavior contrasts with the well-studied jamming transitions for frictionless disk packings. We also observe that the elastic moduli of the disk packings depend on the strain rate logarithmically. Our results suggest that there exists a time-dependent state variable to describe macroscopic material properties of disk packings, which depend on its protocol.

  16. Shoulder muscle endurance: the development of a standardized and reliable protocol

    Directory of Open Access Journals (Sweden)

    Roy Jean-Sébastien

    2011-01-01

    Full Text Available Abstract Background Shoulder muscle fatigue has been proposed as a possible link to explain the association between repetitive arm use and the development of rotator cuff disorders. To our knowledge, no standardized clinical endurance protocol has been developed to evaluate the effects of muscle fatigue on shoulder function. Such a test could improve clinical examination of individuals with shoulder disorders. Therefore, the purpose of this study was to establish a reliable protocol for objective assessment of shoulder muscle endurance. Methods An endurance protocol was developed on a stationary dynamometer (Biodex System 3. The endurance protocol was performed in isotonic mode with the resistance set at 50% of each subject's peak torque as measured for shoulder external (ER and internal rotation (IR. Each subject performed 60 continuous repetitions of IR/ER rotation. The endurance protocol was performed by 36 healthy individuals on two separate occasions at least two days apart. Maximal isometric shoulder strength tests were performed before and after the fatigue protocol to evaluate the effects of the endurance protocol and its reliability. Paired t-tests were used to evaluate the reduction in shoulder strength due to the protocol, while intraclass correlation coefficients (ICC and minimal detectable change (MDC were used to evaluate its reliability. Results Maximal isometric strength was significantly decreased after the endurance protocol (P 0.84. Conclusions Changes in muscular performance observed during and after the muscular endurance protocol suggests that the protocol did result in muscular fatigue. Furthermore, this study established that the resultant effects of fatigue of the proposed isotonic protocol were reproducible over time. The protocol was performed without difficulty by all volunteers and took less than 10 minutes to perform, suggesting that it might be feasible for clinical practice. This protocol could be used to induce

  17. Protocol-based care: the standardisation of decision-making?

    Science.gov (United States)

    Rycroft-Malone, Jo; Fontenla, Marina; Seers, Kate; Bick, Debra

    2009-05-01

    To explore how protocol-based care affects clinical decision-making. In the context of evidence-based practice, protocol-based care is a mechanism for facilitating the standardisation of care and streamlining decision-making through rationalising the information with which to make judgements and ultimately decisions. However, whether protocol-based care does, in the reality of practice, standardise decision-making is unknown. This paper reports on a study that explored the impact of protocol-based care on nurses' decision-making. Theoretically informed by realistic evaluation and the promoting action on research implementation in health services framework, a case study design using ethnographic methods was used. Two sites were purposively sampled; a diabetic and endocrine unit and a cardiac medical unit. Within each site, data collection included observation, postobservation semi-structured interviews with staff and patients, field notes, feedback sessions and document review. Data were inductively and thematically analysed. Decisions made by nurses in both sites were varied according to many different and interacting factors. While several standardised care approaches were available for use, in reality, a variety of information sources informed decision-making. The primary approach to knowledge exchange and acquisition was person-to-person; decision-making was a social activity. Rarely were standardised care approaches obviously referred to; nurses described following a mental flowchart, not necessarily linked to a particular guideline or protocol. When standardised care approaches were used, it was reported that they were used flexibly and particularised. While the logic of protocol-based care is algorithmic, in the reality of clinical practice, other sources of information supported nurses' decision-making process. This has significant implications for the political goal of standardisation. The successful implementation and judicious use of tools such as

  18. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    International Nuclear Information System (INIS)

    Van Atta, Angela J.; Baskin, Henry J.; Maves, Connie K.; Dansie, David M.; Rollins, Michael D.; Bolte, Robert G.; Mundorff, Michael B.; Andrews, Seth P.

    2015-01-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  19. Implementing an ultrasound-based protocol for diagnosingappendicitis while maintaining diagnostic accuracy

    Energy Technology Data Exchange (ETDEWEB)

    Van Atta, Angela J. [University of Utah School of Medicine, Salt Lake City, UT (United States); Baskin, Henry J.; Maves, Connie K.; Dansie, David M. [Primary Children' s Hospital, Department of Radiology, Salt Lake City, UT (United States); Rollins, Michael D. [University of Utah School of Medicine, Department of Surgery, Division of Pediatric Surgery, Salt Lake City, UT (United States); Bolte, Robert G. [University of Utah School of Medicine, Department of Pediatrics, Division of Pediatric Emergency Medicine, Salt Lake City, UT (United States); Mundorff, Michael B.; Andrews, Seth P. [Primary Children' s Hospital, Systems Improvement, Salt Lake City, UT (United States)

    2015-05-01

    The use of ultrasound to diagnose appendicitis in children is well-documented but not universally employed outside of pediatric academic centers, especially in the United States. Various obstacles make it difficult for institutions and radiologists to abandon a successful and accurate CT-based imaging protocol in favor of a US-based protocol. To describe how we overcame barriers to implementing a US-based appendicitis protocol among a large group of nonacademic private-practice pediatric radiologists while maintaining diagnostic accuracy and decreasing medical costs. A multidisciplinary team of physicians (pediatric surgery, pediatric emergency medicine and pediatric radiology) approved an imaging protocol using US as the primary modality to evaluate suspected appendicitis with CT for equivocal cases. The protocol addressed potential bias against US and accommodated for institutional limitations of radiologist and sonographer experience and availability. Radiologists coded US reports according to the probability of appendicitis. Radiology reports were compared with clinical outcomes to assess diagnostic accuracy. During the study period, physicians from each group were apprised of the interim US protocol accuracy results. Problematic cases were discussed openly. A total of 512 children were enrolled and underwent US for evaluation of appendicitis over a 30-month period. Diagnostic accuracy was comparable to published results for combined US/CT protocols. Comparing the first 12 months to the last 12 months of the study period, the proportion of children achieving an unequivocal US result increased from 30% (51/169) to 53% (149/282) and the proportion of children undergoing surgery based solely on US findings increased from 55% (23/42) to 84% (92/109). Overall, 63% (325/512) of patients in the protocol did not require a CT. Total patient costs were reduced by $30,182 annually. We overcame several barriers to implementing a US protocol. During the study period our

  20. SU-F-207-16: CT Protocols Optimization Using Model Observer

    International Nuclear Information System (INIS)

    Tseng, H; Fan, J; Kupinski, M

    2015-01-01

    Purpose: To quantitatively evaluate the performance of different CT protocols using task-based measures of image quality. This work studies the task of size and the contrast estimation of different iodine concentration rods inserted in head- and body-sized phantoms using different imaging protocols. These protocols are designed to have the same dose level (CTDIvol) but using different X-ray tube voltage settings (kVp). Methods: Different concentrations of iodine objects inserted in a head size phantom and a body size phantom are imaged on a 64-slice commercial CT scanner. Scanning protocols with various tube voltages (80, 100, and 120 kVp) and current settings are selected, which output the same absorbed dose level (CTDIvol). Because the phantom design (size of the iodine objects, the air gap between the inserted objects and the phantom) is not ideal for a model observer study, the acquired CT images are used to generate simulation images with four different sizes and five different contracts iodine objects. For each type of the objects, 500 images (100 x 100 pixels) are generated for the observer study. The observer selected in this study is the channelized scanning linear observer which could be applied to estimate the size and the contrast. The figure of merit used is the correct estimation ratio. The mean and the variance are estimated by the shuffle method. Results: The results indicate that the protocols with 100 kVp tube voltage setting provides the best performance for iodine insert size and contrast estimation for both head and body phantom cases. Conclusion: This work presents a practical and robust quantitative approach using channelized scanning linear observer to study contrast and size estimation performance from different CT protocols. Different protocols at same CTDIvol setting could Result in different image quality performance. The relationship between the absorbed dose and the diagnostic image quality is not linear

  1. SU-F-207-16: CT Protocols Optimization Using Model Observer

    Energy Technology Data Exchange (ETDEWEB)

    Tseng, H [University of Arizona, Tucson, AZ (United States); Fan, J [CT Systems Engineering, GE Healthcare, Waukesha, Wisconsin (United States); Kupinski, M [Univ Arizona, Tucson, AZ (United States)

    2015-06-15

    Purpose: To quantitatively evaluate the performance of different CT protocols using task-based measures of image quality. This work studies the task of size and the contrast estimation of different iodine concentration rods inserted in head- and body-sized phantoms using different imaging protocols. These protocols are designed to have the same dose level (CTDIvol) but using different X-ray tube voltage settings (kVp). Methods: Different concentrations of iodine objects inserted in a head size phantom and a body size phantom are imaged on a 64-slice commercial CT scanner. Scanning protocols with various tube voltages (80, 100, and 120 kVp) and current settings are selected, which output the same absorbed dose level (CTDIvol). Because the phantom design (size of the iodine objects, the air gap between the inserted objects and the phantom) is not ideal for a model observer study, the acquired CT images are used to generate simulation images with four different sizes and five different contracts iodine objects. For each type of the objects, 500 images (100 x 100 pixels) are generated for the observer study. The observer selected in this study is the channelized scanning linear observer which could be applied to estimate the size and the contrast. The figure of merit used is the correct estimation ratio. The mean and the variance are estimated by the shuffle method. Results: The results indicate that the protocols with 100 kVp tube voltage setting provides the best performance for iodine insert size and contrast estimation for both head and body phantom cases. Conclusion: This work presents a practical and robust quantitative approach using channelized scanning linear observer to study contrast and size estimation performance from different CT protocols. Different protocols at same CTDIvol setting could Result in different image quality performance. The relationship between the absorbed dose and the diagnostic image quality is not linear.

  2. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  3. Protocol to monitor trade agreement food-related aspects: the Fiji case study.

    Science.gov (United States)

    Ravuvu, Amerita; Friel, Sharon; Thow, Anne Marie; Snowdon, Wendy; Wate, Jillian

    2017-04-26

    Despite the growing rates of obesity and diet-related non-communicable diseases, globally, public health attention has only relatively recently turned to the links between trade agreements and the nutritional risks associated with it. Specific trade agreements appear to have played an influential role in the volume and types of foods entering different countries, yet there is currently no systematic and objective monitoring of trade agreements for their impacts on food environments. Recently, INFORMAS was set up to monitor and benchmark food environments, government policies and private sector actions within countries and globally. One of its projects/modules focuses on trade policy and in particular the food-related aspects of trade agreements. This paper describes the INFORMAS trade protocol, an approach to collecting food-related information about four domains of trade: trade in goods; trade in services and foreign direct investment; domestic supports, and policy space. Specifically, the protocol is tested in Fiji. The development and testing of this protocol in Fiji represents the first effort to set out a framework and process for objectively monitoring trade agreements and their impacts on national food supply and the wider food environment. It has shown that entry into WTO trade agreements contributed to the nutrition transition in Fiji through the increased availability of imported foods with varying nutritional quality. We observed an increase in imports of both healthy and less healthy foods. The application of the monitoring protocol also highlights challenges for data collection associated with each trade domain that should be considered for future data collection and analysis in other low and middle income countries. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  4. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  5. Protocol d'inicialització de sessió SIP

    OpenAIRE

    Ibrahem Fernández, Samer

    2006-01-01

    Aquest projecte té com a finalitat estudiar el protocol SIP i desenvolupar una aplicació que l'implementi. Este proyecto tiene como finalidad estudiar el protocolo SIP y desarrollar una aplicación que la implemente The purpose of this project is to study the SIP protocol and develop an application that implements it.

  6. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2013-12-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  7. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal; Ismail, Amr; Alouini, Mohamed-Slim; Aï ssa, Sonia

    2013-01-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  8. Improvement of "Novel Multiparty Quantum Key Agreement Protocol with GHZ States"

    Science.gov (United States)

    Gu, Jun; Hwang, Tzonelih

    2017-10-01

    Quantum key agreement (QKA) protocol is a method for negotiating a fair and secure key among mutually untrusted participants. Recently, Xu et al. (Quantum Inf. Process. 13:2587-2594, 2014) proposed a multi-party QKA protocol based on Greenberger-Horne-Zeilinger (GHZ) states. However, this study points out that Xu et al.'s protocol cannot provide the fairness property. That is, the last involved participant in the protocol can manipulate the final shared secret key without being detected by the other participants. Moreover, according to Yu et al.'s research (2015), Xu et al.'s protocol cannot avoid the public discussion attack too. To avoid these weaknesses, an improved QKA protocol is proposed.

  9. Agreements between Industry and Academia on Publication Rights: A Retrospective Study of Protocols and Publications of Randomized Clinical Trials.

    Directory of Open Access Journals (Sweden)

    Benjamin Kasenda

    2016-06-01

    Full Text Available Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i the existence and types of publication agreements in trial protocols, (ii the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii the frequency of co-authorship by industry employees.We used a retrospective cohort of randomized clinical trials (RCTs based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5% mentioned an agreement regarding publication of results. Of these 456, 393 (86.2% documented an industry partner's right to disapprove or at least review proposed manuscripts; 39 (8.6% agreements were without constraints of publication. The remaining 24 (5.3% protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0% trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]. Of 71 agreements reported in publications, 52 (73.2% were concordant with those documented in the protocol. In 14 of 37 (37.8% publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements.Publication agreements constraining academic authors' independence are common. Journal articles seldom report on publication agreements, and, if they do

  10. Agreements between Industry and Academia on Publication Rights: A Retrospective Study of Protocols and Publications of Randomized Clinical Trials

    Science.gov (United States)

    Kasenda, Benjamin; von Elm, Erik; You, John J.; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J.; Stegert, Mihaela; Olu, Kelechi K.; Tikkinen, Kari A. O.; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M.; Mertz, Dominik; Akl, Elie A.; Bassler, Dirk; Busse, Jason W.; Nordmann, Alain; Gloy, Viktoria; Ebrahim, Shanil; Schandelmaier, Stefan; Sun, Xin; Vandvik, Per O.; Johnston, Bradley C.; Walter, Martin A.; Burnand, Bernard; Hemkens, Lars G.; Bucher, Heiner C.; Guyatt, Gordon H.; Briel, Matthias

    2016-01-01

    Background Little is known about publication agreements between industry and academic investigators in trial protocols and the consistency of these agreements with corresponding statements in publications. We aimed to investigate (i) the existence and types of publication agreements in trial protocols, (ii) the completeness and consistency of the reporting of these agreements in subsequent publications, and (iii) the frequency of co-authorship by industry employees. Methods and Findings We used a retrospective cohort of randomized clinical trials (RCTs) based on archived protocols approved by six research ethics committees between 13 January 2000 and 25 November 2003. Only RCTs with industry involvement were eligible. We investigated the documentation of publication agreements in RCT protocols and statements in corresponding journal publications. Of 647 eligible RCT protocols, 456 (70.5%) mentioned an agreement regarding publication of results. Of these 456, 393 (86.2%) documented an industry partner’s right to disapprove or at least review proposed manuscripts; 39 (8.6%) agreements were without constraints of publication. The remaining 24 (5.3%) protocols referred to separate agreement documents not accessible to us. Of those 432 protocols with an accessible publication agreement, 268 (62.0%) trials were published. Most agreements documented in the protocol were not reported in the subsequent publication (197/268 [73.5%]). Of 71 agreements reported in publications, 52 (73.2%) were concordant with those documented in the protocol. In 14 of 37 (37.8%) publications in which statements suggested unrestricted publication rights, at least one co-author was an industry employee. In 25 protocol-publication pairs, author statements in publications suggested no constraints, but 18 corresponding protocols documented restricting agreements. Conclusions Publication agreements constraining academic authors’ independence are common. Journal articles seldom report on

  11. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  12. Short and long-term effectiveness of couple counselling: a study protocol

    Directory of Open Access Journals (Sweden)

    Schofield Margot J

    2012-09-01

    Full Text Available Abstract Background Healthy couple relationships are fundamental to a healthy society, whereas relationship breakdown and discord are linked to a wide range of negative health and wellbeing outcomes. Two types of relationship services (couple counselling and relationship education have demonstrated efficacy in many controlled studies but evidence of the effectiveness of community-based relationship services has lagged behind. This study protocol describes an effectiveness evaluation of the two types of community-based relationship services. The aims of the Evaluation of Couple Counselling study are to: map the profiles of clients seeking agency-based couple counselling and relationship enhancement programs in terms of socio-demographic, relationship, health, and health service use indicators; to determine 3 and 12-month outcomes for relationship satisfaction, commitment, and depression; and determine relative contributions of client and therapy factors to outcomes. Methods/Design A quasi-experimental pre-post-post evaluation design is used to assess outcomes for couples presenting for the two types of community-based relationship services. The longitudinal design involves a pre-treatment survey and two follow-up surveys at 3- and 12-months post-intervention. The study is set in eight Relationships Australia Victoria centres, across metropolitan, outer suburbs, and regional/rural sites. Relationships Australia, a non-government organisation, is the largest provider of couple counselling and relationship services in Australia. The key outcomes are couple satisfaction, relationship commitment, and depression measured by the CESD-10. Multi-level modelling will be used to account for the dyadic nature of couple data. Discussion The study protocol describes the first large scale investigation of the effectiveness of two types of relationship services to be conducted in Australia. Its significance lies in providing more detailed profiles of couples who

  13. Assessment of Adverse Events in Protocols, Clinical Study Reports, and Published Papers of Trials of Orlistat: A Document Analysis.

    Directory of Open Access Journals (Sweden)

    Jeppe Bennekou Schroll

    2016-08-01

    Full Text Available Little is known about how adverse events are summarised and reported in trials, as detailed information is usually considered confidential. We have acquired clinical study reports (CSRs from the European Medicines Agency through the Freedom of Information Act. The CSRs describe the results of studies conducted as part of the application for marketing authorisation for the slimming pill orlistat. The purpose of this study was to study how adverse events were summarised and reported in study protocols, CSRs, and published papers of orlistat trials.We received the CSRs from seven randomised placebo controlled orlistat trials (4,225 participants submitted by Roche. The CSRs consisted of 8,716 pages and included protocols. Two researchers independently extracted data on adverse events from protocols and CSRs. Corresponding published papers were identified on PubMed and adverse event data were extracted from this source as well. All three sources were compared. Individual adverse events from one trial were summed and compared to the totals in the summary report. None of the protocols or CSRs contained instructions for investigators on how to question participants about adverse events. In CSRs, gastrointestinal adverse events were only coded if the participant reported that they were "bothersome," a condition that was not specified in the protocol for two of the trials. Serious adverse events were assessed for relationship to the drug by the sponsor, and all adverse events were coded by the sponsor using a glossary that could be updated by the sponsor. The criteria for withdrawal due to adverse events were in one case related to efficacy (high fasting glucose led to withdrawal, which meant that one trial had more withdrawals due to adverse events in the placebo group. Finally, only between 3% and 33% of the total number of investigator-reported adverse events from the trials were reported in the publications because of post hoc filters, though six of

  14. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  15. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  16. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  17. Development and validation of a remote home safety protocol.

    Science.gov (United States)

    Romero, Sergio; Lee, Mi Jung; Simic, Ivana; Levy, Charles; Sanford, Jon

    2018-02-01

    Environmental assessments and subsequent modifications conducted by healthcare professionals can enhance home safety and promote independent living. However, travel time, expense and the availability of qualified professionals can limit the broad application of this intervention. Remote technology has the potential to increase access to home safety evaluations. This study describes the development and validation of a remote home safety protocol that can be used by a caregiver of an elderly person to video-record their home environment for later viewing and evaluation by a trained professional. The protocol was developed based on literature reviews and evaluations from clinical and content experts. Cognitive interviews were conducted with a group of six caregivers to validate the protocol. The final protocol included step-by-step directions to record indoor and outdoor areas of the home. The validation process resulted in modifications related to safety, clarity of the protocol, readability, visual appearance, technical descriptions and usability. Our final protocol includes detailed instructions that a caregiver should be able to follow to record a home environment for subsequent evaluation by a home safety professional. Implications for Rehabilitation The results of this study have several implications for rehabilitation practice The remote home safety evaluation protocol can potentially improve access to rehabilitation services for clients in remote areas and prevent unnecessary delays for needed care. Using our protocol, a patient's caregiver can partner with therapists to quickly and efficiently evaluate a patient's home before they are released from the hospital. Caregiver narration, which reflects a caregiver's own perspective, is critical to evaluating home safety. In-home safety evaluations, currently not available to all who need them due to access barriers, can enhance a patient's independence and provide a safer home environment.

  18. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  19. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  20. Protocol for Bone Augmentation with Simultaneous Early Implant Placement: A Retrospective Multicenter Clinical Study

    Directory of Open Access Journals (Sweden)

    Peter Fairbairn

    2015-01-01

    Full Text Available Purpose. To present a novel protocol for alveolar bone regeneration in parallel to early implant placement. Methods. 497 patients in need of extraction and early implant placement with simultaneous bone augmentation were treated in a period of 10 years. In all patients the same specific method was followed and grafting was performed utilizing in situ hardening fully resorbable alloplastic grafting materials consisting of β-tricalcium phosphate and calcium sulfate. The protocol involved atraumatic extraction, implant placement after 4 weeks with simultaneous bone augmentation, and loading of the implant 12 weeks after placement and grafting. Follow-up periods ranged from 6 months to 10 years (mean of 4 years. Results. A total of 601 postextraction sites were rehabilitated in 497 patients utilizing the novel protocol. Three implants failed before loading and three implants failed one year after loading, leaving an overall survival rate of 99.0%. Conclusions. This standardized protocol allows successful long-term functional results regarding alveolar bone regeneration and implant rehabilitation. The concept of placing the implant 4 weeks after extraction, augmenting the bone around the implant utilizing fully resorbable, biomechanically stable, alloplastic materials, and loading the implant at 12 weeks seems to offer advantages when compared with traditional treatment modalities.

  1. Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks – Tabuk Flood Monitoring System Case Study

    Directory of Open Access Journals (Sweden)

    Ammar Babiker

    2017-10-01

    Full Text Available Energy efficiency has been considered as the most important issue in wireless sensor networks. As in many applications, wireless sensors are scattered in a wide harsh area, where the battery replacement or charging will be quite difficult and it is the most important challenge. Therefore, the design of energy saving mechanism becomes mandatory in most recent research. In this paper, a new energy efficient clustered routing protocol is proposed: the proposed protocol is based on analyzing the data collected from the sensors in a base-station. Based on this analysis the cluster head will be selected as the one with the most useful data. Then, a variable time slot is specified to each sensor to minimize the transmission of repetitive and un-useful data. The proposed protocol Data-Based Energy Efficient Clustered Routing Protocol for Wireless Sensors Networks (DCRP was compared with the famous energy efficient LEACH protocol and also with one of the recent energy efficient routing protocols named Position Responsive Routing Protocol (PRRP. DCRP has been used in monitoring the floods in Tabuk area –Saudi Arabia. It shows comparatively better results.

  2. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  3. Tongue pressure profile training for dysphagia post stroke (TPPT): study protocol for an exploratory randomized controlled trial.

    Science.gov (United States)

    Steele, Catriona M; Bayley, Mark A; Péladeau-Pigeon, Melanie; Stokely, Shauna L

    2013-05-07

    It is estimated that approximately 50% of stroke survivors will experience swallowing difficulty, or dysphagia. The associated sequelae of dysphagia include dehydration, malnutrition, and aspiration pneumonia, all of which have can have serious medical consequences. To improve swallowing safety and efficiency, alternative nutritional intake methods (for example, a feeding tube) or a modified diet texture (such as pureed foods or thickened liquids) may be recommended but these modifications may negatively affect quality of life. An alternative approach to treating dysphagia has emerged over the past few years, targeting stronger lingual muscles through maximal isometric pressure tasks. Although these studies have shown promising results, thin-liquid bolus control continues to be challenging for patients with dysphagia. Previous work investigating lingual pressures when healthy participants swallow has suggested that greater task specificity in lingual exercises may yield improved results with thin liquids. This is a small, exploratory randomized clinical trial being conducted with post-stroke patients 4 to 20 weeks after onset of dysphagia secondary to impaired lingual control. At enrollment, participants are randomly assigned to one of two treatment protocols, either tongue pressure profile training (TPPT) or the control treatment, tongue pressure strength-and-accuracy training (TPSAT). Each treatment protocol consists of 24 sessions of treatment over 8 to 12 weeks with monitoring of tongue pressure as well as a baseline and outcome videofluoroscopic swallowing study. Tongue pressure measures, videofluoroscopic measures, and functional outcome measures will be obtained following training of 60 participants (30 in each condition), to determine whether TPPT yields better outcomes. This study will continue to explore options beyond tube feeding and modified diets for people with neurogenic dysphagia following stroke. Should the novel protocol, TPPT, prove to be more

  4. Comparison of microdose flare-up and antagonist multiple-dose protocols for poor-responder patients: a randomized study.

    Science.gov (United States)

    Demirol, Aygul; Gurgan, Timur

    2009-08-01

    To compare the efficacy of the microdose flare-up and multiple-dose antagonist protocols for poor-responder patients in intracytoplasmic sperm injection-ET cycles. A randomized, prospective study. Center for assisted reproductive technology in Turkey. Ninety patients with poor ovarian response in a minimum of two previous IVF cycles. All women were prospectively randomized into two groups by computer-assisted randomization. The patients in group 1 were stimulated according to the microdose flare-up protocol (n = 45), while the patients in group 2 were stimulated according to antagonist multiple-dose protocol (n = 45). The mean number of mature oocytes retrieved was the primary outcome measure, and fertilization rate, implantation rate per embryo, and clinical pregnancy rates were secondary outcome measures. The mean age of the women, the mean duration of infertility, basal FSH level, and the number of previous IVF cycles were similar in both groups. The total gonadotropin dose used was significantly higher in group 2, while the number of oocytes retrieved was significantly greater in group 1. Although the fertilization and clinical pregnancy rates were nonsignificantly higher in group 1 compared with group 2, the implantation rate was significantly higher in the microdose flare-up group than in the multiple-dose antagonist group (22% vs. 11%). The microdose flare-up protocol seems to have a better outcome in poor-responder patients, with a significantly higher mean number of mature oocytes retrieved and higher implantation rate.

  5. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  6. The impact of an ED-only full-capacity protocol.

    Science.gov (United States)

    Watase, Taketo; Fu, Rongwei; Foster, Denise; Langley, Denise; Handel, Daniel A

    2012-10-01

    The objective of this study was to assess the impact of an emergency department (ED)-only full-capacity protocol and diversion, controlling for patient volumes and other potential confounding factors. This was a preintervention and postintervention cohort study using data 12 months before and 12 months after the implementation of the protocol. During the implementation period, attending physicians and charge nurses were educated with clear and simple figures on the criteria for the initiation of the new protocol. A multiple logistic regression model was used to compare ambulance diversion between the 2 periods. The proportion of days when the ED went on diversion at least once during a 24-hour period was 60.4% during the preimplementation period and 20% in the postimplementation periods (P model, the use of the new protocol was significantly associated with decreased odds of diversion rate in the postimplementation period (odds ratio, 0.32; 95% confidence interval, 0.21-0.48). Our predivert/full-capacity protocol is a simple and generalizable strategy that can be implemented within the boundaries of the ED and is significantly associated with a decreased diversion rate. Copyright © 2012 Elsevier Inc. All rights reserved.

  7. Perancangan dan Analisis Redistribution Routing Protocol OSPF dan EIGRP

    Directory of Open Access Journals (Sweden)

    DWI ARYANTA

    2014-07-01

    OSPF (Open Shortest Path First and EIGRP (Enhanced Interior Gateway Routing Protocol are two routing protocols are widely used in computer networks. Differences between the characteristics of routing protocols pose a problem in the delivery of data packets. Redistribution technique is the solution for communication between routing protocols. By using the software Cisco Packet Tracer 5.3 in this study were made simulating OSPF and EIGRP redistribution linked by technique, then compared its quality with a single EIGRP and OSPF routing protocols. Testing parameters in this study is the value of the time delay and trace route. Value trace route based on direct calculation of cost and metric compared with the simulation results. The result can be OSPF and EIGRP redistribution process. Value delay redistribution 1% better than OSPF and EIGRP 2-3% under traffic density dependent. In calculating the trace route redistribution is done 2 calculations, the cost for OSPF area and the area of the EIGRP metric. Making primary and alternate paths based on the packet delivery rate and the cost of the smallest metric, it is proved by calculation and simulation. Keywords: OSPF, EIGRP, Redistribution, Delay, Cost, Metric.

  8. ASSESSMENT OF RIP-V1 AND OSPF-V2 PROTOCOL WITH CONSIDERATION OF CONVERGENCE CRITERIA AND SENDING PROTOCOLS TRAFFIC

    Directory of Open Access Journals (Sweden)

    Hamed Jelodar

    2014-03-01

    Full Text Available Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.

  9. Using generalizability theory to develop clinical assessment protocols.

    Science.gov (United States)

    Preuss, Richard A

    2013-04-01

    Clinical assessment protocols must produce data that are reliable, with a clinically attainable minimal detectable change (MDC). In a reliability study, generalizability theory has 2 advantages over classical test theory. These advantages provide information that allows assessment protocols to be adjusted to match individual patient profiles. First, generalizability theory allows the user to simultaneously consider multiple sources of measurement error variance (facets). Second, it allows the user to generalize the findings of the main study across the different study facets and to recalculate the reliability and MDC based on different combinations of facet conditions. In doing so, clinical assessment protocols can be chosen based on minimizing the number of measures that must be taken to achieve a realistic MDC, using repeated measures to minimize the MDC, or simply based on the combination that best allows the clinician to monitor an individual patient's progress over a specified period of time.

  10. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  11. A Comparative Study On The Action Potential Simulation (APS Therapy And The Routine Physiotherapy Protocol In Knee Osteoarthritisin Elderly People

    Directory of Open Access Journals (Sweden)

    Abbas Rahimi

    2012-04-01

    Full Text Available Background and Aim: Knee osteoarthritis is the most common cause for which the elderly people refere to physiotherapy outpatient clinics. This study aimed to investigate the effects of the Action Potential Stimulation (APS Therapy and the routine physiotherapy (PT protocol on relieving pain and swelling as well as the duration of the relief period in patients with knee osteoarthritis. Materials and Methods: 69 patients (62 females & 7 males with knee osteoarthritis were recruited in this study. The subjects were divided into two groups including APS Therapy (n=37, mean age: 55±13 years old and the routine PT protocol (n=32, mean age: 61±14 years old groups. A 10-session treatment period was carried out for each group; and their pain and swelling were measured at the first, fifth and tenth sessions and also one-month after the last session (follow up. The swelling was measured using measuring the circumference of the knee on the patella, 5 Cm above and 5 Cm below the patella. The routine PT protocol consisted of hot pack, ultrasound, TENS and exercise; and the APS therapy protocol included hot pack, APS Therapy and the same exercise. During the follow up, 50 out of 61 subjects were called on the phone and any pain changes were recorded.Results: In terms of swelling, the results showed significant reduction just on the patella only in the APS Therapy group (P<0.05. Visual Analogue Pain Scale (VAPS indicated a significant pain reduction in both groups. However, the APS Therapy group showed significantly pain reduction at the end of sessions five, ten and the follow up session (P<0.05. It was also revealed that while routine PT subjects showed no significant pain changes between the tenth and the follow up session, a gradual pain reduction was seen in the APS therapy group during this period (P<0.05. A gradual dosage reduction was recorded only in the APS therapy group, indicating a slight correlation with pain reduction (r=0.4.Conclusion: The

  12. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4, Volume IV: Inherent Optical Properties: Instruments, Characterizations, Field Measurements and Data Analysis Protocols

    Science.gov (United States)

    Mueller, J. L.; Fargion, G. S.; McClain, C. R. (Editor); Pegau, S.; Zanefeld, J. R. V.; Mitchell, B. G.; Kahru, M.; Wieland, J.; Stramska, M.

    2003-01-01

    This document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparision and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. The document is organized into 6 separate volumes as Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 4. Volume I: Introduction, Background, and Conventions; Volume II: Instrument Specifications, Characterization and Calibration; Volume III: Radiometric Measurements and Data Analysis Methods; Volume IV: Inherent Optical Properties: Instruments, Characterization, Field Measurements and Data Analysis Protocols; Volume V: Biogeochemical and Bio-Optical Measurements and Data Analysis Methods; Volume VI: Special Topics in Ocean Optics Protocols and Appendices. The earlier version of Ocean Optics Protocols for Satellite Ocean Color Sensor Validation, Revision 3 is entirely superseded by the six volumes of Revision 4 listed above.

  13. Prospective randomized study of arthroscopic rotator cuff repair using an early versus delayed postoperative physical therapy protocol.

    Science.gov (United States)

    Cuff, Derek J; Pupello, Derek R

    2012-11-01

    This study evaluated patient outcomes and rotator cuff healing after arthroscopic rotator cuff repair using a postoperative physical therapy protocol with early passive motion compared with a delayed protocol that limited early passive motion. The study enrolled 68 patients (average age, 63.2 years) who met inclusion criteria. All patients had a full-thickness crescent-shaped tear of the supraspinatus that was repaired using a transosseous equivalent suture-bridge technique along with subacromial decompression. In the early group, 33 patients were randomized to passive elevation and rotation that began at postoperative day 2. In the delayed group, 35 patients began the same protocol at 6 weeks. Patients were monitored clinically for a minimum of 12 months, and rotator cuff healing was assessed using ultrasound imaging. Both groups had similar improvements in preoperative to postoperative American Shoulder and Elbow Surgeons scores (early group: 43.9 to 91.9, P rotator cuff healing, or range of motion between the early and delayed groups. Patients in the early group and delayed group both demonstrated very similar outcomes and range of motion at 1 year. There was a slightly higher rotator cuff healing rate in the delayed passive range of motion group compared with the early passive range of motion group (91% vs 85%). Copyright © 2012 Journal of Shoulder and Elbow Surgery Board of Trustees. Published by Mosby, Inc. All rights reserved.

  14. Privacy-Preserving Verifiability: A Case for an Electronic Exam Protocol

    DEFF Research Database (Denmark)

    Giustolisi, Rosario; Iovino, Vincenzo; Lenzini, Gabriele

    2017-01-01

    We introduce the notion of privacy-preserving verifiability for security protocols. It holds when a protocol admits a verifiability test that does not reveal, to the verifier that runs it, more pieces of information about the protocol’s execution than those required to run the test. Our definition...... of privacy-preserving verifiability is general and applies to cryptographic protocols as well as to human security protocols. In this paper we exemplify it in the domain of e-exams. We prove that the notion is meaningful by studying an existing exam protocol that is verifiable but whose verifiability tests...... are not privacy-preserving. We prove that the notion is applicable: we review the protocol using functional encryption so that it admits a verifiability test that preserves privacy according to our definition. We analyse, in ProVerif, that the verifiability holds despite malicious parties and that the new...

  15. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  16. Evaluating Protocol Lifecycle Time Intervals in HIV/AIDS Clinical Trials

    Science.gov (United States)

    Schouten, Jeffrey T.; Dixon, Dennis; Varghese, Suresh; Cope, Marie T.; Marci, Joe; Kagan, Jonathan M.

    2014-01-01

    Background Identifying efficacious interventions for the prevention and treatment of human diseases depends on the efficient development and implementation of controlled clinical trials. Essential to reducing the time and burden of completing the clinical trial lifecycle is determining which aspects take the longest, delay other stages, and may lead to better resource utilization without diminishing scientific quality, safety, or the protection of human subjects. Purpose In this study we modeled time-to-event data to explore relationships between clinical trial protocol development and implementation times, as well as identify potential correlates of prolonged development and implementation. Methods We obtained time interval and participant accrual data from 111 interventional clinical trials initiated between 2006 and 2011 by NIH’s HIV/AIDS Clinical Trials Networks. We determined the time (in days) required to complete defined phases of clinical trial protocol development and implementation. Kaplan-Meier estimates were used to assess the rates at which protocols reached specified terminal events, stratified by study purpose (therapeutic, prevention) and phase group (pilot/phase I, phase II, and phase III/ IV). We also examined several potential correlates to prolonged development and implementation intervals. Results Even though phase grouping did not determine development or implementation times of either therapeutic or prevention studies, overall we observed wide variation in protocol development times. Moreover, we detected a trend toward phase III/IV therapeutic protocols exhibiting longer developmental (median 2 ½ years) and implementation times (>3years). We also found that protocols exceeding the median number of days for completing the development interval had significantly longer implementation. Limitations The use of a relatively small set of protocols may have limited our ability to detect differences across phase groupings. Some timing effects

  17. Improving active Mealy machine learning for protocol conformance testing

    NARCIS (Netherlands)

    Aarts, F.; Kuppens, H.; Tretmans, J.; Vaandrager, F.; Verwer, S.

    2014-01-01

    Using a well-known industrial case study from the verification literature, the bounded retransmission protocol, we show how active learning can be used to establish the correctness of protocol implementation I relative to a given reference implementation R. Using active learning, we learn a model M

  18. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  19. Examining recombinant human TSH primed 131I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    International Nuclear Information System (INIS)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip

    2014-01-01

    Recombinant human thyroid-stimulating hormone (rhTSH)-based protocol is a promising recent development in the management of differentiated thyroid carcinoma (DTC). The objectives of this prospective study were: (1) to assess the feasibility and efficacy of the rhTSH primed 131 I therapy protocol in patients with DTC with distant metastatic disease, (2) to perform lesional dosimetry in this group of patients compared to the traditional protocol, (3) to document the practical advantages (patient symptoms and hospital stay) of the rhTSH protocol compared to the traditional thyroid hormone withdrawal protocol, (4) to document and record any adverse effect of this strategy, (5) to compare the renal function parameters, and (6) to compare the serum TSH values achieved in either of the protocols in this group of patients. The study included 37 patients with metastatic DTC having lung or skeletal metastases or both. A comparison of lesional radiation absorbed dose, hospital stay, renal function tests, and symptom profile was undertaken between the traditional thyroid hormone withdrawal protocol and rhTSH-based therapy protocol. Dosimetric calculations of metastatic lesions were performed using lesion uptake and survey meter readings for calculation of effective half-life. Non-contrast-enhanced CT was used for assessment of tumor volume. Quality of life was assessed using the European Organization for Research and Treatment of Cancer (EORTC) QOL forms. A comparison of pretreatment withdrawal thyroglobulin (TG) was done with the withdrawal TG level 3 months after treatment. The mean effective half-life of 131 I in metastatic lesions was less during the rhTSH protocol (29.49 h) compared to the thyroid hormone withdrawal protocol (35.48 h), but the difference was not statistically significant (p = 0.056). The mean 24-h % uptake of the lesions during the traditional protocol (4.84 %) was slightly higher than the 24-h % uptake during the rhTSH protocol (3.56 %), but the

  20. I-123 IBZM-SPECT: improved acquisition protocol with HR-collimator

    International Nuclear Information System (INIS)

    Sandrock, D.; Ivancevic, V.; Dopichaj-Menge, U.; Gruber, D.; Munz, D.

    2002-01-01

    Aim: Aim of this study was to evaluate the impact of different acquisition and reconstruction protocols on the quality of SPECT diagnostics with I-123 IBZM in patients with diseases of the dopaminergic system. Material and Methods: Overall, 30 patients (19 men, 11 women, aged 22 - 80 years) were studied with SPECT after i.v. injection of 5 mCi (185 MBq) I-123 IBZM. Acquisition was performed 60 min p.i. (protocol A) using a medium energy collimator, a 64 x 64 matrix, 64 projections, step and shoot technique, 5.6 0 and 20 seconds per step with a MultiSPECT2 double-head gamma camera (Siemens). Immediately afterwards, a second acquisition (protocol B, 90 min p.i.) using a high resolution collimator, a 128 x 128 matrix, 60 projections, step and shoot technique, 3 0 and 30 seconds per step was performed. The reconstruction was done in filtered backprojection technique and a Butterworth filter of order 7, in protocol A using a cutoff of 0.5 and in protocol B of 0.4. Finally, the net count ratios of the basal ganglia to the frontal lobe(s) were calculated and compared with the clinical diagnosis. Results: The visual analysis yielded - as expected -a better image quality for protocol B (concordant impression of 3 independent observers) with more accurate delineation of the basal ganglia. The count ratios with protocol B were (mean) 0.19 higher (equivalent to 13 %) than with protocol A. In the group of patients with count ratios > 1.55 there was the highest (and significant) difference between protocols A and B with (mean count ratio difference) 0.32 (equivalent to 20 %). Protocol B also allowed a better differentiation between patients clinically staged normal and abnormal. In patients with unilateral disease, this difference between normal and abnormal was more prominent (in comparison to the contralateral side as well as compared to the reference value [1.5]). The comparison of the count ratios with the clinical data revealed 7 patients with borderline results with

  1. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  2. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  3. Accuracy of prehospital triage protocols in selecting severely injured patients: A systematic review.

    Science.gov (United States)

    van Rein, Eveline A J; Houwert, R Marijn; Gunning, Amy C; Lichtveld, Rob A; Leenen, Luke P H; van Heijl, Mark

    2017-08-01

    Prehospital trauma triage ensures proper transport of patients at risk of severe injury to hospitals with an appropriate corresponding level of trauma care. Incorrect triage results in undertriage and overtriage. The American College of Surgeons Committee on Trauma recommends an undertriage rate below 5% and an overtriage rate below 50% for prehospital trauma triage protocols. To find the most accurate prehospital trauma triage protocol, a clear overview of all currently available protocols and corresponding outcomes is necessary. The aim of this systematic review was to evaluate the current literature on all available prehospital trauma triage protocols and determine accuracy of protocol-based triage quality in terms of sensitivity and specificity. A search of Pubmed, Embase, and Cochrane Library databases was performed to identify all studies describing prehospital trauma triage protocols before November 2016. The search terms included "trauma," "trauma center," or "trauma system" combined with "triage," "undertriage," or "overtriage." All studies describing protocol-based triage quality were reviewed. To assess the quality of these type of studies, a new critical appraisal tool was developed. In this review, 21 articles were included with numbers of patients ranging from 130 to over 1 million. Significant predictors for severe injury were: vital signs, suspicion of certain anatomic injuries, mechanism of injury, and age. Sensitivity ranged from 10% to 100%; specificity from 9% to 100%. Nearly all protocols had a low sensitivity, thereby failing to identify severely injured patients. Additionally, the critical appraisal showed poor quality of the majority of included studies. This systematic review shows that nearly all protocols are incapable of identifying severely injured patients. Future studies of high methodological quality should be performed to improve prehospital trauma triage protocols. Systematic review, level III.

  4. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  5. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  6. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  7. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  8. GnRH antagonist versus long agonist protocols in IVF

    DEFF Research Database (Denmark)

    Lambalk, C B; Banga, F R; Huirne, J A

    2017-01-01

    BACKGROUND: Most reviews of IVF ovarian stimulation protocols have insufficiently accounted for various patient populations, such as ovulatory women, women with polycystic ovary syndrome (PCOS) or women with poor ovarian response, and have included studies in which the agonist or antagonist...... was not the only variable between the compared study arms. OBJECTIVE AND RATIONALE: The aim of the current study was to compare GnRH antagonist protocols versus standard long agonist protocols in couples undergoing IVF or ICSI, while accounting for various patient populations and treatment schedules. SEARCH...... in couples undergoing IVF or ICSI. The primary outcome was ongoing pregnancy rate. Secondary outcomes were: live birth rate, clinical pregnancy rate, number of oocytes retrieved and safety with regard to ovarian hyperstimulation syndrome (OHSS). Separate comparisons were performed for the general IVF...

  9. Maternal antecedents of adiposity and studying the transgenerational role of hyperglycemia and insulin (MAASTHI): a prospective cohort study : Protocol of birth cohort at Bangalore, India.

    Science.gov (United States)

    Babu, Giridhara R; Murthy, Gvs; Deepa, R; Yamuna; Prafulla; Kumar, H Kiran; Karthik, Maithili; Deshpande, Keerti; Benjamin Neelon, Sara E; Prabhakaran, D; Kurpad, Anura; Kinra, Sanjay

    2016-10-14

    India is experiencing an epidemic of obesity-hyperglycaemia, which coincides with child bearing age for women. The epidemic can be sustained and augmented through transgenerational transmission of adiposity and glucose intolerance in women. This presents an opportunity for exploring a clear strategy for the control of this epidemic in India. We conducted a study between November 2013 and May 2015 to inform the design of a large pregnancy cohort study. Based on the findings of this pilot, we developed the protocol for the proposed birth cohort of 5000 women, the recruitment for which will start in April 2016. The protocol of the study documents the processes which aim at advancing the available knowledge, linking several steps in the evolution of obesity led hyperglycemia. Maternal Antecedents of Adiposity and Studying the Transgenerational role of Hyperglycemia and Insulin (MAASTHI) is a cohort study in the public health facilities in Bangalore, India. The objective of MAASTHI is to prospectively assess the effects of glucose levels in pregnancy on the risk of adverse infant outcomes, especially in predicting the possible risk markers of later chronic diseases. The primary objective of the proposed study is to investigate the effect of glucose levels in pregnancy on skinfold thickness (adiposity) in infancy as a marker of future obesity and diabetes in offspring. The secondary objective is to assess the association between psychosocial environment of mothers and adverse neonatal outcomes including adiposity. The study aims to recruit 5000 pregnant women and follow them and their offspring for a period of 4 years. The institutional review board at The Indian Institute of Public Health (IIPH)-H, Bangalore, Public Health Foundation of India has approved the protocol. All participants are required to provide written informed consent. The findings from this study may help to address important questions on screening and management of high blood sugar in pregnancy. It

  10. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  11. How to write a research protocol

    African Journals Online (AJOL)

    A research protocol is best viewed as a key to open the gates between the researcher and ... studies will be quantitative designs and these form the focus of this paper. ..... applied to the underlying clinical problem addressed by the study.

  12. Cryotherapy for acute ankle sprains: a randomised controlled study of two different icing protocols.

    Science.gov (United States)

    Bleakley, C M; McDonough, S M; MacAuley, D C; Bjordal, J

    2006-08-01

    The use of cryotherapy in the management of acute soft tissue injury is largely based on anecdotal evidence. Preliminary evidence suggests that intermittent cryotherapy applications are most effective at reducing tissue temperature to optimal therapeutic levels. However, its efficacy in treating injured human subjects is not yet known. To compare the efficacy of an intermittent cryotherapy treatment protocol with a standard cryotherapy treatment protocol in the management of acute ankle sprains. Sportsmen (n = 44) and members of the general public (n = 45) with mild/moderate acute ankle sprains. Subjects were randomly allocated, under strictly controlled double blind conditions, to one of two treatment groups: standard ice application (n = 46) or intermittent ice application (n = 43). The mode of cryotherapy was standardised across groups and consisted of melting iced water (0 degrees C) in a standardised pack. Function, pain, and swelling were recorded at baseline and one, two, three, four, and six weeks after injury. Subjects treated with the intermittent protocol had significantly (p<0.05) less ankle pain on activity than those using a standard 20 minute protocol; however, one week after ankle injury, there were no significant differences between groups in terms of function, swelling, or pain at rest. Intermittent applications may enhance the therapeutic effect of ice in pain relief after acute soft tissue injury.

  13. Danish method study on cervical screening in women offered HPV vaccination as girls (Trial23): a study protocol.

    Science.gov (United States)

    Thamsborg, Lise Holst; Andersen, Berit; Larsen, Lise Grupe; Christensen, Jette; Johansen, Tonje; Hariri, Jalil; Christiansen, Sanne; Rygaard, Carsten; Lynge, Elsebeth

    2018-05-26

    The first birth cohorts of women offered human papillomavirus (HPV) vaccination as girls are now entering cervical screening. However, there is no international consensus on how to screen HPV vaccinated women. These women are better protected against cervical cancer and could therefore be offered less intensive screening. Primary HPV testing is more sensitive than cytology, allowing for a longer screening interval. The aim of Trial23 is to investigate if primary HPV testing with cytology triage of HPV positive samples is a reasonable screening scheme for women offered HPV vaccination as girls. Trial23 is a method study embedded in the existing cervical screening programme in four out of five Danish regions. Without affecting the screening programme, women born in 1994 are randomised to present screening with liquid-based cytology every third year (present programme arm) or present screening plus an HPV test (HPV arm). The study started 1 February 2017 and will run over three screening rounds corresponding to 7-8 years. The primary endpoint is cervical intraepithelial neoplasia grade 3 or above. The trial is undertaken as a non-inferiority study including intention-to-treat and per-protocol analyses. The potential effect of primary HPV screening with a 6-year interval will be calculated from the observed data. The study protocol has been submitted to the ethical committee and deemed a method study. All women are screened according to routine guidelines. The study will contribute new evidence on the future screening of HPV vaccinated birth cohorts of women. All results will be published in open-access journal. NCT03049553; Pre-results. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  14. Quantum protocols within Spekkens' toy model

    Science.gov (United States)

    Disilvestro, Leonardo; Markham, Damian

    2017-05-01

    Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.

  15. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  16. Protocol notions from the bibliography of his authorities

    Directory of Open Access Journals (Sweden)

    Dra. María Luz Álvarez Rodríguez

    2008-01-01

    Full Text Available Protocol is a subject that has suffered great changes over the last years in Spain. Its presence at university training has shifted from being a mere anecdote to becoming one more subject to be taught in postgraduate courses endorsed by a big social and professional demand. With the aim of announcing Protocol as a subject to the Spanish academic field, the present article carries out a study of the theoretical situation of this subject and profession in Spain. This research means to get to know the scientific character of Protocol, at the same time as it tries to found such professional side in the current offer of courses and of training. For this reason, this research could be interesting for the Spanish academic field, by helping to explain the reality of Protocol in Spain and to impel its theoretical development in our country.

  17. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  18. Comparative Analysis of Different Protocols to Manage Large Scale Networks

    OpenAIRE

    Anil Rao Pimplapure; Dr Jayant Dubey; Prashant Sen

    2013-01-01

    In recent year the numbers, complexity and size is increased in Large Scale Network. The best example of Large Scale Network is Internet, and recently once are Data-centers in Cloud Environment. In this process, involvement of several management tasks such as traffic monitoring, security and performance optimization is big task for Network Administrator. This research reports study the different protocols i.e. conventional protocols like Simple Network Management Protocol and newly Gossip bas...

  19. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  20. A security analysis of the 802.11s wireless mesh network routing protocol and its secure routing protocols.

    Science.gov (United States)

    Tan, Whye Kit; Lee, Sang-Gon; Lam, Jun Huy; Yoo, Seong-Moo

    2013-09-02

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining message authentication code protocol (CCMP), Secure Hybrid Wireless Mesh Protocol (SHWMP), Identity Based Cryptography HWMP (IBC-HWMP), Elliptic Curve Digital Signature Algorithm HWMP (ECDSA-HWMP), and Watchdog-HWMP aim to protect the HWMP frames. In this paper, we have analyzed the vulnerabilities of the HWMP and developed security requirements to protect these identified vulnerabilities. We applied the security requirements to analyze the existing secure schemes for HWMP. The results of our analysis indicate that none of these protocols is able to satisfy all of the security requirements. We also present a quantitative complexity comparison among the protocols and an example of a security scheme for HWMP to demonstrate how the result of our research can be utilized. Our research results thus provide a tool for designing secure schemes for the HWMP.

  1. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  2. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair

    Science.gov (United States)

    Lightsey, Harry M.; Kantrowitz, David E.; Swindell, Hasani W.; Trofa, David P.; Ahmad, Christopher S.; Lynch, T. Sean

    2018-01-01

    Background: The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. Purpose: To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Study Design: Cross-sectional study. Methods: Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Results: Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises

  3. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  4. The "Healthy Habits, Healthy Girls" randomized controlled trial for girls: study design, protocol, and baseline results.

    Science.gov (United States)

    Leme, Ana Carolina Barco; Philippi, Sonia Tucunduva

    2015-07-01

    The purpose of this article is to describe the study design, protocol, and baseline results of the "Healthy Habits, Healthy Girls" program. The intervention is being evaluated through a randomized controlled trial in 10 public schools in the city of São Paulo, Brazil. Data on the following variables were collected and assessed at baseline and will be reevaluated at 7 and 12 months: body mass index, waist circumference, dietary intake, nutrition, physical activity, social cognitive mediators, physical activity level, sedentary behaviors, self-rated physical status, and overall self-esteem. According to the baseline results, 32.4% and 23.4% of girls were overweight in the intervention and control groups, respectively, and in both groups a higher percentage failed to meet daily recommendations for moderate and vigorous physical activity and maximum screen time (TV, computer, mobile devices). There were no significant differences between the groups for most of the variables, except age (p = 0.000) and waist circumference (p = 0.014). The study showed a gap in the Brazilian literature on protocols for randomized controlled trials to prevent obesity among youth. The current study may thus be an important initial contribution to the field.

  5. A Pilot Study Involving the Effect of Two Different Complex Training Protocols on Lower Body Power

    OpenAIRE

    Smith Chad E.; Lyons Brian; Hannon James C.

    2014-01-01

    Purpose. Complex training (CT) involves the coupling of two exercises ostensibly to enhance the effect of the second exercise. Typically, the first exercise is a strength exercise and the second exercise is a power exercise involving similar muscles. In most cases, CT is designed to enhance power. The purpose of this study was twofold. First, this study was designed to determine if lower body power could be enhanced using complex training protocols. Second, this study investigated whether the...

  6. Silanization of silica and glass slides for DNA microarrays by impregnation and gas phase protocols: A comparative study

    International Nuclear Information System (INIS)

    Phaner-Goutorbe, Magali; Dugas, Vincent; Chevolot, Yann; Souteyrand, Eliane

    2011-01-01

    Surface immobilization of oligonucleotide probes (oligoprobes) is a key issue in the development of DNA-chips. The immobilization protocol should guarantee good availability of the probes, low non-specific adsorption and reproducibility. We have previously reported a silanization protocol with tert-butyl-11-(dimethylamino)silylundecanoate performed by impregnation (Impregnation Protocol, IP) of silica substrates from dilute silane solutions, leading to surfaces bearing carboxylic groups. In this paper, the Impregnation protocol is compared with a Gas phase Protocol (GP) which is more suited to industrial requirements such as reliable and robust processing, cost efficiency, etc.... The morphology of the oligoprobe films at the nanoscale (characterized by Atomic Force Microscopy) and the reproducibility of subsequent oligoprobes immobilization steps have been investigated for the two protocols on thermal silica (Si/SiO 2 ) and glass slide substrates. IP leads to smooth surfaces whereas GP induces the formation of islands features suggesting a non-continuous silane layer. The reproducibility of the overall surface layer (18.75 mm 2 ) has been evaluated through the covalent immobilization of a fluorescent oligoprobes. Average fluorescent signals of 6 (a.u.) and 4 (a.u.) were observed for IP and GP, respectively, with a standard deviation of 1 for both protocols. Thus, despite a morphological difference of the silane layer at the nanometer scale, the density of the immobilized probes remained similar.

  7. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  8. Dosimetry study comparing NCS report-2 versus IAEA TRS-398 protocol for high energy photon beams

    International Nuclear Information System (INIS)

    Attalaa, E.M.; Khaled, N.E.; Abou Elenein, H.S.; Elsayed, A.A.

    2005-01-01

    In this work a dosimetry study is presented in which the results of absorbed dose determined at reference condition according to the IAEA TRS-398 protocol and the NCS report-2 are compared. The IAEA TRS-398 protocol for absorbed dose calibration is based on ionization chamber having absorbed dose to water calibration factor N d w, while the NCS-2 dosimetry report for absorbed dose calibration is based on an ionization chamber having air- kerma calibration factor N k . This study shows that the absorbed dose which is calculated with The IAEA TRS-398 formalisms is higher than that calculated with NCS report-2 formalisms within range from 0.4 to 0.9% in cobalt-60 beam as sensed by different ionization chambers, and from 0.2 to 1.1% for different higher energy photon beams of 6, 8 and 18 MV. The chambers used are PTW 30001, 30004, and NE-2571; which have calibration factors N k and N d w traceable to the BIPM (Bureau International des Poids et Mesures)

  9. An optimized DNA extraction protocol for benthic Didymosphenia geminata.

    Science.gov (United States)

    Uyua, Noelia Mariel; Manrique, Julieta Marina; Jones, Leandro Roberto

    2014-09-01

    Didymosphenia geminata mats display few cells in relation to extracellular material and contain polysaccharides and heavy metals that interfere with molecular studies. We describe an optimized DNA extraction protocol that help to overcome these difficulties. Our protocol outperformed five previously described DNA extraction techniques. Copyright © 2014 Elsevier B.V. All rights reserved.

  10. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  11. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  12. Electroacupuncture versus sham electroacupuncture for urinary retention in poststroke patients: study protocol for a multicenter, randomized controlled trial.

    Science.gov (United States)

    Shin, Seungwon; Lee, Jiwon; Yoo, Junghee; Lim, Sung Min; Lee, Euiju

    2016-04-12

    This study protocol evaluates the effectiveness of adjuvant electroacupuncture (EA) for urinary retention in poststroke patients undergoing conventional treatments, in comparison with that of a sham control. A multicenter, blinded, randomized controlled trial will be conducted in three hospitals in the Republic of Korea. We are recruiting 54 stroke survivors (aged >19 years), who were diagnosed with urinary retention based on the results of two consecutive post-void residual (PVR) tests, and dividing them randomly into two arms: the EA and Park-sham control groups. They will receive ten sessions of EA or sham treatment for 2 weeks. The participants will be blinded with non-penetrating needles and fake sounds of EA stimulators. The daily PVR ratio will be primarily measured at baseline and at the end of the study to statistically test the effectiveness of EA for poststroke urinary retention. Then, the Korean version of the Qualiveen Questionnaire, the Korean version of the International Prostate Symptom Score, and the blinding index will be assessed. After each EA session or sham EA, adverse events will be reported to evaluate the safety of EA. Results will be analyzed by using the independent t-test or Mann-Whitney U test, based on both intention-to-treat and per-protocol principles. The findings will provide clinical evidence for the effectiveness of EA treatment to improve urinary retention in stroke survivors. This study protocol was registered in ClinicalTrials.gov (NCT02472288) on 10 June 2015.

  13. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  14. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  15. The Physiological Bases of Hidden Noise-Induced Hearing Loss: Protocol for a Functional Neuroimaging Study.

    Science.gov (United States)

    Dewey, Rebecca Susan; Hall, Deborah A; Guest, Hannah; Prendergast, Garreth; Plack, Christopher J; Francis, Susan T

    2018-03-09

    Rodent studies indicate that noise exposure can cause permanent damage to synapses between inner hair cells and high-threshold auditory nerve fibers, without permanently altering threshold sensitivity. These demonstrations of what is commonly known as hidden hearing loss have been confirmed in several rodent species, but the implications for human hearing are unclear. Our Medical Research Council-funded program aims to address this unanswered question, by investigating functional consequences of the damage to the human peripheral and central auditory nervous system that results from cumulative lifetime noise exposure. Behavioral and neuroimaging techniques are being used in a series of parallel studies aimed at detecting hidden hearing loss in humans. The planned neuroimaging study aims to (1) identify central auditory biomarkers associated with hidden hearing loss; (2) investigate whether there are any additive contributions from tinnitus or diminished sound tolerance, which are often comorbid with hearing problems; and (3) explore the relation between subcortical functional magnetic resonance imaging (fMRI) measures and the auditory brainstem response (ABR). Individuals aged 25 to 40 years with pure tone hearing thresholds ≤20 dB hearing level over the range 500 Hz to 8 kHz and no contraindications for MRI or signs of ear disease will be recruited into the study. Lifetime noise exposure will be estimated using an in-depth structured interview. Auditory responses throughout the central auditory system will be recorded using ABR and fMRI. Analyses will focus predominantly on correlations between lifetime noise exposure and auditory response characteristics. This paper reports the study protocol. The funding was awarded in July 2013. Enrollment for the study described in this protocol commenced in February 2017 and was completed in December 2017. Results are expected in 2018. This challenging and comprehensive study will have the potential to impact diagnostic

  16. Group schema therapy for eating disorders: study protocol.

    Science.gov (United States)

    Calvert, Fiona; Smith, Evelyn; Brockman, Rob; Simpson, Susan

    2018-01-01

    The treatment of eating disorders is a difficult endeavor, with only a relatively small proportion of clients responding to and completing standard cognitive behavioural therapy (CBT). Given the prevalence of co-morbidity and complex personality traits in this population, Schema Therapy has been identified as a potentially viable treatment option. A case series of Group Schema Therapy for Eating Disorders (ST-E-g) yielded positive findings and the study protocol outlined in this article aims to extend upon these preliminary findings to evaluate group Schema Therapy for eating disorders in a larger sample ( n  = 40). Participants undergo a two-hour assessment where they complete a number of standard questionnaires and their diagnostic status is ascertained using the Eating Disorder Examination. Participants then commence treatment, which consists of 25 weekly group sessions lasting for 1.5 h and four individual sessions. Each group consists of five to eight participants and is facilitated by two therapists, at least one of who is a registered psychologist trained on schema therapy. The primary outcome in this study is eating disorder symptom severity. Secondary outcomes include: cognitive schemas, self-objectification, general quality of life, self-compassion, schema mode presentations, and Personality Disorder features. Participants complete psychological measures and questionnaires at pre, post, six-month and 1-year follow-up. This study will expand upon preliminary research into the efficacy of group Schema Therapy for individuals with eating disorders. If group Schema Therapy is shown to reduce eating disorder symptoms, it will hold considerable promise as an intervention option for a group of disorders that is typically difficult to treat. ACTRN12615001323516. Registered: 2/12/2015 (retrospectively registered, still recruiting).

  17. [Study protocol of a prevention of recurrent suicidal behaviour program based on case management (PSyMAC)].

    Science.gov (United States)

    Sáiz, Pilar A; Rodríguez-Revuelta, Julia; González-Blanco, Leticia; Burón, Patricia; Al-Halabí, Susana; Garrido, Marlen; García-Alvarez, Leticia; García-Portilla, Paz; Bobes, Julio

    2014-01-01

    Prevention of suicidal behaviour is a public health priority in the European Union. A previous suicide attempt is the best risk predictor for future attempts, as well as completed suicides. The primary aim of this article is to describe a controlled study protocol designed for prevention of recurrent suicidal behaviour that proposes case management, and includes a psychoeducation program, as compared with the standard intervention (PSyMAC). Patients admitted from January 2011 to June 2013 to the emergency room of the Hospital Universitario Central de Asturias were evaluated using a protocol including sociodemographic, psychiatric, and psychosocial assessment. Patients were randomly assigned to either a group receiving continuous case management including participation in a psychoeducation program (experimental group), or a control group receiving standard care. The primary objective is to examine whether or not the period of time until recurrent suicidal behaviour in the experimental group is significantly different from that of the control group. PSyMAC proposes low cost and easily adaptable interventions to the usual clinical setting that can help to compensate the shortcoming of specific action protocols and suicidal behaviour prevention programs in our country. The evaluation of PSyMAC results will determine their real effectivity as a case-magament program to reduce suicidal risk. Copyright © 2013 SEP y SEPB. Published by Elsevier España. All rights reserved.

  18. Examining recombinant human TSH primed {sup 131}I therapy protocol in patients with metastatic differentiated thyroid carcinoma: comparison with the traditional thyroid hormone withdrawal protocol

    Energy Technology Data Exchange (ETDEWEB)

    Rani, Deepa; Kaisar, Sushma; Awasare, Sushma; Kamaldeep; Abhyankar, Amit; Basu, Sandip [Bhabha Atomic Research Centre (BARC), Radiation Medicine Centre, Mumbai (India)

    2014-09-15

    Recombinant human thyroid-stimulating hormone (rhTSH)-based protocol is a promising recent development in the management of differentiated thyroid carcinoma (DTC). The objectives of this prospective study were: (1) to assess the feasibility and efficacy of the rhTSH primed {sup 131}I therapy protocol in patients with DTC with distant metastatic disease, (2) to perform lesional dosimetry in this group of patients compared to the traditional protocol, (3) to document the practical advantages (patient symptoms and hospital stay) of the rhTSH protocol compared to the traditional thyroid hormone withdrawal protocol, (4) to document and record any adverse effect of this strategy, (5) to compare the renal function parameters, and (6) to compare the serum TSH values achieved in either of the protocols in this group of patients. The study included 37 patients with metastatic DTC having lung or skeletal metastases or both. A comparison of lesional radiation absorbed dose, hospital stay, renal function tests, and symptom profile was undertaken between the traditional thyroid hormone withdrawal protocol and rhTSH-based therapy protocol. Dosimetric calculations of metastatic lesions were performed using lesion uptake and survey meter readings for calculation of effective half-life. Non-contrast-enhanced CT was used for assessment of tumor volume. Quality of life was assessed using the European Organization for Research and Treatment of Cancer (EORTC) QOL forms. A comparison of pretreatment withdrawal thyroglobulin (TG) was done with the withdrawal TG level 3 months after treatment. The mean effective half-life of {sup 131}I in metastatic lesions was less during the rhTSH protocol (29.49 h) compared to the thyroid hormone withdrawal protocol (35.48 h), but the difference was not statistically significant (p = 0.056). The mean 24-h % uptake of the lesions during the traditional protocol (4.84 %) was slightly higher than the 24-h % uptake during the rhTSH protocol (3.56 %), but

  19. Using the intervention mapping protocol to reduce European preschoolers’ sedentary behavior, an application to the ToyBox-Study

    Science.gov (United States)

    2014-01-01

    Background High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing on decreasing preschoolers’ sedentary behavior. The ToyBox-study focuses on the prevention of overweight in 4- to 6-year-old children by implementing a multi-component kindergarten-based intervention with family involvement in six different European countries. Methods Applying the Intervention Mapping Protocol, six different steps were systematically completed for the structured planning and development of the intervention. A literature search and results from focus groups with parents/caregivers and kindergarten teachers were used as a guide during the development of the intervention and the intervention materials. Results The application of the different steps in the Intervention Mapping Protocol resulted in the creation of matrices of change objectives, followed by the selection of practical applications for five different intervention tools that could be used at the individual level of the preschool child, at the interpersonal level (i.e., parents/caregivers) and at the organizational level (i.e., kindergarten teachers). No cultural differences regarding preschoolers’ sedentary behavior were identified between the participating countries during the focus groups, so cultural and local adaptations of the intervention materials were not necessary to improve the adoption and implementation of the intervention. Conclusions A systematic and evidence-based approach was used for the development of this kindergarten-based family-involved intervention targeting preschoolers, with

  20. Using the intervention mapping protocol to reduce European preschoolers' sedentary behavior, an application to the ToyBox-Study.

    Science.gov (United States)

    De Decker, Ellen; De Craemer, Marieke; De Bourdeaudhuij, Ilse; Verbestel, Vera; Duvinage, Kristin; Iotova, Violeta; Grammatikaki, Evangelia; Wildgruber, Andreas; Mouratidou, Theodora; Manios, Yannis; Cardon, Greet

    2014-02-19

    High levels of sedentary behavior are often measured in preschoolers, but only a few interventions have been developed to counteract this. Furthermore, detailed descriptions of interventions in preschoolers targeting different forms of sedentary behavior could not be located in the literature. The aim of the present paper was to describe the different steps of the Intervention Mapping Protocol used towards the development of an intervention component of the ToyBox-study focusing on decreasing preschoolers' sedentary behavior. The ToyBox-study focuses on the prevention of overweight in 4- to 6-year-old children by implementing a multi-component kindergarten-based intervention with family involvement in six different European countries. Applying the Intervention Mapping Protocol, six different steps were systematically completed for the structured planning and development of the intervention. A literature search and results from focus groups with parents/caregivers and kindergarten teachers were used as a guide during the development of the intervention and the intervention materials. The application of the different steps in the Intervention Mapping Protocol resulted in the creation of matrices of change objectives, followed by the selection of practical applications for five different intervention tools that could be used at the individual level of the preschool child, at the interpersonal level (i.e., parents/caregivers) and at the organizational level (i.e., kindergarten teachers). No cultural differences regarding preschoolers' sedentary behavior were identified between the participating countries during the focus groups, so cultural and local adaptations of the intervention materials were not necessary to improve the adoption and implementation of the intervention. A systematic and evidence-based approach was used for the development of this kindergarten-based family-involved intervention targeting preschoolers, with the inclusion of parental involvement. The

  1. Pulmonary CT angiography protocol adapted to the hemodynamic effects of pregnancy.

    LENUS (Irish Health Repository)

    Ridge, Carole A

    2012-02-01

    OBJECTIVE: The purpose of this study was to compare the image quality of a standard pulmonary CT angiography (CTA) protocol with a pulmonary CTA protocol optimized for use in pregnant patients with suspected pulmonary embolism (PE). MATERIALS AND METHODS: Forty-five consecutive pregnant patients with suspected PE were retrospectively included in the study: 25 patients (group A) underwent standard-protocol pulmonary CTA and 20 patients (group B) were imaged using a protocol modified for pregnancy. The modified protocol used a shallow inspiration breath-hold and a high concentration, high rate of injection, and high volume of contrast material. Objective image quality and subjective image quality were evaluated by measuring pulmonary arterial enhancement, determining whether there was transient interruption of the contrast bolus by unopacified blood from the inferior vena cava (IVC), and assessing diagnostic adequacy. RESULTS: Objective and subjective image quality were significantly better for group B-that is, for the group who underwent the CTA protocol optimized for pregnancy. Mean pulmonary arterial enhancement and the percentage of studies characterized as adequate for diagnosis were higher in group B than in group A: 321 +\\/- 148 HU (SD) versus 178 +\\/- 67 HU (p = 0.0001) and 90% versus 64% (p = 0.05), respectively. Transient interruption of contrast material by unopacified blood from the IVC was observed more frequently in group A (39%) than in group B (10%) (p = 0.05). CONCLUSION: A pulmonary CTA protocol optimized for pregnancy significantly improved image quality by increasing pulmonary arterial opacification, improving diagnostic adequacy, and decreasing transient interruption of the contrast bolus by unopacified blood from the IVC.

  2. Three-stage treatment protocol for recalcitrant distal femoral nonunion.

    Science.gov (United States)

    Ma, Ching-Hou; Chiu, Yen-Chun; Tu, Yuan-Kun; Yen, Cheng-Yo; Wu, Chin-Hsien

    2017-04-01

    In this study, we proposed a three-stage treatment protocol for recalcitrant distal femoral nonunion and aimed to analyze the clinical results. We retrospective reviewed 12 consecutive patients with recalcitrant distal femoral nonunion undergoing our three-stage treatment protocol from January 2010 to December 2014 in our institute. The three-stage treatment protocol comprised debridement of the nonunion site, lengthening to eliminate leg length discrepancy, deformity correction, stabilization with a locked plate, filling of the defect with cement spacer for inducing membrane formation, and bone reconstruction using a cancellous bone autograft (Masquelet technique) or free vascularized fibular bone graft. The bone union time, wound complication, lower limbs alignment, amount of lengthening, knee range of motion, and functional outcomes were evaluated. Osseous union with angular deformity lengthening was 5.88 cm (range 3.5-12 cm). Excellent or good outcomes were obtained in 9 patients. Although the current study involved only a small number of patients and the intervention comprised three stages, we believe that such a protocol may be a valuable alternative for the treatment of recalcitrant distal femoral nonunion.

  3. Evaluation of Interoperability Protocols in Repositories of Electronic Theses and Dissertations

    Science.gov (United States)

    Hakimjavadi, Hesamedin; Masrek, Mohamad Noorman

    2013-01-01

    Purpose: The purpose of this study is to evaluate the status of eight interoperability protocols within repositories of electronic theses and dissertations (ETDs) as an introduction to further studies on feasibility of deploying these protocols in upcoming areas of interoperability. Design/methodology/approach: Three surveys of 266 ETD…

  4. Order Entry Protocols Are an Amenable Target for Workflow Automation.

    Science.gov (United States)

    Tudor, James; Klochko, Chad; Patel, Milind; Siegal, Daniel

    2018-04-21

    Order entry protocol selection of advanced imaging studies is labor-intensive, can disrupt workflow, and may displace staff from more valuable tasks. The aim of this study was to explore and compare the behaviors of radiologic technologists and radiologists when determining protocol to identify opportunities for workflow automation. A data set of over 273,000 cross-sectional examination orders from four hospitals within our health system was created. From this data set, we isolated the 12 most frequently requested examinations, which represent almost 50% of the entirety of advanced imaging volume. Intergroup comparisons were made between behavior of radiologic technologists and radiologists or residents when determining protocol. Frequencies of changes were calculated. Common parameters of changed examinations were identified. The overall change rate for both radiologists and residents (4%) is very low and comparable to the overall change rate of radiologic technologists (1%). The change rates for the 12 most ordered examinations were calculated and compared individually. Most examinations that underwent change involved a patient with a low estimated glomerular filtration rate, a patient with a contrast allergy, or a provider ordering a general examination but in fact wanting an organ-specific protocol or an angiographic study. Order entry protocol selection of the most frequently ordered advanced imaging examinations was rarely a value-added activity because these examinations are rarely changed. Changes follow predictable patterns that make order entry protocol selection of most radiology orders for advanced imaging amenable to workflow automation. Copyright © 2018 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  5. The effectiveness of Korean medicine treatment in male patients with infertility: a study protocol for a prospective observational pilot study.

    Science.gov (United States)

    Kim, Kwan-Ii; Jo, Junyoung

    2018-01-01

    Male factor subfertility has increasingly been considered the cause of infertility in couples. Many men with male infertility have sperm problems such as oligozoospermia, asthenozoospermia, or teratozoospermia. Because abnormal semen parameters are idiopathic to some extent, no standard therapy has been established to date. Herbal medicine has been reported to have beneficial properties in the treatment of subfertility, especially in improving semen quality both in vivo and in human studies. Therefore, we intend to investigate the effectiveness and safety of treatment using Korean medicine (KM) for infertile male patients with poor semen quality.This will be a single-center, prospective, case-only observational pilot study. About 20 male patients with infertility who visit Conmaul Hospital of Korean Medicine will be recruited. We will follow the standard treatment protocol, which has shown good results in the treatment of male infertility. The protocol is composed mainly of a 10-week herbal decoction treatment; acupuncture and/or pharmacopuncture are added when needed. Semen samples, quality of life, and the scrotal temperatures of infertile men will be observed before and after the 10-week treatment with KM.The study has received ethical approval from the Public Institutional Review Board (approval number: P01-201708-21-008). The findings will be disseminated to appropriate audiences via peer-reviewed publication and conference presentations. Korean Clinical Trial Registry (CRIS), Republic of Korea: KCT0002611.

  6. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  7. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  8. Study protocol: Mother and Infant Nutritional Assessment (MINA) cohort study in Qatar and Lebanon.

    Science.gov (United States)

    Naja, Farah; Nasreddine, Lara; Al Thani, Al Anoud; Yunis, Khaled; Clinton, Michael; Nassar, Anwar; Farhat Jarrar, Sara; Moghames, Patricia; Ghazeeri, Ghina; Rahman, Sajjad; Al-Chetachi, Walaa; Sadoun, Eman; Lubbad, Nibal; Bashwar, Zelaikha; Bawadi, Hiba; Hwalla, Nahla

    2016-05-04

    The Middle East and North Africa region harbors significant proportions of stunting and wasting coupled with surging rates of non-communicable diseases (NCDs). Recent evidence identified nutrition during the first 1000 days of life as a common denominator not only for optimal growth but also for curbing the risk of NCDs later in life. The main objective of this manuscript is to describe the protocol of the first cohort in the region to investigate the association of nutrition imbalances early in life with birth outcomes, growth patterns, as well as early determinants of non-communicable diseases. More specifically the cohort aims to 1) examine the effects of maternal and early child nutrition and lifestyle characteristics on birth outcomes and growth patterns and 2) develop evidence-based nutrition and lifestyle guidelines for pregnant women and young children. A multidisciplinary team of researchers was established from governmental and private academic and health sectors in Lebanon and Qatar to launch the Mother and Infant Nutritional Assessment 3-year cohort study. Pregnant women (n = 250 from Beirut, n = 250 from Doha) in their first trimester are recruited from healthcare centers in Beirut, Lebanon and Doha, Qatar. Participants are interviewed three times during pregnancy (once every trimester) and seven times at and after delivery (when the child is 4, 6, 9, 12, 18, and 24 months old). Delivery and birth data is obtained from hospital records. Data collection includes maternal socio-demographic and lifestyle characteristics, dietary intake, anthropometric measurements, and household food security data. For biochemical assessment of various indicators of nutritional status, a blood sample is obtained from women during their first trimester. Breastfeeding and complementary feeding practices, dietary intake, as well as anthropometric measurements of children are also examined. The Delphi technique will be used for the development of the nutrition and lifestyle

  9. The UNC/UMN Baby Connectome Project (BCP): An overview of the study design and protocol development.

    Science.gov (United States)

    Howell, Brittany R; Styner, Martin A; Gao, Wei; Yap, Pew-Thian; Wang, Li; Baluyot, Kristine; Yacoub, Essa; Chen, Geng; Potts, Taylor; Salzwedel, Andrew; Li, Gang; Gilmore, John H; Piven, Joseph; Smith, J Keith; Shen, Dinggang; Ugurbil, Kamil; Zhu, Hongtu; Lin, Weili; Elison, Jed T

    2018-03-22

    The human brain undergoes extensive and dynamic growth during the first years of life. The UNC/UMN Baby Connectome Project (BCP), one of the Lifespan Connectome Projects funded by NIH, is an ongoing study jointly conducted by investigators at the University of North Carolina at Chapel Hill and the University of Minnesota. The primary objective of the BCP is to characterize brain and behavioral development in typically developing infants across the first 5 years of life. The ultimate goals are to chart emerging patterns of structural and functional connectivity during this period, map brain-behavior associations, and establish a foundation from which to further explore trajectories of health and disease. To accomplish these goals, we are combining state of the art MRI acquisition and analysis techniques, including high-resolution structural MRI (T1-and T2-weighted images), diffusion imaging (dMRI), and resting state functional connectivity MRI (rfMRI). While the overall design of the BCP largely is built on the protocol developed by the Lifespan Human Connectome Project (HCP), given the unique age range of the BCP cohort, additional optimization of imaging parameters and consideration of an age appropriate battery of behavioral assessments were needed. Here we provide the overall study protocol, including approaches for subject recruitment, strategies for imaging typically developing children 0-5 years of age without sedation, imaging protocol and optimization, a description of the battery of behavioral assessments, and QA/QC procedures. Combining HCP inspired neuroimaging data with well-established behavioral assessments during this time period will yield an invaluable resource for the scientific community. Copyright © 2018 Elsevier Inc. All rights reserved.

  10. Effective dose comparison between stitched and single FOV in CBCT protocols for complete dental arcade

    International Nuclear Information System (INIS)

    Soares, Maria Rosangela; Batista, Wilson Otto; Antonio, Patricia Lara de; Caldas, Linda V.E.; Maia, Ana F.

    2015-01-01

    Objective: The objective of this study was to assess and compare protocols with a single field of view and multiple stitched field of view with a similar clinical purpose by means of effective dose value. Materials and methods: Measurements of absorbed dose were performed with thermoluminescent dosemeters inserted in the position of organs/tissues of a female anthropomorphic phantom and from these values the effective dose was calculated, utilizing weighting factor tissue-ICRP 103 (2007). Results: The results obtained in this study for effective dose are within the range of 43.1 µSv and 111.5 µSv for equipment using protocols with single FOV and in the range of 44.5 µSv and 236.2 µSv for equipments that using protocols with stitched field of view. Conclusions: In terms of the value of effective dose, stitched FOV protocols do not have any advantage over the single field of view protocols. This results suggest the necessity for knowledge of the exposure parameters and effective dose values associated with each image protocol. - Highlights: • The study relies on the comparison of two protocols with similar goals of CBCT: stitched protocols and single protocols. • The stitched FOV protocol is more specific and it is good option when want imaging only of some dental units. • In relation the effective dose, single FOV protocols presents advantage over the stitched FOV protocols. • Know the exposure parameters and effective dose values associated with each image protocol is necessity for request the best CBCT tomographic image

  11. Factors and motivations associated with use of e-cigarette among primary care patients in a prospective cohort study: e-TAC study protocol

    OpenAIRE

    Kinouani, Sh?razade; Cast?ra, Philippe; Laporte, Catherine; P?tr?gne, Fran?ois; Gay, Bernard

    2016-01-01

    Introduction While the relationship between electronic cigarette use and smoking has often been studied, the association between electronic cigarette use and socioeconomic factors has received less attention. This is a study protocol aiming to describe the relationship between the consumption of psychoactive products (in particular: smoking) or some socioeconomic factors and the evolution of the use of electronic cigarette in primary healthcare over 1?year. Methods and analysis Electronic cig...

  12. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

    Science.gov (United States)

    You, Ilsun; Kwon, Soonhyun; Choudhary, Gaurav; Sharma, Vishal; Seo, Jung Taek

    2018-06-08

    The Internet of Things (IoT) utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN), but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN), which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security) is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO) and the Security-Enhanced Option (SEO). The protocol is validated through Burrows⁻Abadi⁻Needham (BAN) logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with the two

  13. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System

    Directory of Open Access Journals (Sweden)

    Ilsun You

    2018-06-01

    Full Text Available The Internet of Things (IoT utilizes algorithms to facilitate intelligent applications across cities in the form of smart-urban projects. As the majority of devices in IoT are battery operated, their applications should be facilitated with a low-power communication setup. Such facility is possible through the Low-Power Wide-Area Network (LPWAN, but at a constrained bit rate. For long-range communication over LPWAN, several approaches and protocols are adopted. One such protocol is the Long-Range Wide Area Network (LoRaWAN, which is a media access layer protocol for long-range communication between the devices and the application servers via LPWAN gateways. However, LoRaWAN comes with fewer security features as a much-secured protocol consumes more battery because of the exorbitant computational overheads. The standard protocol fails to support end-to-end security and perfect forward secrecy while being vulnerable to the replay attack that makes LoRaWAN limited in supporting applications where security (especially end-to-end security is important. Motivated by this, an enhanced LoRaWAN security protocol is proposed, which not only provides the basic functions of connectivity between the application server and the end device, but additionally averts these listed security issues. The proposed protocol is developed with two options, the Default Option (DO and the Security-Enhanced Option (SEO. The protocol is validated through Burrows–Abadi–Needham (BAN logic and the Automated Validation of Internet Security Protocols and Applications (AVISPA tool. The proposed protocol is also analyzed for overheads through system-based and low-power device-based evaluations. Further, a case study on a smart factory-enabled parking system is considered for its practical application. The results, in terms of network latency with reliability fitting and signaling overheads, show paramount improvements and better performance for the proposed protocol compared with

  14. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  15. Clinical Simulation: A Protocol for Evaluation of Mobile Technology.

    Science.gov (United States)

    Mather, Carey; Jensen, Sanne; Cummings, Elizabeth

    2017-01-01

    For mobile technology to be accepted at point of care in healthcare environments there is a need to demonstrate benefits whilst ameliorating the risks and challenges. To provide a standardised approach to evaluation of mobile technology a simulation protocol was developed to provide guidance for its use in healthcare environments. Simulated conditions provide the opportunity to assess intended and unintended consequences and identify potential workarounds when using technology. The protocol can also be used to demonstrate the importance of the development of digital professionalism by end-users prior to students entering the clinical practice setting. The mobile technology protocol was adapted from a health information systems protocol developed and used at the ITX Lab, Denmark for use in other simulation laboratories. Use case scenarios were developed to enable evaluation of mobile technology for mobile learning of nurses, nurse supervisors, students and patients. The scenarios can be used in a range of simulated environments including hospital bedside, outpatient clinic or community settings. A case study exemplar of a nurse and patient is included to demonstrate how the mobile technology protocol can be applied.

  16. Comparison of a fast 5-min knee MRI protocol with a standard knee MRI protocol. A multi-institutional multi-reader study

    Energy Technology Data Exchange (ETDEWEB)

    FitzGerald Alaia, Erin; Beltran, Luis S.; Garwood, Elisabeth; Burke, Christopher J.; Gyftopoulos, Soterios [NYU Langone Medical Center, Department of Radiology, Musculoskeletal Division, New York, NY (United States); Benedick, Alex [Case Western Reserve University, School of Medicine, Cleveland, OH (United States); Obuchowski, Nancy A. [Cleveland Clinic, Department of Quantitative Health Sciences, Cleveland, OH (United States); Polster, Joshua M.; Schils, Jean; Subhas, Naveen [Cleveland Clinic, Department of Radiology, Musculoskeletal Division, Cleveland, OH (United States); Chang, I. Yuan Joseph [Texas Scottish Rite Hospital for Children, Dallas, TX (United States)

    2018-01-15

    To compare diagnostic performance of a 5-min knee MRI protocol to that of a standard knee MRI. One hundred 3 T (100 patients, mean 38.8 years) and 50 1.5 T (46 patients, mean 46.4 years) MRIs, consisting of 5 fast, 2D multi-planar fast-spin-echo (FSE) sequences and five standard multiplanar FSE sequences, from two academic centers (1/2015-1/2016), were retrospectively reviewed by four musculoskeletal radiologists. Agreement between fast and standard (interprotocol agreement) and between standard (intraprotocol agreement) readings for meniscal, ligamentous, chondral, and bone pathology was compared for interchangeability. Frequency of major findings, sensitivity, and specificity was also tested for each protocol. Interprotocol agreement using fast MRI was similar to intraprotocol agreement with standard MRI (83.0-99.5%), with no excess disagreement (≤ 1.2; 95% CI, -4.2 to 3.8%), across all structures. Frequency of major findings (1.1-22.4% across structures) on fast and standard MRI was not significantly different (p ≥ 0.215), except more ACL tears on fast MRI (p = 0.021) and more cartilage defects on standard MRI (p < 0.001). Sensitivities (59-100%) and specificities (73-99%) of fast and standard MRI were not significantly different for meniscal and ligament tears (95% CI for difference, -0.08-0.08). For cartilage defects, fast MRI was slightly less sensitive (95% CI for difference, -0.125 to -0.01) but slightly more specific (95% CI for difference, 0.01-0.5) than standard MRI. A fast 5-min MRI protocol is interchangeable with and has similar accuracy to a standard knee MRI for evaluating internal derangement of the knee. (orig.)

  17. Comparison of a fast 5-min knee MRI protocol with a standard knee MRI protocol. A multi-institutional multi-reader study

    International Nuclear Information System (INIS)

    FitzGerald Alaia, Erin; Beltran, Luis S.; Garwood, Elisabeth; Burke, Christopher J.; Gyftopoulos, Soterios; Benedick, Alex; Obuchowski, Nancy A.; Polster, Joshua M.; Schils, Jean; Subhas, Naveen; Chang, I. Yuan Joseph

    2018-01-01

    To compare diagnostic performance of a 5-min knee MRI protocol to that of a standard knee MRI. One hundred 3 T (100 patients, mean 38.8 years) and 50 1.5 T (46 patients, mean 46.4 years) MRIs, consisting of 5 fast, 2D multi-planar fast-spin-echo (FSE) sequences and five standard multiplanar FSE sequences, from two academic centers (1/2015-1/2016), were retrospectively reviewed by four musculoskeletal radiologists. Agreement between fast and standard (interprotocol agreement) and between standard (intraprotocol agreement) readings for meniscal, ligamentous, chondral, and bone pathology was compared for interchangeability. Frequency of major findings, sensitivity, and specificity was also tested for each protocol. Interprotocol agreement using fast MRI was similar to intraprotocol agreement with standard MRI (83.0-99.5%), with no excess disagreement (≤ 1.2; 95% CI, -4.2 to 3.8%), across all structures. Frequency of major findings (1.1-22.4% across structures) on fast and standard MRI was not significantly different (p ≥ 0.215), except more ACL tears on fast MRI (p = 0.021) and more cartilage defects on standard MRI (p < 0.001). Sensitivities (59-100%) and specificities (73-99%) of fast and standard MRI were not significantly different for meniscal and ligament tears (95% CI for difference, -0.08-0.08). For cartilage defects, fast MRI was slightly less sensitive (95% CI for difference, -0.125 to -0.01) but slightly more specific (95% CI for difference, 0.01-0.5) than standard MRI. A fast 5-min MRI protocol is interchangeable with and has similar accuracy to a standard knee MRI for evaluating internal derangement of the knee. (orig.)

  18. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  19. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  20. Input of Psychosocial Information During Multidisciplinary Team Meetings at Medical Oncology Departments: Protocol for an Observational Study.

    Science.gov (United States)

    Horlait, Melissa; Van Belle, Simon; Leys, Mark

    2018-02-26

    Multidisciplinary team meetings (MDTMs) have become standard practice in oncology and gained the status of the key decision-making forum for cancer patient management. The current literature provides evidence that MDTMs are achieving their intended objectives but there are also indications to question the positive impact of MDTMs in oncology settings. For cancer management to be patient-centered, it is crucial that medical information as well as psychosocial aspects-such as the patients' living situation, possible family problems, patients' mental state, and patients' perceptions and values or preferences towards treatment or care-are considered and discussed during MDTMs. Previous studies demonstrate that failure to account for patients' psychosocial information has a negative impact on the implementation of the treatment recommendations formulated during MDTMs. Few empirical studies have demonstrated the predominant role of physicians during MDTMs, leading to the phenomenon that medical information is shared almost exclusively at the expense of psychosocial information. However, more in-depth insight on the underlying reasons why MDTMs fail to take into account psychosocial information of cancer patients is needed. This paper presents a research protocol for a cross-sectional observational study that will focus on exploring the barriers to considering psychosocial information during MDTMs at medical oncology departments. This protocol encompasses a cross-sectional comparative case study of MDTMs at medical oncology departments in Flanders, Belgium. MDTMs from various oncology subspecialties at inpatient medical oncology departments in multiple hospitals (academic as well as general hospitals) are compared. The observations focus on the "multidisciplinary oncology consultation" (MOC), a formally regulated and financed type of MDTM in Belgian oncology since 2003. Data are collected through nonparticipant observations of MOC-meetings. Observational data are

  1. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  2. Protocol compliance and time management in blunt trauma resuscitation.

    Science.gov (United States)

    Spanjersberg, W R; Bergs, E A; Mushkudiani, N; Klimek, M; Schipper, I B

    2009-01-01

    To study advanced trauma life support (ATLS) protocol adherence prospectively in trauma resuscitation and to analyse time management of daily multidisciplinary trauma resuscitation at a level 1 trauma centre, for both moderately and severely injured patients. All victims of severe blunt trauma were consecutively included. Patients with a revised trauma score (RTS) of 12 were resuscitated by a "minor trauma" team and patients with an RTS of less than 12 were resuscitated by a "severe trauma" team. Digital video recordings were used to analyse protocol compliance and time management during initial assessment. From 1 May to 1 September 2003, 193 resuscitations were included. The "minor trauma" team assessed 119 patients, with a mean injury severity score (ISS) of 7 (range 1-45). Overall protocol compliance was 42%, ranging from 0% for thoracic percussion to 93% for thoracic auscultation. The median resuscitation time was 45.9 minutes (range 39.7-55.9). The "severe team" assessed 74 patients, with a mean ISS of 22 (range 1-59). Overall protocol compliance was 53%, ranging from 4% for thoracic percussion to 95% for thoracic auscultation. Resuscitation took 34.8 minutes median (range 21.6-44.1). Results showed the current trauma resuscitation to be ATLS-like, with sometimes very low protocol compliance rates. Timing of secondary survey and radiology and thus time efficiency remains a challenge in all trauma patients. To assess the effect of trauma resuscitation protocols on outcome, protocol adherence needs to be improved.

  3. Development of a manualized protocol of massage therapy for clinical trials in osteoarthritis

    Directory of Open Access Journals (Sweden)

    Ali Ather

    2012-10-01

    Full Text Available Abstract Background Clinical trial design of manual therapies may be especially challenging as techniques are often individualized and practitioner-dependent. This paper describes our methods in creating a standardized Swedish massage protocol tailored to subjects with osteoarthritis of the knee while respectful of the individualized nature of massage therapy, as well as implementation of this protocol in two randomized clinical trials. Methods The manualization process involved a collaborative process between methodologic and clinical experts, with the explicit goals of creating a reproducible semi-structured protocol for massage therapy, while allowing some latitude for therapists’ clinical judgment and maintaining consistency with a prior pilot study. Results The manualized protocol addressed identical specified body regions with distinct 30- and 60-min protocols, using standard Swedish strokes. Each protocol specifies the time allocated to each body region. The manualized 30- and 60-min protocols were implemented in a dual-site 24-week randomized dose-finding trial in patients with osteoarthritis of the knee, and is currently being implemented in a three-site 52-week efficacy trial of manualized Swedish massage therapy. In the dose-finding study, therapists adhered to the protocols and significant treatment effects were demonstrated. Conclusions The massage protocol was manualized, using standard techniques, and made flexible for individual practitioner and subject needs. The protocol has been applied in two randomized clinical trials. This manualized Swedish massage protocol has real-world utility and can be readily utilized both in the research and clinical settings. Trial registration Clinicaltrials.gov NCT00970008 (18 August 2009

  4. The studsvik BNCT project: structure and the proposed protocols

    International Nuclear Information System (INIS)

    Capala, J.; Stenstam, B.H.; Skoeld, K.; Henriksson, R.; Salford, L.; Carlsson, J.

    2000-01-01

    The BNCT facility at Studsvik is now ready for clinical trials. Scientific operations of the Studsvik BNCT project are overseen by the Scientific Advisory Board comprised of representatives of all major universities in Sweden. Furthermore, special task groups for clinical and preclinical studies have been formed to facilitate collaboration with academia and to assure the quality of the research. Proposed clinical Phase II trials for glioblastoma are sponsored by the Swedish National Neuro-Oncology Group and, initially, will involve two protocols: Protocol no.1. BNCT for glioblastoma patients who have not received any therapy other than surgery (including stereotactic biopsy only). Protocol no.2. BNCT as a palliative treatment for patients with recurrent glioblastoma following conventional therapies or BNCT. In both protocols, BPA, administered by a 6 hour i.v. infusion, will be used as the boron delivery agent. (author)

  5. Markedly improved outcomes and acceptable toxicity in adolescents and young adults with acute lymphoblastic leukemia following treatment with a pediatric protocol: a phase II study by the Japan Adult Leukemia Study Group

    International Nuclear Information System (INIS)

    Hayakawa, F; Sakura, T; Yujiri, T; Kondo, E; Fujimaki, K; Sasaki, O; Miyatake, J; Handa, H; Ueda, Y; Aoyama, Y; Takada, S; Tanaka, Y; Usui, N; Miyawaki, S; Suenobu, S; Horibe, K; Kiyoi, H; Ohnishi, K; Miyazaki, Y; Ohtake, S; Kobayashi, Y; Matsuo, K; Naoe, T

    2014-01-01

    The superiority of the pediatric protocol for adolescents with acute lymphoblastic leukemia (ALL) has already been demonstrated, however, its efficacy in young adults remains unclear. The ALL202-U protocol was conducted to examine the efficacy and feasibility of a pediatric protocol in adolescents and young adults (AYAs) with BCR–ABL-negative ALL. Patients aged 15–24 years (n=139) were treated with the same protocol used for pediatric B-ALL. The primary objective of this study was to assess the disease-free survival (DFS) rate and its secondary aims were to assess toxicity, the complete remission (CR) rate and the overall survival (OS) rate. The CR rate was 94%. The 5-year DFS and OS rates were 67% (95% confidence interval (CI) 58–75%) and 73% (95% CI 64–80%), respectively. Severe adverse events were observed at a frequency that was similar to or lower than that in children treated with the same protocol. Only insufficient maintenance therapy significantly worsened the DFS (hazard ratio 5.60, P<0.001). These results indicate that this protocol may be a feasible and highly effective treatment for AYA with BCR–ABL-negative ALL

  6. Evaluation of Protocol Uniformity Concerning Laparoscopic Cholecystectomy in The Netherlands

    Science.gov (United States)

    Goossens, Richard H. M.; van Eijk, Daan J.; Lange, Johan F.

    2008-01-01

    Background Iatrogenic bile duct injury remains a current complication of laparoscopic cholecystectomy. One uniform and standardized protocol, based on the “critical view of safety” concept of Strasberg, should reduce the incidence of this complication. Furthermore, owing to the rapid development of minimally invasive surgery, technicians are becoming more frequently involved. To improve communication between the operating team and technicians, standardized actions should also be defined. The aim of this study was to compare existing protocols for laparoscopic cholecystectomy from various Dutch hospitals. Methods Fifteen Dutch hospitals were contacted for evaluation of their protocols for laparoscopic cholecystectomy. All evaluated protocols were divided into six steps and were compared accordingly. Results In total, 13 hospitals responded—5 academic hospitals, 5 teaching hospitals, 3 community hospitals—of which 10 protocols were usable for comparison. Concerning the trocar positions, only minor differences were found. The concept of “critical view of safety” was represented in just one protocol. Furthermore, the order of clipping and cutting the cystic artery and duct differed. Descriptions of instruments and apparatus were also inconsistent. Conclusions Present protocols differ too much to define a universal procedure among surgeons in The Netherlands. The authors propose one (inter)national standardized protocol, including standardized actions. This uniform standardized protocol has to be officially released and recommended by national scientific associations (e.g., the Dutch Society of Surgery) or international societies (e.g., European Association for Endoscopic Surgery and Society of American Gastrointestinal and Endoscopic Surgeons). The aim is to improve patient safety and professional communication, which are necessary for new developments. PMID:18224485

  7. Fluid resuscitation for major burn patients with the TMMU protocol.

    Science.gov (United States)

    Luo, Gaoxing; Peng, Yizhi; Yuan, Zhiqiang; Cheng, Wenguang; Wu, Jun; Tang, Jin; Huang, Yuesheng; Fitzgerald, Mark

    2009-12-01

    Fluid resuscitation is one of the critical treatments for the major burn patient in the early phases after injury. We evaluated the practice of fluid resuscitation for severely burned patients with the Third Military Medical University (TMMU) protocol, which is most widely used in many regions of China. Patients with major burns (>30% total body surface area (TBSA)) presenting to Southwest Hospital, Third Military Medical University, between January 2005 and October 2007, were included in this study. Fluid resuscitation was initiated by the TMMU protocol. A total of 71 patients were (46 adults and 25 children) included in this study. All patients survived the first 48 h after injury smoothly and none developed abdominal compartment syndrome or other recognised complications associated with fluid resuscitation. The average quantity of fluid infused was 3.3-61.33% more than that calculated based on the TMMU protocol in both adult and paediatric groups. The average urine output during the first 24h after injury was about 1.2 ml per kg body weight per hour in the two groups, but reached 1.2 ml and 1.7 ml during the second 24h in adult and pediatric groups, respectively. This study indicates that the TMMU protocol for fluid resuscitation is a feasible option for burn patients. Individualised resuscitation - guided by the physiological response to fluid administration - is still important as in other protocols.

  8. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  9. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  10. How to write a surgical clinical research protocol: literature review and practical guide.

    Science.gov (United States)

    Rosenthal, Rachel; Schäfer, Juliane; Briel, Matthias; Bucher, Heiner C; Oertli, Daniel; Dell-Kuster, Salome

    2014-02-01

    The study protocol is the core document of every clinical research project. Clinical research in studies involving surgical interventions presents some specific challenges, which need to be accounted for and described in the study protocol. The aim of this review is to provide a practical guide for developing a clinical study protocol for surgical interventions with a focus on methodologic issues. On the basis of an in-depth literature search of methodologic literature and on some cardinal published surgical trials and observational studies, the authors provides a 10-step guide for developing a clinical study protocol in surgery. This practical guide outlines key methodologic issues important when planning an ethically and scientifically sound research project involving surgical interventions, with the ultimate goal of providing high-level evidence relevant for health care decision making in surgery. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  12. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Science.gov (United States)

    Wen, Shameng; Meng, Qingkun; Feng, Chao; Tang, Chaojing

    2017-01-01

    Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  13. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  14. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  15. Double-loop Learning: A Coaching Protocol for Enhancing Principal Instructional Leadership

    Directory of Open Access Journals (Sweden)

    Gary W. Houchens

    2012-10-01

    Full Text Available Executive coaching has become increasingly commonplace in both the corporate and non-profit sectors as a means of improving professional effectiveness but there is a dearth of empirically-based protocols geared specifically toward the growth needs of school principals. This qualitative case study explores the implementation of a principal coaching protocol using a theories of practice framework based on concepts originally articulated by Argyris and Schön (1974 and further explicated by the authors in previous publications. This study examined the extent to which a coaching protocol based on theories of practice enhanced principals’ self-perceived capacity for reflection and effective instructional leadership. Findings suggest that principals valued the structure, feedback, and reflective dimensions of the protocol and found their confidence level about an important instructional leadership problem – how to support and assist struggling teachers improve their teaching practice – was greatly enhanced. Implications for further iterations of the coaching protocol, as well as future directions of research on principal professional growth, are discussed.

  16. Evaluation of an adult insulin infusion protocol at an academic medical center.

    Science.gov (United States)

    Petrov, Katerina I; Burns, Tammy L; Drincic, Andjela

    2012-05-01

    Acknowledging evidence of possible detrimental effects of tightly controlled blood glucose levels, the American Association of Clinical Endocrinologists and the American Diabetes Association published a consensus statement recommending less strict control for most diabetic patients. As a result of these recommendations, our academic center at Creighton University Medical Center revised its adult insulin infusion protocol to target blood glucose levels ranging from 120 to 180 mg/dL for regular (standard) glycemic control and 80 to 120 mg/dL for tight control; previous targets had ranged from 80 to 180 mg/dL and 70 to 110 mg/dL, respectively. The primary objective was to evaluate the time that blood glucose values were within the target range for patients receiving the new protocol, compared with patients receiving the previous protocol. Our study was designed to evaluate the effectiveness and safety of the revised protocol. Using a retrospective chart review, we collected data for 4 months from patients on the old insulin protocol (May to August 2009) and for 4 months from patients on the new protocol (September to December 2009). Secondary endpoints included the number of hypoglycemic episodes (blood glucose below 70 mg/dL) and severe hypoglycemic episodes (blood glucose 40 mg/dL or lower) experienced by patients receiving the new insulin protocol compared with those receiving the former protocol. Patient characteristics were similar at baseline. Blood glucose values stayed within the target range for a significantly shorter time with the new protocol than with the former protocol (44.6% vs. 56.8%, respectively; P protocol. No statistically significant differences in hypoglycemia were observed after the protocol was changed. Hypoglycemia occurred in 31% of the former-protocol patients compared with 18% of the revised-protocol patients. Severe hypoglycemia was experienced by 2.1% of patients on the old protocol and by 3.1% of patients on the new protocol. Rates of

  17. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  18. Benefit of carbohydrate deficient transferrin in detecting chronic alcohol abuse in the elderly: study protocol for a multicentre, non-randomized, open-label study

    Directory of Open Access Journals (Sweden)

    Cécile Schnell

    2016-01-01

    Ethics: The Committee for the Protection of Persons located in Strasbourg, France, delivered a favourable opinion on the study project. Informed consent: The physician or the health network′s care coordinator informs the patient about the study protocol and obtains the patient′s assent. The investigator completes a non-opposition file and a copy is given to the patient and to his/her relative or helper.

  19. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  20. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  1. Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Arafatur RAHMAN

    2009-01-01

    Full Text Available Wireless Mesh Networks (WMNs have recently gained a lot of popularity due to their rapid deployment and instant communication capabilities. WMNs are dynamically self-organizing, self-configuring and self-healing with the nodes in the network automatically establishing an adiej hoc network and preserving the mesh connectivity. Designing a routing protocol for WMNs requires several aspects to consider, such as wireless networks, fixed applications, mobile applications, scalability, better performance metrics, efficient routing within infrastructure, load balancing, throughput enhancement, interference, robustness etc. To support communication, various routing protocols are designed for various networks (e.g. ad hoc, sensor, wired etc.. However, all these protocols are not suitable for WMNs, because of the architectural differences among the networks. In this paper, a detailed simulation based performance study and analysis is performed on the reactive routing protocols to verify the suitability of these protocols over such kind of networks. Ad Hoc On-Demand Distance Vector (AODV, Dynamic Source Routing (DSR and Dynamic MANET On-demand (DYMO routing protocol are considered as the representative of reactive routing protocols. The performance differentials are investigated using varying traffic load and number of source. Based on the simulation results, how the performance of each protocol can be improved is also recommended.

  2. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  3. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  4. Training conversation partners of persons with communication disorders related to Parkinson's disease--a protocol and a pilot study.

    Science.gov (United States)

    Forsgren, Emma; Antonsson, Malin; Saldert, Charlotta

    2013-07-01

    This paper reports on the adaptation of a training programme for conversation partners of persons with Parkinson's disease, and a protocol for assessment of possible changes in conversational interaction as a result of intervention. We present data from an explorative multiple case study with three individuals with Parkinson's disease and their spouses. Repeated analysis of natural conversational interaction and measures of the participants' perception of communication as well as measures of different cognitive abilities were obtained. The results show that the communication in all three dyads was affected by both speech and language problems and that the conversation training model and the assessment protocol may work well after minor adjustments. Influence of different aspects of cognition on communication is discussed.

  5. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  6. Use of limited MR protocol (coronal STIR) in the evaluation of patients with hip pain

    International Nuclear Information System (INIS)

    Khoury, N.J.; Birjawi, G.A.; Hourani, M.H.; Chaaya, M.

    2003-01-01

    To assess the role of a limited MR protocol (coronal STIR) as the initial part of the MR examination in patients with hip pain. Eighty-five patients presenting with hip pain, and normal radiographs of the pelvis, and who underwent our full MR protocol for hips were included retrospectively in the study. The full protocol consists of coronal T1-weighted and short tau inversion-recovery (STIR), and axial T2-weighted sequences. Ninety-three MR examinations were performed. Two radiologists interpreted the STIR (limited) examinations and the full studies separately, masked to each other's findings and to the final diagnosis. Comparison between the two protocols was then undertaken. For both readers, all normal MR examinations on the coronal STIR limited protocol were normal on the full protocol, with an interobserver reliability of 0.96. The STIR protocol was able to detect the presence or absence of an abnormality in 100% of cases (sensitivity). The STIR-only protocol provided a specific diagnosis in only 65% of cases (specificity). A normal coronal STIR study of the hips in patients with hip pain and normal radiographs precludes the need for further pelvic MR sequences. Any abnormality detected on this limited protocol should be further assessed by additional MR sequences. (orig.)

  7. The Fangshan/Family-based Ischemic Stroke Study In China (FISSIC protocol

    Directory of Open Access Journals (Sweden)

    Chen Dafang

    2007-09-01

    Full Text Available Abstract Background The exact etiology of ischemic stroke remains unclear, because multiple genetic predispositions and environmental risk factors may be involved, and their interactions dictate the complexity. Family-based studies provide unique features in design, while they are currently underrepresented for studies of ischemic stroke in developing countries. The Fangshan/Family-based Ischemic Stroke Study In China (FISSIC program aims to conduct a genetic pedigree study of ischemic stroke in rural communities of China. Methods/Design The pedigrees of ischemic stroke with clear documentation are recruited by using the proband-initiated contact method, based on the stroke registry in hospital and communities. Blood samples and detailed information of pedigrees are collected through the health care network in the rural area, and prospective follow-up of the pedigrees cohort is scheduled. Complementary strategies of both family-based design and matched case-spousal control design are used, and comprehensive statistical methods will be implemented to ascertain potential complex genetic and environmental factors and their interactions as well. Discussion This study is complementary to other genetic pedigree studies of ischemic stroke, such as the Siblings With Ischemic Stroke Study (SWISS, which are established in developed countries. We describe the protocol of this family-based genetic epidemiological study that may be used as a new practical guideline and research paradigm in developing countries and facilitate initiatives of stroke study for international collaborations.

  8. Taking the Politics Out of Satellite and Space-Based Communications Protocols

    Science.gov (United States)

    Ivancic, William D.

    2006-01-01

    After many years of studies, experimentation, and deployment, large amounts of misinformation and misconceptions remain regarding applicability of various communications protocols for use in satellite and space-based networks. This paper attempts to remove much of the politics, misconceptions, and misinformation that have plagued spacebased communications protocol development and deployment. This paper provides a common vocabulary for communications; a general discussion of the requirements for various communication environments; an evaluation of tradeoffs between circuit and packet-switching technologies, and the pros and cons of various link, network, transport, application, and security protocols. Included is the applicability of protocol enhancing proxies to NASA, Department of Defense (DOD), and commercial space communication systems.

  9. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  10. Nationwide cross-sectional survey of schistosomiasis and soil-transmitted helminthiasis in Sudan: study protocol.

    Science.gov (United States)

    Cha, Seungman; Hong, Sung-Tae; Lee, Young-Ha; Lee, Keon Hoon; Cho, Dae Seong; Lee, Jinmoo; Chai, Jong-Yil; Elhag, Mousab Siddig; Khaled, Soheir Gabralla Ahmad; Elnimeiri, Mustafa Khidir Mustafa; Siddig, Nahid Abdelgadeir Ali; Abdelrazig, Hana; Awadelkareem, Sarah; Elshafie, Azza Tag Eldin; Ismail, Hassan Ahmed Hassan Ahmed; Amin, Mutamad

    2017-09-12

    Schistosomiasis and soil-transmitted helminthiasis (STHs) are target neglected tropical diseases (NTDs) of preventive chemotherapy, but the control and elimination of these diseases have been impeded due to resource constraints. Few reports have described study protocol to draw on when conducting a nationwide survey. We present a detailed methodological description of the integrated mapping of schistosomiasis and STHs on the basis of our experiences, hoping that this protocol can be applied to future surveys in similar settings. In addition to determining the ecological zones requiring mass drug administration interventions, we aim to provide precise estimates of the prevalence of these diseases. A school-based cross-sectional design will be applied for the nationwide survey across Sudan. The survey is designed to cover all districts in every state. We have divided each district into 3 different ecological zones depending on proximity to bodies of water. We will employ a probability-proportional-to-size sampling method for schools and systematic sampling for student selection to provide adequate data regarding the prevalence for schistosomiasis and STHs in Sudan at the state level. A total of 108,660 students will be selected from 1811 schools across Sudan. After the survey is completed, 391 ecological zones will be mapped out. To carry out the survey, 655 staff members were recruited. The feces and urine samples are microscopically examined by the Kato-Katz method and the sediment smears for helminth eggs respectively. For quality control, a minimum of 10% of the slides will be rechecked by the federal supervisors in each state and also 5% of the smears are validated again within one day by independent supervisors. This nationwide mapping is expected to generate important epidemiological information and indicators about schistosomiasis and STHs that will be useful for monitoring and evaluating the control program. The mapping data will also be used for overviewing

  11. From Protocols to Publications: A Study in Selective Reporting of Outcomes in Randomized Trials in Oncology

    Science.gov (United States)

    Raghav, Kanwal Pratap Singh; Mahajan, Sminil; Yao, James C.; Hobbs, Brian P.; Berry, Donald A.; Pentz, Rebecca D.; Tam, Alda; Hong, Waun K.; Ellis, Lee M.; Abbruzzese, James; Overman, Michael J.

    2015-01-01

    Purpose The decision by journals to append protocols to published reports of randomized trials was a landmark event in clinical trial reporting. However, limited information is available on how this initiative effected transparency and selective reporting of clinical trial data. Methods We analyzed 74 oncology-based randomized trials published in Journal of Clinical Oncology, the New England Journal of Medicine, and The Lancet in 2012. To ascertain integrity of reporting, we compared published reports with their respective appended protocols with regard to primary end points, nonprimary end points, unplanned end points, and unplanned analyses. Results A total of 86 primary end points were reported in 74 randomized trials; nine trials had greater than one primary end point. Nine trials (12.2%) had some discrepancy between their planned and published primary end points. A total of 579 nonprimary end points (median, seven per trial) were planned, of which 373 (64.4%; median, five per trial) were reported. A significant positive correlation was found between the number of planned and nonreported nonprimary end points (Spearman r = 0.66; P < .001). Twenty-eight studies (37.8%) reported a total of 65 unplanned end points; 52 (80.0%) of which were not identified as unplanned. Thirty-one (41.9%) and 19 (25.7%) of 74 trials reported a total of 52 unplanned analyses involving primary end points and 33 unplanned analyses involving nonprimary end points, respectively. Studies reported positive unplanned end points and unplanned analyses more frequently than negative outcomes in abstracts (unplanned end points odds ratio, 6.8; P = .002; unplanned analyses odd ratio, 8.4; P = .007). Conclusion Despite public and reviewer access to protocols, selective outcome reporting persists and is a major concern in the reporting of randomized clinical trials. To foster credible evidence-based medicine, additional initiatives are needed to minimize selective reporting. PMID:26304898

  12. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  13. Quantum broadcast communication and authentication protocol with a quantum one-time pad

    International Nuclear Information System (INIS)

    Chang Yan; Xu Chun-Xiang; Zhang Shi-Bin; Yan Li-Li

    2014-01-01

    A quantum broadcast communication and authentication protocol with a quantum one-time pad based on the Greenberger—Horne—Zeilinger state is proposed. A binary string is used to express the identity of the receiver, which is encoded as a single sequence of photons. The encoded photon sequence acts as a detection sequence and implements authentication. An XOR operation serves as a one-time pad and is used to ensure the security of the protocol. The binary string is reused even in a noisy channel and proves to be unconditionally secure. In contrast with the protocols proposed by Wang et al. [Chin. Phys. 16 1868 (2007)] and Yang et al. [Chin. Phys. B 19 070304 (2010)], the protocol in this study implements the identity authentication with a reusable binary string; no hash function or local unitary operation is used. The protocol in this study is also easier to implement and highly efficient without losing security. (general)

  14. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  15. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

    Directory of Open Access Journals (Sweden)

    Shameng Wen

    Full Text Available Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.

  16. Differences in handgrip strength protocols to identify sarcopenia and frailty - a systematic review.

    Science.gov (United States)

    Sousa-Santos, A R; Amaral, T F

    2017-10-16

    Hand grip strength (HGS) is used for the diagnosis of sarcopenia and frailty. Several factors have been shown to influence HGS values during measurement. Therefore, variations in the protocols used to assess HGS, as part of the diagnosis of sarcopenia and frailty, may lead to the identification of different individuals with low HGS, introducing bias. The aim of this systematic review is to gather all the relevant studies that measured HGS to diagnose sarcopenia and frailty and to identify the differences between the protocols used. A systematic review was carried out following the recommendations of The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Statement. PubMed and Web of Science were systematically searched, until August 16, 2016. The evidence regarding HGS measurement protocols used to diagnose sarcopenia and frailty was summarised and the most recent protocols regarding the procedure were compared. From the described search 4393 articles were identified. Seventy-two studies were included in this systematic review, in which 37 referred to sarcopenia articles, 33 to frailty and two evaluated both conditions. Most studies presented limited information regarding the protocols used. The majority of the studies included did not describe a complete procedure of HGS measurement. The high heterogeneity between the protocols used, in sarcopenia and frailty studies, create an enormous difficulty in drawing comparative conclusions among them.

  17. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair.

    Science.gov (United States)

    Lightsey, Harry M; Kantrowitz, David E; Swindell, Hasani W; Trofa, David P; Ahmad, Christopher S; Lynch, T Sean

    2018-02-01

    The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Cross-sectional study. Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises. Fifteen protocols (43%) required completion of

  18. Sponge-Like: A New Protocol for Preparing Bacterial Ghosts

    Directory of Open Access Journals (Sweden)

    Amro A. Amara

    2013-01-01

    Full Text Available Bacterial Ghosts (BGs received an increasing interest in the recent years for their promising medicinal and pharmaceutical applications. In this study, for the first time we introduce a new protocol for BGs production. E. coli BL21 (DE3 pLysS (Promega was used as a model to establish a general protocol for BGs preparation. The protocol is based on using active chemical compounds in concentrations less than the Minimum Inhibition Concentration (MIC. Those chemical compounds are SDS, NaOH, and H2O2. Plackett-Burman experimental design was used to map the best conditions for BGs production. Normal and electronic microscopes were used to evaluate the BGs quality (BGQ. Spectrophotometer was used to evaluate the amount of the released protein and DNA. Agarose gel electrophoresis was used to determine the existence of any residue of DNA after each BGs preparation. Viable cells, which existed after running this protocol, were subjected to lysis by inducing the lysozyme gene carried on pLysS plasmid. This protocol is able to produce BGs that can be used in different biotechnological applications.

  19. [Protocol for the study of bone tumours and standardization of pathology reports].

    Science.gov (United States)

    Machado, Isidro; Pozo, José Juan; Marcilla, David; Cruz, Julia; Tardío, Juan C; Astudillo, Aurora; Bagué, Sílvia

    Primary bone neoplasms represent a rare and heterogeneous group of mesenchymal tumours. The prevalence of benign and malignant tumours varies; the latter (sarcomas) account for less than 0.2% of all malignant tumours. Primary bone neoplasms are usually diagnosed and classified according to the criteria established and published by the World Health Organization (WHO 2013). These criteria are a result of advances in molecular pathology, which complements the histopathological diagnosis. Bone tumours should be diagnosed and treated in referral centers by a multidisciplinary team including pathologists, radiologists, orthopedic surgeons and oncologists. We analyzed different national and international protocols in order to provide a guide of recommendations for the improvement of pathological evaluation and management of bone tumours. We include specific recommendations for the pre-analytical, analytical, and post-analytical phases, as well as protocols for gross and microscopic pathology. Copyright © 2016 Sociedad Española de Anatomía Patológica. Publicado por Elsevier España, S.L.U. All rights reserved.

  20. Giving voice to study volunteers: comparing views of mentally ill, physically ill, and healthy protocol participants on ethical aspects of clinical research.

    Science.gov (United States)

    Roberts, Laura Weiss; Kim, Jane Paik

    2014-09-01

    Ethical controversy surrounds clinical research involving seriously ill participants. While many stakeholders have opinions, the extent to which protocol volunteers themselves see human research as ethically acceptable has not been documented. To address this gap of knowledge, authors sought to assess views of healthy and ill clinical research volunteers regarding the ethical acceptability of human studies involving individuals who are ill or are potentially vulnerable. Surveys and semi-structured interviews were used to query clinical research protocol participants and a comparison group of healthy individuals. A total of 179 respondents participated in this study: 150 in protocols (60 mentally ill, 43 physically ill, and 47 healthy clinical research protocol participants) and 29 healthy individuals not enrolled in protocols. Main outcome measures included responses regarding ethical acceptability of clinical research when it presents significant burdens and risks, involves people with serious mental and physical illness, or enrolls people with other potential vulnerabilities in the research situation. Respondents expressed decreasing levels of acceptance of participation in research that posed burdens of increasing severity. Participation in protocols with possibly life-threatening consequences was perceived as least acceptable (mean = 1.82, sd = 1.29). Research on serious illnesses, including HIV, cancer, schizophrenia, depression, and post-traumatic stress disorder, was seen as ethically acceptable across respondent groups (range of means = [4.0, 4.7]). Mentally ill volunteers expressed levels of ethical acceptability for physical illness research and mental illness research as acceptable and similar, while physically ill volunteers expressed greater ethical acceptability for physical illness research than for mental illness research. Mentally ill, physically ill, and healthy participants expressed neutral to favorable perspectives regarding the ethical

  1. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  2. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  3. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  4. Developing a comprehensive presurgical functional MRI protocol for patients with intractable temporal lobe epilepsy: a pilot study

    International Nuclear Information System (INIS)

    Deblaere, K.; Vandemaele, P.; Achten, E.; Backes, W.H.; Hofman, P.; Wilmink, J.; Boon, P.A.; Vonck, K.; Boon, P.; Troost, J.; Vermeulen, J.; Aldenkamp, A.

    2002-01-01

    Our aim was to put together and test a comprehensive functional MRI (fMRI) protocol which could compete with the intracarotid amytal (IAT) or Wada test for the localisation of language and memory function in patients with intractable temporal lobe epilepsy. The protocol was designed to be performed in under 1 h on a standard 1.5 tesla imager. We used five paradigms to test nine healthy right-handed subjects: complex scene-encoding, picture-naming, reading, word-generation and semantic-decision tasks. The combination of these tasks generated two activation maps related to memory in the mesial temporal lobes, and three language-related maps of activation in a major part of the known language network. The functional maps from the encoding and naming tasks showed typical and symmetrical posterior mesial temporal lobe activation related to memory in all subjects. Only four of nine subjects also showed symmetrical anterior hippocampal activation. Language lateralisation was best with the word generation and reading paradigms and proved possible in all subjects. The reading paradigm enables localisation of language function in the left anterior temporal pole and middle temporal gyrus, areas typically resected during epilepsy surgery. The combined results of this comprehensive f MRI protocol are adequate for a comparative study with the IAT in patients with epilepsy being assessed for surgery. (orig.)

  5. Developing a comprehensive presurgical functional MRI protocol for patients with intractable temporal lobe epilepsy: a pilot study

    Energy Technology Data Exchange (ETDEWEB)

    Deblaere, K.; Vandemaele, P.; Achten, E. [MRI Department -1 K12, Department of Radiology, Ghent University Hospital, De Pintelaan 185, 9000 Ghent (Belgium); Backes, W.H.; Hofman, P.; Wilmink, J. [Department of Neuroradiology, University Hospital Maastricht, Postbus 5800, 6202 AZ Maastricht (Netherlands); Boon, P.A.; Vonck, K. [Department of Neurology, Ghent University Hospital, De Pintelaan 185, 9000 Ghent (Belgium); Boon, P. [Department of Medical Psychology, University Hospital Maastricht (Netherlands); Troost, J. [Department of Neurology, University Hospital Maastricht (Netherlands); Vermeulen, J. [S.E.I.N Heemstede, Psychological Laboratory, Achterweg 5, 2103 SW Heemstede (Netherlands); Aldenkamp, A. [Epilepsy Center ' Kempenhaeghe' , Postbus 61, 5900 AB Heeze (Netherlands)

    2002-08-01

    Our aim was to put together and test a comprehensive functional MRI (fMRI) protocol which could compete with the intracarotid amytal (IAT) or Wada test for the localisation of language and memory function in patients with intractable temporal lobe epilepsy. The protocol was designed to be performed in under 1 h on a standard 1.5 tesla imager. We used five paradigms to test nine healthy right-handed subjects: complex scene-encoding, picture-naming, reading, word-generation and semantic-decision tasks. The combination of these tasks generated two activation maps related to memory in the mesial temporal lobes, and three language-related maps of activation in a major part of the known language network. The functional maps from the encoding and naming tasks showed typical and symmetrical posterior mesial temporal lobe activation related to memory in all subjects. Only four of nine subjects also showed symmetrical anterior hippocampal activation. Language lateralisation was best with the word generation and reading paradigms and proved possible in all subjects. The reading paradigm enables localisation of language function in the left anterior temporal pole and middle temporal gyrus, areas typically resected during epilepsy surgery. The combined results of this comprehensive f MRI protocol are adequate for a comparative study with the IAT in patients with epilepsy being assessed for surgery. (orig.)

  6. The EADC-ADNI Harmonized Protocol for manual hippocampal segmentation on magnetic resonance

    DEFF Research Database (Denmark)

    Frisoni, Giovanni B; Jack, Clifford R; Bocchetta, Martina

    2015-01-01

    BACKGROUND: An international Delphi panel has defined a harmonized protocol (HarP) for the manual segmentation of the hippocampus on MR. The aim of this study is to study the concurrent validity of the HarP toward local protocols, and its major sources of variance. METHODS: Fourteen tracers segme...

  7. Colon cleansing protocol in children: research conditions vs. clinical practice.

    Science.gov (United States)

    Elitsur, Yoram; Balfaqih, Yaslam; Preston, Deborah

    2018-04-01

     Colon preparation rates are the limiting factor for a successful diagnostic colonoscopy in children. Different colon cleansing protocols have been published for use in children. Unfortunately, the applicability of those published research protocols has not been formally evaluated in routine clinical practice. We investigated the success rate of our previously published colon cleansing protocol as utilized in our clinical practice.  This was a retrospective study. In the clinical practice, the colon cleansing protocol included PEG-3350 at a dose of 2 g/kg/day plus Dulcolax (Bisacodyl, Boehringer Ingelheim, TX USA) 5 mg/day for 2 days. Adequate colon preparation was graded between 1 - 5, as previously described, and grade ≥ 4.0 was considered an adequate preparation. Patients were instructed to complete a questionnaire that included PEG-3350 dose, number of stools per day, consistency of each stool, and side effects (vomiting, abdominal pain). Clinical and endoscopic results were compared between the protocol under research conditions and routine practice.  The success rate of the colon preparation in our clinical practice was similar to the results observed under our research protocol (75 % vs. 73.6 %). Moreover, the total number of stools, stool consistency, and the intubation rate of the terminal ileum were also similar. We concluded, that in our experience, the colon cleansing protocol used under research conditions was effective and appropriate for use in routine clinical practice.  We recommend testing each new protocol under the routine conditions of clinical practice to confirm its applicability for general practitioners.

  8. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash; Guibas, Leonidas; Levis, Philip

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  9. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  10. Managing symptoms during cancer treatments: evaluating the implementation of evidence-informed remote support protocols

    Directory of Open Access Journals (Sweden)

    Stacey Dawn

    2012-11-01

    Full Text Available Abstract Background Management of cancer treatment-related symptoms is an important safety issue given that symptoms can become life-threatening and often occur when patients are at home. With funding from the Canadian Partnership Against Cancer, a pan-Canadian steering committee was established with representation from eight provinces to develop symptom protocols using a rigorous methodology (CAN-IMPLEMENT©. Each protocol is based on a systematic review of the literature to identify relevant clinical practice guidelines. Protocols were validated by cancer nurses from across Canada. The aim of this study is to build an effective and sustainable approach for implementing evidence-informed protocols for nurses to use when providing remote symptom assessment, triage, and guidance in self-management for patients experiencing symptoms while undergoing cancer treatments. Methods A prospective mixed-methods study design will be used. Guided by the Knowledge to Action Framework, the study will involve (a establishing an advisory knowledge user team in each of three targeted settings; (b assessing factors influencing nurses’ use of protocols using interviews/focus groups and a standardized survey instrument; (c adapting protocols for local use, ensuring fidelity of the content; (d selecting intervention strategies to overcome known barriers and implementing the protocols; (e conducting think-aloud usability testing; (f evaluating protocol use and outcomes by conducting an audit of 100 randomly selected charts at each of the three settings; and (g assessing satisfaction with remote support using symptom protocols and change in nurses’ barriers to use using survey instruments. The primary outcome is sustained use of the protocols, defined as use in 75% of the calls. Descriptive analysis will be conducted for the barriers, use of protocols, and chart audit outcomes. Content analysis will be conducted on interviews/focus groups and usability testing

  11. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  12. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  13. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  14. Enhanced Recovery After Surgery Protocols in Major Urologic Surgery

    Directory of Open Access Journals (Sweden)

    Natalija Vukovic

    2018-04-01

    Full Text Available The purpose of the reviewThe analysis of the components of enhanced recovery after surgery (ERAS protocols in urologic surgery.Recent findingsERAS protocols has been studied for over 20 years in different surgical procedures, mostly in colorectal surgery. The concept of improving patient care and reducing postoperative complications was also applied to major urologic surgery and especially procedure of radical cystectomy. This procedure is technically challenging, due to a major surgical resection and high postoperative complication rate that may reach 65%. Several clinical pathways were introduced to improve perioperative course and reduce the length of hospital stay. These protocols differ from ERAS modalities in other surgeries. The reasons for this are longer operative time, increased risk of perioperative transfusion and infection, and urinary diversion achieved using transposed intestinal segments. Previous studies in this area analyzed the need for mechanical bowel preparation, postoperative nasogastric tube decompression, as well as the duration of urinary drainage. Furthermore, the attention has also been drawn to perioperative fluid optimization, pain management, and bowel function.SummaryNotwithstanding partial resemblance between the pathways in major urologic surgery and other pelvic surgeries, there are still scarce guidelines for ERAS protocols in urology, which is why further studies should assess the importance of preoperative medical optimization, implementation of thoracic epidural anesthesia and analgesia, and perioperative nutritional management.

  15. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  16. Enhancing research quality and reporting: why the Journal of Comorbidity is now publishing study protocols

    Directory of Open Access Journals (Sweden)

    Susan Smith

    2014-08-01

    Full Text Available The Journal of Comorbidity was launched in 2011 and has since become established as a high-quality journal that publishes open-access, peer-reviewed articles, with a focus on advancing the clinical management of patients with comorbidity/multimorbidity. To further enhance research quality and reporting of studies in this field, the journal is now offering authors the opportunity to publish a summary of their study protocols – a move designed to generate interest and raise awareness in ongoing clinical research and to enable researchers to detail their methodologies in order that replication by scientific peers is possible.

  17. Where Words Fail, Music Speaks: A Mixed Method Study of an Evidence-Based Music Protocol.

    Science.gov (United States)

    Daniels, Ruby A; Torres, David; Reeser, Cathy

    2016-01-01

    Despite numerous studies documenting the benefits of music, hospice social workers are often unfamiliar with evidence-based music practices that may improve end of life care. This mixed method study tested an intervention to teach hospice social workers and chaplains (N = 10) an evidence-based music protocol. Participants used the evidence-based practice (EBP) for 30 days, recording 226 journal entries that described observations of 84 patients and their families. There was a significant increase in EBP knowledge (35%). Prompting behavioral and emotional responses, music was described frequently as a catalyst that facilitated deeper dialogue between patients, families, social workers, and chaplains.

  18. Antibiotic prophylaxis in orthopedic surgeries: the results of an implemented protocol

    Directory of Open Access Journals (Sweden)

    Raquel Queiroz

    Full Text Available Though the basic principles of antibiotic prophylaxis have been well established, there is still considerable incorrect usage, including how much is prescribed and especially in the duration of treatment, which is generally superior to what is indicated. The adequate use of these drugs contributes towards decreasing the time of internment of the patient, prevents surgical site infection (SSI, decreasing the development of resistant microorganisms, and towards reduced costs for the hospital pharmacy. A protocol for the use of antibiotic prophylaxis in the Orthopedics and Traumatology Service of the Hospital do Servidor Público Estadual de São Paulo was developed. The objectives of the study were to promote rational antibiotic surgical prophylaxis, through the implantation of a protocol for the use of these drugs in a surgical unit, with the direct contribution of a druggist in collaboration with the Infection Control Committee, to evaluate the adhesion of the health team to the protocol during three distinct periods (daily pre-protocol, early post-protocol and late post-protocol and to define the consumption of antimicrobials used, measured as daily defined dose.

  19. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  20. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.K.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt

  1. Translational study of obesity management using the Diabetes Prevention Program "Group Lifestyle Balance" in primary care clinics and public hospitals from Mexico: study protocol

    Directory of Open Access Journals (Sweden)

    Rolando Giovanni Díaz-Zavala

    2017-12-01

    Full Text Available Introduction: Obesity is the main modifiable risk factor for the development of chronic diseases in Mexico. Several randomized controlled trials have shown that intensive lifestyle programs are efficacious for the management of obesity. These programs include frequent sessions (14 or more contacts in the first 6 months focused on diet and physical activity and use a behavior change protocol. However, most Mexican primary care clinics and public hospitals apply traditional treatments for obesity management with limited results on weight loss. The purpose of the study is to evaluate the effectiveness of the Diabetes Prevention Program (DPP “Group Lifestyle Balance” for weight loss among adults with overweight and obesity from baseline to 6 months and from baseline to 12 months in primary care clinics and public hospitals from Sonora, Mexico. Material and Methods: This is a translational, multi-center, non-controlled, 6 and 12-month follow-up clinical study with a pre-test and post-test design. Healthcare providers from two primary care clinics, two hospitals and one university clinic will be trained with the DPP protocol to implement on their patients with overweight and obesity. Body weight, body mass index, waist circumference, systolic and diastolic blood pressure, depression, quality of life and stress scales will be measured in participants receiving the program at baseline, 6 and 12 months. Biochemical parameters will be measured at baseline and 12 months. The primary outcome is the change in body weight at 6 and 12 months. Discussion: This study will provide scientific evidence of the effectiveness of the DPP protocol as a model for obesity management in real world clinical practice among the adult Mexican population.

  2. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  3. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  4. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  5. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  6. Study protocol

    DEFF Research Database (Denmark)

    Thorsteinsson, Troels; Helms, Anne Sofie; Adamsen, Lis

    2013-01-01

    , and problems related to interaction with peers. Methods/design The RESPECT study is a nationwide population-based prospective, controlled, mixed-methods intervention study looking at children aged 6-18 years newly diagnosed with cancer in eastern Denmark (n = 120) and a matched control group in western Denmark......, and one year after the cessation of treatment. The study is powered to quantify the impact of the combined educational, physical, and social intervention programs. Discussion RESPECT is the first population-based study to examine the effect of early rehabilitation for children with cancer, and to use...

  7. An improved method of studying user-system interaction by combining transaction log analysis and protocol analysis

    Directory of Open Access Journals (Sweden)

    Jillian R. Griffiths

    2002-01-01

    Full Text Available The paper reports a novel approach to studying user-system interaction that captures a complete record of the searcher's actions, the system responses and synchronised talk-aloud comments from the searcher. The data is recorded unobtrusively and is available for later analysis. The approach is set in context by a discussion of transaction logging and protocol analysis and examples of the search logging in operation are presented

  8. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  9. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  10. The UMTS-AKA Protocols for Intelligent Transportation Systems

    Directory of Open Access Journals (Sweden)

    Hwang Min-Shiang

    2009-01-01

    Full Text Available The integration of communication protocols into transport systems is a much adored research area today. Much of seminal work has been reported on the topic of intelligent transportation systems (ITS in the recent years. Many advanced techniques have been garnered to improve online communication and to promote the security, comfort, and efficiency of ITS. Of primary importance to the effective application of ITS is the communication protocol used. A fascinating development is that the yesterday's Global System for Mobile Communication protocol is being replaced by the Universal Mobile Telecommunication System protocol, which is the third-generation mobile technology. This article attempts to identify a suitable communication system for ITS applications. It is impracticable to substantially modify the original UMTS-IMS-AKA protocol which is in practice because it can disturb the operation of the current system, and thus we explore other possibilities through this research. We investigate a novel protocol to make the original UMTS-IMS-AKA protocol compliant with ITS as well as adaptable into the current UMTS protocol.

  11. Model Checking A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2012-01-01

    This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV) for a subset of digraphs. Modeling challenges of the protocol and the system are addressed. The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period.

  12. Protocols and guidelines for mobile chest radiography in Irish public hospitals

    International Nuclear Information System (INIS)

    Kelly, Amanda; Toomey, Rachel

    2015-01-01

    Background: The mobile chest radiograph is a highly variable examination, in both technique and setting. Protocols and guidelines are one method by which examinations can be standardised, and provide information when one is unsure how to proceed. This study was undertaken to investigate the existence of protocols and guidelines available for the mobile chest radiograph, to establish their nature and compare them under a variety of headings. Methodology: A postal survey was administered to the Radiography Service Managers in the public hospitals under the governance of the Health Service Executive (HSE) in Ireland. The survey contained questions regarding hospital demographics, contents of existing protocols or guidelines, and why a protocol or guideline was not in place, if this was the case. Results: The response rate to the survey was 62% (n = 24). Those that had a specific protocol in place amounted to 63% (n = 15), 71% (n = 17) had a specific guideline, and 63% (n = 15) had both. Twenty nine percent (n = 7) had no specific protocol/guideline in place. Scientific research (88%, n = 15) and radiographer experience (82%, n = 14) were the most common sources used to inform protocols and guidelines. Conclusions: There are protocols and guidelines available to radiographers for mobile chest radiography in the majority of public hospitals in Ireland. The nature of the protocols and guidelines generally coincides with the HSE guidance regarding what sources of information should be used and how often they should be updated

  13. Early functional outcome of two surgical protocols used in the repair ...

    African Journals Online (AJOL)

    Background and objective The outcome of different treatment protocols for primary management of patients with complete unilateral cleft lip palate (UCLP) may vary considerably. This study aimed to compare the results of quality of speech and velopharyngeal sphincter mechanism between two surgical protocols used in ...

  14. Results of ERAS protocol in patients with colorectal cancer

    Directory of Open Access Journals (Sweden)

    A. O. Rasulov

    2016-01-01

    Full Text Available Objective: explore the use of enhanced recovery after surgery (ERAS in the treatment of patients with colorectal cancer, evaluate its efficacy and safety.Materials and methods. Prospective, single-site, randomized study for the implementation of enhanced recovery after surgery in patients with colorectal cancer has been conducted from October 2014 till the present time. All patients after laparoscopic surgeries undergo treatment according to ERAS protocol, patients after open surgeries are randomized (1:1 in groups of the standard treatment or treatment according to ERAS protocol. The study included patients with localized and locally disseminated colorectal cancer aged from 18 to 75 years, ECOG score ≤ 2. The primary evaluated parameters were the following: the number of postoperative complications (according to Clavien– Dindo classification, postoperative hospital days, incidence of complications and mortality in the 30-day period, timing of activation.Results. Up to date, the study includes 105 patients: laparoscopic group – 51 patients, open-surgery group of patients treated by ERAS protocol – 27 patients, open-surgery group of patients with the standard post-op treatment – 26 patients. Complications requiring emergency surgery for anastomotic leak (p = 0.159 developed in 3.7 % of patients with the standard post-op treatment and in 3.9 % of patients after laparoscopic surgery, while 1 patient required repeat hospitalization. The total number of complications was significantly lower in opensurgery group of patients treated by ERAS protocol compared with the standard post-op treatment (p = 0.021. However, there were no differences between laparoscopic and open-surgery group with the standard post-op treatment (p = 0.159. An average hospitalization stay in patients with the standard post-op treatment was equal to 10 days compared to 7 days in patients treated by ERAS protocol (p = 0.067 and 6 days after laparoscopic

  15. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  16. Two-Layer Hierarchy Optimization Model for Communication Protocol in Railway Wireless Monitoring Networks

    Directory of Open Access Journals (Sweden)

    Xiaoping Ma

    2018-01-01

    Full Text Available The wireless monitoring system is always destroyed by the insufficient energy of the sensors in railway. Hence, how to optimize the communication protocol and extend the system lifetime is crucial to ensure the stability of system. However, the existing studies focused primarily on cluster-based or multihop protocols individually, which are ineffective in coping with the complex communication scenarios in the railway wireless monitoring system (RWMS. This study proposes a hybrid protocol which combines the cluster-based and multihop protocols (CMCP to minimize and balance the energy consumption in different sections of the RWMS. In the first hierarchy, the total energy consumption is minimized by optimizing the cluster quantities in the cluster-based protocol and the number of hops and the corresponding hop distances in the multihop protocol. In the second hierarchy, the energy consumption is balanced through rotating the cluster head (CH in the subnetworks and further optimizing the hops and the corresponding hop distances in the backbone network. On this basis, the system lifetime is maximized with the minimum and balance energy consumption among the sensors. Furthermore, the hybrid particle swarm optimization and genetic algorithm (PSO-GA are adopted to optimize the energy consumption from the two-layer hierarchy. Finally, the effectiveness of the proposed CMCP is verified in the simulation. The performances of the proposed CMCP in system lifetime, residual energy, and the corresponding variance are all superior to the LEACH protocol widely applied in the previous research. The effective protocol proposed in this study can facilitate the application of the wireless monitoring network in the railway system and enhance safety operation of the railway.

  17. Protocols for second-generation business satellites systems

    Science.gov (United States)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  18. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  19. Radio protocols for LTE and LTE-advanced

    CERN Document Server

    Yi, SeungJune; Lee, YoungDae; Park, SungJun; Jung, SungHoon

    2012-01-01

    Provides a unique focus on radio protocols for LTE and LTE-Advanced (LTE-A) Giving readers a valuable understanding of LTE radio protocols, this book covers LTE (Long-Term Evolution) Layer 2/3 radio protocols as well as new features including LTE-Advanced. It is divided into two sections to differentiate between the two technologies' characteristics. The authors systematically explain the design principles and functions of LTE radio protocols during the development of mobile handsets. The book also provides essential knowledge on the interaction between mobile networks a

  20. Computationally Developed Sham Stimulation Protocol for Multichannel Desynchronizing Stimulation

    Directory of Open Access Journals (Sweden)

    Magteld Zeitler

    2018-05-01

    Full Text Available A characteristic pattern of abnormal brain activity is abnormally strong neuronal synchronization, as found in several brain disorders, such as tinnitus, Parkinson's disease, and epilepsy. As observed in several diseases, different therapeutic interventions may induce a placebo effect that may be strong and hinder reliable clinical evaluations. Hence, to distinguish between specific, neuromodulation-induced effects and unspecific, placebo effects, it is important to mimic the therapeutic procedure as precisely as possibly, thereby providing controls that actually lack specific effects. Coordinated Reset (CR stimulation has been developed to specifically counteract abnormally strong synchronization by desynchronization. CR is a spatio-temporally patterned multichannel stimulation which reduces the extent of coincident neuronal activity and aims at an anti-kindling, i.e., an unlearning of both synaptic connectivity and neuronal synchrony. Apart from acute desynchronizing effects, CR may cause sustained, long-lasting desynchronizing effects, as already demonstrated in pre-clinical and clinical proof of concept studies. In this computational study, we set out to computationally develop a sham stimulation protocol for multichannel desynchronizing stimulation. To this end, we compare acute effects and long-lasting effects of six different spatio-temporally patterned stimulation protocols, including three variants of CR, using a no-stimulation condition as additional control. This is to provide an inventory of different stimulation algorithms with similar fundamental stimulation parameters (e.g., mean stimulation rates but qualitatively different acute and/or long-lasting effects. Stimulation protocols sharing basic parameters, but inducing nevertheless completely different or even no acute effects and/or after-effects, might serve as controls to validate the specific effects of particular desynchronizing protocols such as CR. In particular, based on

  1. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  2. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  3. Relationships of clinical protocols and reconstruction kernels with image quality and radiation dose in a 128-slice CT scanner: Study with an anthropomorphic and water phantom

    International Nuclear Information System (INIS)

    Paul, Jijo; Krauss, B.; Banckwitz, R.; Maentele, W.; Bauer, R.W.; Vogl, T.J.

    2012-01-01

    Research highlights: ► Clinical protocol, reconstruction kernel, reconstructed slice thickness, phantom diameter or the density of material it contains directly affects the image quality of DSCT. ► Dual energy protocol shows the lowest DLP compared to all other protocols examined. ► Dual-energy fused images show excellent image quality and the noise is same as that of single- or high-pitch mode protocol images. ► Advanced CT technology improves image quality and considerably reduce radiation dose. ► An important finding is the comparatively higher DLP of the dual-source high-pitch protocol compared to other single- or dual-energy protocols. - Abstract: Purpose: The aim of this study was to explore the relationship of scanning parameters (clinical protocols), reconstruction kernels and slice thickness with image quality and radiation dose in a DSCT. Materials and methods: The chest of an anthropomorphic phantom was scanned on a DSCT scanner (Siemens Somatom Definition flash) using different clinical protocols, including single- and dual-energy modes. Four scan protocols were investigated: 1) single-source 120 kV, 110 mA s, 2) single-source 100 kV, 180 mA s, 3) high-pitch 120 kV, 130 mA s and 4) dual-energy with 100/Sn140 kV, eff.mA s 89, 76. The automatic exposure control was switched off for all the scans and the CTDIvol selected was in between 7.12 and 7.37 mGy. The raw data were reconstructed using the reconstruction kernels B31f, B80f and B70f, and slice thicknesses were 1.0 mm and 5.0 mm. Finally, the same parameters and procedures were used for the scanning of water phantom. Friedman test and Wilcoxon-Matched-Pair test were used for statistical analysis. Results: The DLP based on the given CTDIvol values showed significantly lower exposure for protocol 4, when compared to protocol 1 (percent difference 5.18%), protocol 2 (percent diff. 4.51%), and protocol 3 (percent diff. 8.81%). The highest change in Hounsfield Units was observed with dual

  4. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  5. On BAN logics for industrial security protocols

    NARCIS (Netherlands)

    Agray, N.; Hoek, van der W.; Vink, de E.P.; Dunin-Keplicz, B.; Nawarecki, E.

    2002-01-01

    This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism

  6. Study protocol for the FITR Heart Study: Feasibility, safety, adherence, and efficacy of high intensity interval training in a hospital-initiated rehabilitation program for coronary heart disease

    Directory of Open Access Journals (Sweden)

    Jenna Taylor

    2017-12-01

    Conclusions: This study aims to address the ongoing concerns regarding the practicality and safety of HIIT in CR programs. We anticipate study findings will lead to the development of a standardized protocol to facilitate CR programs to incorporate HIIT as a standard exercise option for appropriate patients.

  7. Evaluation of image quality and dose in renal colic: comparison of different spiral-CT protocols

    International Nuclear Information System (INIS)

    Rimondini, A.; Mucelli, R.P.; Dalla Palma, L.; De Denaro, M.; Bregant, P.

    2001-01-01

    The aim of this study was to test different technical spiral-CT parameters to obtain optimal image quality with reduced X-ray dose. Images were acquired with a spiral-CT system Philips Tomoscan AVE1, using 250 mA, 120 kV, and 1-s rotational time. Three protocols were tested: protocol A with 5-mm thickness, pitch 1.6, slice reconstruction every 2.5 mm; protocol B with 3-mm thickness, pitch 1.6, slice reconstruction every 1.5 mm; and protocol C with 3-mm thickness, pitch 2, slice reconstruction every 1.5 mm. Two phantoms were employed to evaluate the image quality. Axial images were acquired, then sagittal and coronal images were reconstructed. Finally, the absorbed X-ray dose for each protocol was measured. Regarding image quality, 5-mm-thick images (protocol A) showed greater spatial resolution and lower noise compared with 3-mm-thick images (protocols B and C) on the axial plane; 3-mm reconstructed sagittal and coronal images (protocols B and C) showed an improved image quality compared with 5-mm reformatted images (protocol A). Concerning X-ray dose, the mean dose was: protocol A 19.6±0.8 mGy; protocol B 14.4±0.6 mGy; protocol C 12.5±1.0 mGy. Our study supports the use of thin slices (3 mm) combined with pitch of 1.6 or 2 in renal colic for X-ray dose reduction to the patient and good image quality. (orig.)

  8. Cost effectiveness of a protocol using palivizumab in preterm infants

    Directory of Open Access Journals (Sweden)

    Yolanda Hernández-Gago

    2017-03-01

    Full Text Available Objective: The main objective was to evaluate the cost-effectiveness of protocol use of palivizumab in premature established by consensus in our Hospital comparing it based on the recommendations of various Scientific Societies. As a secondary objective risk factors and severity of hospitalized patients attending the established protocol in our Hospital were analyzed. Methods: The study period was 4 seasons with the expanded protocol (retrospective data versus 2 with restricted or agreed protocol (prospective data. The perspective of the study was the Health System, including the costs of hospitalization and palivizumab our center. The calculation of the effectiveness was determined with the admission rate of premature patients stratified by weeks of gestational age <29, <32; and <35. For the analysis of risk factors and severity in patients admitted seasons with the new protocol are collected prospectively clinical data and environmental and social factors. Results: In the range of gestational age <29 years old and <32 greater effectiveness of the extended protocol was not demonstrated against the consensus. Only more effective for EG <35 in the accumulated data and comparing seasons 12/13 and 08/09 to 13/14 for individual data was observed. This range has an associated incremental cost effectiveness ratio of € 53 250,07 (range: € 14 793,39 to € 90 446,47 for singles data and € 50 525,53 (€ 28 688.22 to € 211 575,65 for accumulated. The establishment of this protocol in our center meant an average saving per season € 169 911,51. A cost- effectiveness of the extended protocol appropriate relationship is found if the cost of palivizumab per patient was less than € 1 206,67 (calculated for maximum use of the vial and a higher rate of hospitalization of 9.21%. Children entering the season with the new protocol (season 12/13 and 13/14 are 63.4% in children under 3 months and 90% are term infants who do not belong to any population at

  9. Influence of a multidisciplinary protocol on nutritional status at diagnosis in amyotrophic lateral sclerosis.

    Science.gov (United States)

    López-Gómez, Juan José; Torres-Torres, Beatriz; Gómez-Hoyos, Emilia; Fernández-Buey, Nieves; Ortolá-Buigues, Ana; Castro-Lozano, Ángeles; Arenillas-Lara, Juan F; De Luis-Román, Daniel A

    2018-04-01

    The aim of this study were to understand the influence of a multidisciplinary care protocol in amyotrophic lateral sclerosis (ALS) on the change in the delay of remission to the nutrition specialist and the initial nutritional status. A cohort study was performed in 43 patients with ALS who were referred to the Nutrition Unit between April 2015 and April 2017. Anthropometric parameters and diagnostic times were collected, and the nutritional status was studied through subjective global assessment (SGA). Patients who were included before (control cohort [NoP]) and after (protocol cohort [P]) a multidisciplinary protocol were compared. The mean age of the participants was 66.79 y (10.86 y). Of the patients, 62.8% belonged to the protocol cohort. Patients who started the protocol had a lower delay in initial assessment by a nutrition specialist (P:2 [1-6] mo/NoP:12 [10-29] mo; P = 0.03). When the nutritional status was analyzed according to the SGA, more patients who did not initiate protocol were in the state of severe malnutrition (C) (P 22.2% versus NoP 60%; P = 0.01). Entry into the protocol was an independent protective factor of the presence of severe malnutrition at the beginning of the nutritional follow-up (odds ratio, 0.20; 95% confidence interval, 0.03-0.73; P = 0.02). The implementation of a multidisciplinary protocol in ALS allowed patients to present a lower percentage of severe malnutrition in an initial assessment by the nutrition specialist. This protocol is a protective factor for the presence of malnutrition at the beginning of support. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Provable Fair Document Exchange Protocol with Transaction Privacy for E-Commerce

    Directory of Open Access Journals (Sweden)

    Ren-Junn Hwang

    2015-04-01

    Full Text Available Transaction privacy has attracted a lot of attention in the e-commerce. This study proposes an efficient and provable fair document exchange protocol with transaction privacy. Using the proposed protocol, any untrusted parties can fairly exchange documents without the assistance of online, trusted third parties. Moreover, a notary only notarizes each document once. The authorized document owner can exchange a notarized document with different parties repeatedly without disclosing the origin of the document or the identities of transaction participants. Security and performance analyses indicate that the proposed protocol not only provides strong fairness, non-repudiation of origin, non-repudiation of receipt, and message confidentiality, but also enhances forward secrecy, transaction privacy, and authorized exchange. The proposed protocol is more efficient than other works.

  11. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  12. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  13. A comparative study of biological and metabolic biomarkers between healthy individuals and patients with acne vulgaris: A cross-sectional study protocol.

    Science.gov (United States)

    Kim, Kyuseok; Ha, Injin; Kim, Eunok; Kim, Kyunglee

    2017-11-01

    Acne is a multifactorial dermatosis, which is influenced not only by hormones but also by the biochemical relationship between them and the pilosebaceous unit. Inflammatory cytokines, chemokines, active oxygen, and zinc are known to be associated with the development of acne. Further, steroid metabolism is known as one of the important factors related to sebum secretion and comedone formation in acne. However, there is a lack of studies comparing these human biomarkers between healthy individuals and patients with acne. In particular, no study has investigated the relationship between human biomarkers and patterns of acne yet.The purpose of this study is to investigate diagnostic human biomarkers in acne by comparing the biological and metabolic biomarkers between healthy individuals and patients with acne and identify the relationship between human biomarkers and patterns of acne.This study is a protocol for a cross-sectional study. Forty healthy participants and 60 patients with acne will be recruited at 1 center. We will collect their blood samples and analyze the molecular biological and metabolic biomarkers (cytokines, chemokines, reactive oxygen species, corticotropin-releasing hormone, zinc, amino acid, 1-carbon metabolite, lipid metabolite, etc.). Further, we will administer questionnaires regarding their diet, sleep, stress, and other factors relating to acne and measure their skin elasticity.The study protocol was approved by the Institutional Review Board of Oriental Medical Hospital at Kyung Hee Medical Center (KOMCIRB-161118-HR-062). Written informed consent will be obtained from all the participants. The trial was registered in the Clinical Research Information Service, Republic of Korea: KCT0002212.This trial will provide evidence regarding diagnostic human biomarkers in acne and the relationship between the human biomarkers and patterns of acne.

  14. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  15. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung; Kazandjieva, Maria A.; Jain, Mayank; Levis, Philip

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol's perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain's fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  16. Introduction to basic immunological methods : Generalities, Principles, Protocols and Variants of basic protocols

    International Nuclear Information System (INIS)

    Mejri, Naceur

    2013-01-01

    This manuscript is dedicated to student of biological sciences. It provides the information necessary to perform practical works, the most commonly used in immunology. During my doctoral and post-doctoral periods, panoply of methods was employed in diverse subjects in my research. Technical means used in my investigations were diverse enough that i could extract a set of techniques that cover most the basic immunological methods. Each chapter of this manuscript contains a fairly complete description of immunological methods. In each topic the basic protocol and its variants were preceded by background information provided in paragraphs concerning the principle and generalities. The emphasis is placed on describing situations in which each method and its variants were used. These basic immunological methods are useful for students and even researchers studying the immune system of human, nice and other species. Different subjects showed not only detailed protocols but also photos or/and shemas used as support to illustrate some knowledge or practical knowledge. I hope that students will find this manual interesting, easy to use contains necessary information to acquire skills in immunological practice. (Author)

  17. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA)

    DEFF Research Database (Denmark)

    Muharemovic, O; Troelsen, A; Thomsen, M G

    2018-01-01

    INTRODUCTION: Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time...... imaging. Radiographers in the control group used a standard RSA protocol. RESULTS: At three months, radiographers in the case group significantly reduced (p .... No significant improvements were found in the control group at any time point. CONCLUSION: There is strong evidence that personalized RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute...

  18. A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This paper presents a self-stabilizing distributed clock synchronization protocol in the absence of faults in the system. It is focused on the distributed clock synchronization of an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. We present an outline of a deductive proof of the correctness of the protocol. A bounded model of the protocol was mechanically verified for a variety of topologies. Results of the mechanical proof of the correctness of the protocol are provided. The model checking results have verified the correctness of the protocol as they apply to the networks with unidirectional and bidirectional links. In addition, the results confirm the claims of determinism and linear convergence. As a result, we conjecture that the protocol solves the general case of this problem. We also present several variations of the protocol and discuss that this synchronization protocol is indeed an emergent system.

  19. Data aggregation in wireless sensor networks using the SOAP protocol

    International Nuclear Information System (INIS)

    Al-Yasiri, A; Sunley, A

    2007-01-01

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks

  20. Data aggregation in wireless sensor networks using the SOAP protocol

    Energy Technology Data Exchange (ETDEWEB)

    Al-Yasiri, A; Sunley, A [School of Computing, Science and Engineering, University of Salford, Greater Manchester, M5 4WT (United Kingdom)

    2007-07-15

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  1. [Effect of compliance with an antibiotic prophylaxis protocol in surgical site infections in appendectomies. Prospective cohort study].

    Science.gov (United States)

    Sánchez-Santana, Tomás; Del-Moral-Luque, Juan Antonio; Gil-Yonte, Pablo; Bañuelos-Andrío, Luis; Durán-Poveda, Manuel; Rodríguez-Caravaca, Gil

    Antibiotic prophylaxis is the most suitable tool for preventing surgical site infection. This study assessed compliance with antibiotic prophylaxis in surgery for acute appendicitis, and the effect of this compliance on surgical site infection. Prospective cohort study to evaluate compliance with antibiotic prophylaxis protocol in appendectomies. An assessment was made of the level of compliance with prophylaxis, as well as the causes of non-compliance. The incidence of surgical site infection was studied after a maximum incubation period of 30 days. The relative risk adjusted with a logistic regression model was used to assess the effect of non-compliance of prophylaxis on surgical site infection. The study included a total of 930 patients. Antibiotic prophylaxis was indicated in all patients, and administered in 71.3% of cases, with an overall protocol compliance of 86.1%. The principal cause of non-compliance was time of initiation. Cumulative incidence of surgical site infection was 4.6%. No relationship was found between inadequate prophylaxis compliance and infection (relative risk=0.5; 95% CI: 0.1-1.9) (P>.05). Compliance of antibiotic prophylaxis was high, but could be improved. No relationship was found between prophylaxis compliance and surgical site infection rate. Copyright © 2016 Academia Mexicana de Cirugía A.C. Publicado por Masson Doyma México S.A. All rights reserved.

  2. [Effect of a multidisciplinar protocol on the clinical results obtained after bariatric surgery].

    Science.gov (United States)

    Cánovas Gaillemin, B; Sastre Martos, J; Moreno Segura, G; Llamazares Iglesias, O; Familiar Casado, C; Abad de Castro, S; López Pardo, R; Sánchez-Cabezudo Muñoz, M A

    2011-01-01

    Bariatric surgery has been shown to be an effective therapy for weight loss in patients with severe obesity, and the implementation of a multidisciplinar management protocol is recommended. To assess the usefulness of the implementation of a management protocol in obesity surgery based on the Spanish Consensus Document of the SEEDO. Retrospective comparative study of the outcomes in patients previously operated (51 patients) and after the implementation of the protocol (66 patients). The following data were gathered: anthropometry, pre-and post-surgery comorbidities, post-surgical nutritional and surgical complications, validated Quality of Life questionnaire, and dietary habits. Withdrawals (l7.6%) and alcoholism (5.8%) were higher in patients pre- versus post-implementation of the protocol (4.5% vs. 3%, respectively), the differences being statistically significant. The mortality rate was 2% in the pre-protocol group and 0% in the postprotocol group. The dietary habits were better in the post-protocol group, the pre-protocol group presenting a higher percentage of feeding-behavior disorders (5.1%) although not reaching a statistical significance. The improvement in quality of life was higher in the post-protocol group for all items, but only reaching statistical significance in sexual activity (p = 0.004). In the pre-protocol group, 70.5% of the patients had more than one nutritional complication vs. 32.8% in the post-protocol group (p 50% in 81.3% in the pre-protocol group vs. 74.8% in the pos-protocol group) or the comorbidities. Bariatric surgery achieves excellent outcomes in weight loss, comorbidities, and quality of life, but presents nutritional, surgical, and psychiatric complications that require a protocol-based and multidisciplinary approach. Our protocol improves the outcomes regarding the withdrawal rates, feeding-behavior disorders, dietary habits, nutritional complications, and quality of life.

  3. Assessment of Grade of Dysphonia and Correlation With Quality of Life Protocol.

    Science.gov (United States)

    Spina, Ana Lúcia; Crespo, Agrício Nubiato

    2017-03-01

    The main objective of this study is to check the correlation between vocal self-assessment and results of the Voice-Related Quality of Life (V-RQOL) protocol, and whether there is a correlation between perceptual vocal assessment made by voice therapists and the results from the V-RQOL protocol. The study included 245 subjects with vocal complaints. This was a prospective analytical clinical study. Vocal perceptual assessment of each subject with dysphonia was made by three voice therapists, followed by self-assessment made by the subjects themselves, and the application of the V-RQOL protocol. The results have shown poor level of agreement between vocal assessment made by the voice therapists and self-assessment made by the subjects. The statistical analysis indicated that the results of V-RQOL protocol showed significant correlation with the vocal assessment made by the voice therapists and the self-assessment by the subjects. The agreement between the assessments was low and variable; age, gender, professional voice use, and clinical laryngoscopic diagnosis did not influence the agreement level. Protocol V-RQOL is sensitive to vocal assessment made by the voice therapists and self-assessment made by the patient. Copyright © 2017 The Voice Foundation. Published by Elsevier Inc. All rights reserved.

  4. Survey of protocols for the manual segmentation of the hippocampus: preparatory steps towards a joint EADC-ADNI harmonized protocol.

    Science.gov (United States)

    Boccardi, Marina; Ganzola, Rossana; Bocchetta, Martina; Pievani, Michela; Redolfi, Alberto; Bartzokis, George; Camicioli, Richard; Csernansky, John G; de Leon, Mony J; deToledo-Morrell, Leyla; Killiany, Ronald J; Lehéricy, Stéphane; Pantel, Johannes; Pruessner, Jens C; Soininen, H; Watson, Craig; Duchesne, Simon; Jack, Clifford R; Frisoni, Giovanni B

    2011-01-01

    Manual segmentation from magnetic resonance imaging (MR) is the gold standard for evaluating hippocampal atrophy in Alzheimer's disease (AD). Nonetheless, different segmentation protocols provide up to 2.5-fold volume differences. Here we surveyed the most frequently used segmentation protocols in the AD literature as a preliminary step for international harmonization. The anatomical landmarks (anteriormost and posteriormost slices, superior, inferior, medial, and lateral borders) were identified from 12 published protocols for hippocampal manual segmentation ([Abbreviation] first author, publication year: [B] Bartzokis, 1998; [C] Convit, 1997; [dTM] deToledo-Morrell, 2004; [H] Haller, 1997; [J] Jack, 1994; [K] Killiany, 1993; [L] Lehericy, 1994; [M] Malykhin, 2007; [Pa] Pantel, 2000; [Pr] Pruessner, 2000; [S] Soininen, 1994; [W] Watson, 1992). The hippocampi of one healthy control and one AD patient taken from the 1.5T MR ADNI database were segmented by a single rater according to each protocol. The accuracy of the protocols' interpretation and translation into practice was checked with lead authors of protocols through individual interactive web conferences. Semantically harmonized landmarks and differences were then extracted, regarding: (a) the posteriormost slice, protocol [B] being the most restrictive, and [H, M, Pa, Pr, S] the most inclusive; (b) inclusion [C, dTM, J, L, M, Pr, W] or exclusion [B, H, K, Pa, S] of alveus/fimbria; (c) separation from the parahippocampal gyrus, [C] being the most restrictive, [B, dTM, H, J, Pa, S] the most inclusive. There were no substantial differences in the definition of the anteriormost slice. This survey will allow us to operationalize differences among protocols into tracing units, measure their impact on the repeatability and diagnostic accuracy of manual hippocampal segmentation, and finally develop a harmonized protocol.

  5. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  6. Improvement of burn pain management through routine pain monitoring and pain management protocol.

    Science.gov (United States)

    Yang, Hyeong Tae; Hur, Giyeun; Kwak, In-Suk; Yim, Haejun; Cho, Yong Suk; Kim, Dohern; Hur, Jun; Kim, Jong Hyun; Lee, Boung Chul; Seo, Cheong Hoon; Chun, Wook

    2013-06-01

    Pain management is an important aspect of burn management. We developed a routine pain monitoring system and pain management protocol for burn patients. The purpose of this study is to evaluate the effectiveness of our new pain management system. From May 2011 to November 2011, the prospective study was performed with 107 burn patients. We performed control group (n=58) data analysis and then developed the pain management protocol and monitoring system. Next, we applied our protocol to patients and performed protocol group (n=49) data analysis, and compared this to control group data. Data analysis was performed using the Numeric Rating Scale (NRS) of background pain and procedural pain, Clinician-Administered PTSD Scale (CAPS), Hamilton Depression Rating Scale (HDRS), State-Trait Anxiety Inventory Scale (STAIS), and Holmes and Rahe Stress Scale (HRSS). The NRS of background pain for the protocol group was significantly decreased compared to the control group (2.8±2.0 versus 3.9±1.9), and the NRS of procedural pain of the protocol group was significantly decreased compared to the control group (4.8±2.8 versus 3.7±2.5). CAPS and HDRS were decreased in the protocol group, but did not have statistical significance. STAIS and HRSS were decreased in the protocol group, but only the STAIS had statistical significance. Our new pain management system was effective in burn pain management. However, adequate pain management can only be accomplished by a continuous and thorough effort. Therefore, pain control protocol and pain monitoring systems need to be under constant revision and improvement using creative ideas and approaches. Copyright © 2012 Elsevier Ltd and ISBI. All rights reserved.

  7. A Comparative Study of Wireless Sensor Networks and Their Routing Protocols

    OpenAIRE

    Subhajit Pal; Debnath Bhattacharyya; Tai-hoon Kim

    2010-01-01

    Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs). Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and comp...

  8. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  9. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  10. The impact of protocol on nurses' role stress: a longitudinal perspective.

    Science.gov (United States)

    Dodd-McCue, Diane; Tartaglia, Alexander; Veazey, Kenneth W; Streetman, Pamela S

    2005-04-01

    The study examined the impact of a protocol directed at increasing organ donation on the role stress and work attitudes of critical care nurses involved in potential organ donation cases. The research examined whether the protocol could positively affect nurses' perceptions of role stress, and if so, could the work environment improvements be sustained over time. The Family Communication Coordinator (FCC) protocol promotes effective communication during potential organ donation cases using a multidisciplinary team approach. Previous research found it associated with improved donation outcomes and with improved perceptions of role stress by critical care nurses. However, the previous study lacked methodological rigor necessary to determine causality and sustainability over time. The study used a quasi-experimental prospective longitudinal design. The sample included critical care nurses who had experience with potential organ donation cases with the protocol. Survey data were collected at 4 points over 2 years. Surveys used previously validated and reliable measures of role stress (role ambiguity, role conflict, role overload) and work attitudes (commitment, satisfaction). Interviews supplemented these data. The nurses' perceptions of role stress associated with potential organ donation cases dramatically dropped after the protocol was implemented. All measures of role stress, particularly role ambiguity and role conflict, showed statistically significant and sustained improvement. Nurses' professional, unit, and hospital commitment and satisfaction reflect an increasingly positive workplace. The results demonstrate that the FCC protocol positively influenced the workplace through its impact on role stress over the first 2 years following its implementation. The findings suggest that similar protocols may be appropriate in improving the critical care environment by reducing the stress and uncertainty of professionals involved in other end-of-life situations. However

  11. Microplastics in seafood: Benchmark protocol for their extraction and characterization.

    Science.gov (United States)

    Dehaut, Alexandre; Cassone, Anne-Laure; Frère, Laura; Hermabessiere, Ludovic; Himber, Charlotte; Rinnert, Emmanuel; Rivière, Gilles; Lambert, Christophe; Soudant, Philippe; Huvet, Arnaud; Duflos, Guillaume; Paul-Pont, Ika

    2016-08-01

    Pollution of the oceans by microplastics (studies have investigated the level of contamination of marine organisms collected in situ. For extraction and characterization of microplastics in biological samples, the crucial step is the identification of solvent(s) or chemical(s) that efficiently dissolve organic matter without degrading plastic polymers for their identification in a time and cost effective way. Most published papers, as well as OSPAR recommendations for the development of a common monitoring protocol for plastic particles in fish and shellfish at the European level, use protocols containing nitric acid to digest the biological tissues, despite reports of polyamide degradation with this chemical. In the present study, six existing approaches were tested and their effects were compared on up to 15 different plastic polymers, as well as their efficiency in digesting biological matrices. Plastic integrity was evaluated through microscopic inspection, weighing, pyrolysis coupled with gas chromatography and mass spectrometry, and Raman spectrometry before and after digestion. Tissues from mussels, crabs and fish were digested before being filtered on glass fibre filters. Digestion efficiency was evaluated through microscopical inspection of the filters and determination of the relative removal of organic matter content after digestion. Five out of the six tested protocols led to significant degradation of plastic particles and/or insufficient tissue digestion. The protocol using a KOH 10% solution and incubation at 60 °C during a 24 h period led to an efficient digestion of biological tissues with no significant degradation on all tested polymers, except for cellulose acetate. This protocol appeared to be the best compromise for extraction and later identification of microplastics in biological samples and should be implemented in further monitoring studies to ensure relevance and comparison of environmental and seafood product quality studies

  12. Latency correction of event-related potentials between different experimental protocols

    Science.gov (United States)

    Iturrate, I.; Chavarriaga, R.; Montesano, L.; Minguez, J.; Millán, JdR

    2014-06-01

    Objective. A fundamental issue in EEG event-related potentials (ERPs) studies is the amount of data required to have an accurate ERP model. This also impacts the time required to train a classifier for a brain-computer interface (BCI). This issue is mainly due to the poor signal-to-noise ratio and the large fluctuations of the EEG caused by several sources of variability. One of these sources is directly related to the experimental protocol or application designed, and may affect the amplitude or latency of ERPs. This usually prevents BCI classifiers from generalizing among different experimental protocols. In this paper, we analyze the effect of the amplitude and the latency variations among different experimental protocols based on the same type of ERP. Approach. We present a method to analyze and compensate for the latency variations in BCI applications. The algorithm has been tested on two widely used ERPs (P300 and observation error potentials), in three experimental protocols in each case. We report the ERP analysis and single-trial classification. Main results. The results obtained show that the designed experimental protocols significantly affect the latency of the recorded potentials but not the amplitudes. Significance. These results show how the use of latency-corrected data can be used to generalize the BCIs, reducing the calibration time when facing a new experimental protocol.

  13. IEEE 802.11 Wireless LANs: Performance Analysis and Protocol Refinement

    Directory of Open Access Journals (Sweden)

    Chatzimisios P.

    2005-01-01

    Full Text Available The IEEE 802.11 protocol is emerging as a widely used standard and has become the most mature technology for wireless local area networks (WLANs. In this paper, we focus on the tuning of the IEEE 802.11 protocol parameters taking into consideration, in addition to throughput efficiency, performance metrics such as the average packet delay, the probability of a packet being discarded when it reaches the maximum retransmission limit, the average time to drop a packet, and the packet interarrival time. We present an analysis, which has been validated by simulation that is based on a Markov chain model commonly used in the literature. We further study the improvement on these performance metrics by employing suitable protocol parameters according to the specific communication needs of the IEEE 802.11 protocol for both basic access and RTS/CTS access schemes. We show that the use of a higher initial contention window size does not considerably degrade performance in small networks and performs significantly better in any other scenario. Moreover, we conclude that the combination of a lower maximum contention window size and a higher retry limit considerably improves performance. Results indicate that the appropriate adjustment of the protocol parameters enhances performance and improves the services that the IEEE 802.11 protocol provides to various communication applications.

  14. Minimal sampling protocol for accurate estimation of urea production: a study with oral [13C]urea in fed and fasted piglets

    NARCIS (Netherlands)

    Oosterveld, Michiel J. S.; Gemke, Reinoud J. B. J.; Dainty, Jack R.; Kulik, Willem; Jakobs, Cornelis; de Meer, Kees

    2005-01-01

    An oral [13C]urea protocol may provide a simple method for measurement of urea production. The validity of single pool calculations in relation to a reduced sampling protocol was assessed. In eight fed and five fasted piglets, plasma urea enrichments from a 10 h sampling protocol were measured

  15. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  16. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  17. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  18. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  19. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  20. A protocol for conducting rainfall simulation to study soil runoff.

    Science.gov (United States)

    Kibet, Leonard C; Saporito, Louis S; Allen, Arthur L; May, Eric B; Kleinman, Peter J A; Hashem, Fawzy M; Bryant, Ray B

    2014-04-03

    Rainfall is a driving force for the transport of environmental contaminants from agricultural soils to surficial water bodies via surface runoff. The objective of this study was to characterize the effects of antecedent soil moisture content on the fate and transport of surface applied commercial urea, a common form of nitrogen (N) fertilizer, following a rainfall event that occurs within 24 hr after fertilizer application. Although urea is assumed to be readily hydrolyzed to ammonium and therefore not often available for transport, recent studies suggest that urea can be transported from agricultural soils to coastal waters where it is implicated in harmful algal blooms. A rainfall simulator was used to apply a consistent rate of uniform rainfall across packed soil boxes that had been prewetted to different soil moisture contents. By controlling rainfall and soil physical characteristics, the effects of antecedent soil moisture on urea loss were isolated. Wetter soils exhibited shorter time from rainfall initiation to runoff initiation, greater total volume of runoff, higher urea concentrations in runoff, and greater mass loadings of urea in runoff. These results also demonstrate the importance of controlling for antecedent soil moisture content in studies designed to isolate other variables, such as soil physical or chemical characteristics, slope, soil cover, management, or rainfall characteristics. Because rainfall simulators are designed to deliver raindrops of similar size and velocity as natural rainfall, studies conducted under a standardized protocol can yield valuable data that, in turn, can be used to develop models for predicting the fate and transport of pollutants in runoff.

  1. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  2. Ocean Optics Protocols for Satellite Ocean Color Sensor Validation. Revised

    Science.gov (United States)

    Fargion, Giulietta S.; Mueller, James L.

    2000-01-01

    The document stipulates protocols for measuring bio-optical and radiometric data for the Sensor Intercomparison and Merger for Biological and Interdisciplinary Oceanic Studies (SIMBIOS) Project activities and algorithm development. This document supersedes the earlier version (Mueller and Austin 1995) published as Volume 25 in the SeaWiFS Technical Report Series. This document marks a significant departure from, and improvement on, theformat and content of Mueller and Austin (1995). The authorship of the protocols has been greatly broadened to include experts specializing in some key areas. New chapters have been added to provide detailed and comprehensive protocols for stability monitoring of radiometers using portable sources, abovewater measurements of remote-sensing reflectance, spectral absorption measurements for discrete water samples, HPLC pigment analysis and fluorometric pigment analysis. Protocols were included in Mueller and Austin (1995) for each of these areas, but the new treatment makes significant advances in each topic area. There are also new chapters prescribing protocols for calibration of sun photometers and sky radiance sensors, sun photometer and sky radiance measurements and analysis, and data archival. These topic areas were barely mentioned in Mueller and Austin (1995).

  3. "Not just another Wii training": a graded Wii protocol to increase physical fitness in adolescent girls with probable developmental coordination disorder-a pilot study.

    Science.gov (United States)

    Bonney, Emmanuel; Rameckers, Eugene; Ferguson, Gillian; Smits-Engelsman, Bouwien

    2018-02-22

    Adolescents with low motor competence participate less in physical activity and tend to exhibit decreased physical fitness compared to their peers with high motor competence. It is therefore essential to identify new methods of enhancing physical fitness in this population. Active video games (AVG) have been shown to improve motor performance, yet investigations of its impact on physical fitness are limited. The objective of this study was to examine the impact of the graded Wii protocol in adolescent girls with probable Developmental Coordination Disorder (p-DCD). A single-group pre-post design was conducted to assess the impact of a newly developed Wii protocol in adolescent girls attending school in a low income community of Cape Town, South Africa. Sixteen participants (aged 13-16 years) with p-DCD (≤16th percentile on the MABC-2 test) were recruited. Participants received 45 min Wii training for 14 weeks. Outcome measures included the six-minute walk distance and repeated sprint ability. Information on heart rate, enjoyment and perceived exertion ratings were also collected. Significant improvements in aerobic and anaerobic fitness were observed. The participants reported high enjoyment scores and low perceived exertion ratings. The graded Wii protocol was easily adaptable and required little resources (space, equipment and expertise) to administer. The findings provide preliminary evidence to support the use of the graded Wii protocol for promoting physical fitness in adolescent girls with p-DCD. Further studies are needed to confirm these results and to validate the clinical efficacy of the protocol in a larger sample with a more robust design.

  4. Prosthesis Prescription Protocol of the Arm (PPP-Arm) : The implementation of a national prosthesis prescription protocol

    NARCIS (Netherlands)

    Wijdenes, Paula; Brouwers, Michael; van der Sluis, Corry K

    BACKGROUND AND AIM: In order to create more uniformity in the prescription of upper limb prostheses by Dutch rehabilitation teams, the development and implementation of a Prosthesis Prescription Protocol of the upper limb (PPP-Arm) was initiated. The aim was to create a national digital protocol to

  5. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  6. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  7. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  8. Comparison of Three Prehospital Cervical Spine Protocols for Missed Injuries

    Directory of Open Access Journals (Sweden)

    Rick Hong

    2014-07-01

    Full Text Available Introduction: We wanted to compare 3 existing emergency medical services (EMS immobilization protocols: the Prehospital Trauma Life Support (PHTLS, mechanism-based; the Domeier protocol (parallels the National Emergency X-Radiography Utilization Study [NEXUS] criteria; and the Hankins’ criteria (immobilization for patients 65 years, those with altered consciousness, focal neurologic deficit, distracting injury, or midline or paraspinal tenderness.To determine the proportion of patients who would require cervical immobilization per protocol and the number of missed cervical spine injuries, had each protocol been followed with 100% compliance. Methods: This was a cross-sectional study of patients ≥18 years transported by EMS post-traumatic mechanism to an inner city emergency department. Demographic and clinical/historical data obtained by physicians were recorded prior to radiologic imaging. Medical record review ascertained cervical spine injuries. Both physicians and EMS were blinded to the objective of the study. Results: Of 498 participants, 58% were male and mean age was 48 years. The following participants would have required cervical spine immobilization based on the respective protocol: PHTLS, 95.4% (95% CI: 93.1-96.9%; Domeier, 68.7% (95% CI: 64.5-72.6%; Hankins, 81.5% (95% CI: 77.9-84.7%. There were 18 cervical spine injuries: 12 vertebral fractures, 2 subluxations/dislocations and 4 spinal cord injuries. Compliance with each of the 3 protocols would have led to appropriate cervical spine immobilization of all injured patients. In practice, 2 injuries were missed when the PHTLS criteria were mis-applied. Conclusion: Although physician-determined presence of cervical spine immobilization criteria cannot be generalized to the findings obtained by EMS personnel, our findings suggest that the mechanism-based PHTLS criteria may result in unnecessary cervical spine immobilization without apparent benefit to injured patients. PHTLS

  9. CPM Test-Retest Reliability: "Standard" vs "Single Test-Stimulus" Protocols.

    Science.gov (United States)

    Granovsky, Yelena; Miller-Barmak, Adi; Goldstein, Oren; Sprecher, Elliot; Yarnitsky, David

    2016-03-01

    Assessment of pain inhibitory mechanisms using conditioned pain modulation (CPM) is relevant clinically in prediction of pain and analgesic efficacy. Our objective is to provide necessary estimates of intersession CPM reliability, to enable transformation of the CPM paradigm into a clinical tool. Two cohorts of young healthy subjects (N = 65) participated in two dual-session studies. In Study I, a Bath-Thermode CPM protocol was used, with hot water immersion and contact heat as conditioning- and test-stimuli, respectively, in a classical parallel CPM design introducing test-stimulus first, and then the conditioning- and repeated test-stimuli in parallel. Study II consisted of two CPM protocols: 1) Two-Thermodes, one for each of the stimuli, in the same parallel design as above, and 2) single test-stimulus (STS) protocol with a single administration of a contact heat test-stimulus, partially overlapped in time by a remote shorter contact heat as conditioning stimulus. Test-retest reliability was assessed within 3-7 days. The STS-CPM had superior reliability intraclass correlation (ICC 2 ,: 1  = 0.59) over Bath-Thermode (ICC 2 ,: 1  = 0.34) or Two-Thermodes (ICC 2 ,: 1  = 0.21) protocols. The hand immersion conditioning pain had higher reliability than thermode pain (ICC 2 ,: 1  = 0.76 vs ICC 2 ,: 1  = 0.16). Conditioned test-stimulus pain scores were of good (ICC 2 ,: 1  = 0.62) or fair (ICC 2 ,: 1  = 0.43) reliability for the Bath-Thermode and the STS, respectively, but not for the Two-Thermodes protocol (ICC 2 ,: 1  = 0.20). The newly developed STS-CPM paradigm was more reliable than other CPM protocols tested here, and should be further investigated for its clinical relevance. It appears that large contact size of the conditioning-stimulus and use of single rather than dual test-stimulus pain contribute to augmentation of CPM reliability. © 2015 American Academy of Pain Medicine. All rights reserved. For permissions, please e

  10. Comparison of a new whole-body continuous-table-movement protocol versus a standard whole-body MR protocol for the assessment of multiple myeloma

    International Nuclear Information System (INIS)

    Weckbach, S.; Michaely, H.J.; Schoenberg, S.O.; Dinter, D.J.; Stemmer, A.

    2010-01-01

    To evaluate a whole body (WB) continuous-table-movement (CTM) MR protocol for the assessment of multiple myeloma (MM) in comparison to a step-by-step WB protocol. Eighteen patients with MM were examined at 1.5T using a WB CTM protocol (axial T2-w fs BLADE, T1-w GRE sequence) and a step-by-step WB protocol including coronal/sagittal T1-w SE and STIR sequences as reference. Protocol time was assessed. Image quality, artefacts, liver/spleen assessability, and the ability to depict bone marrow lesions less than or greater than 1 cm as well as diffuse infiltration and soft tissue lesions were rated. Potential changes in the Durie and Salmon Plus stage and the detectability of complications were assessed. Mean protocol time was 6:38 min (CTM) compared to 24:32 min (standard). Image quality was comparable. Artefacts were more prominent using the CTM protocol (P = 0.0039). Organ assessability was better using the CTM protocol (P < 0.001). Depiction of bone marrow and soft tissue lesions was identical without a staging shift. Vertebral fractures were not detected using the CTM protocol. The new protocol allows a higher patient throughput and facilitates the depiction of extramedullary lesions. However, as long as vertebral fractures are not detectable, the protocol cannot be safely used for clinical routine without the acquisition of an additional sagittal sequence. (orig.)

  11. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  12. Analisa Kejahatan Penyelundupan Manusia Berdasarkan Smuggling of Migrants Protocol Ditinjau dari Perspektif Perlindungan Pencari Suaka: Studi Kasus Pengungsi Rohingnya

    Directory of Open Access Journals (Sweden)

    Diajeng Wulan Christianti

    2016-12-01

    Full Text Available Abstrak Eksodus besar-besaran etnis muslim Rohingya keluar Myanmar kembali terjadi sebagai akibat dilakukannya pembakaran desa, eksekusi, hingga pemerkosaan oleh militer Myanmar di Rakhine. Meskipun mereka harus rela membayar mahal, cara penyelundupan manusia kerap mereka gunakan karena cara formal untuk bisa masuk ke negara lain tidak dimungkinkan. Tindakan penyelundupan manusia adalah tindak pidana dalam Smuggling Protocol di mana negara-negara yang disinggahi pengungsi Rohingya seperti Thailand, Bangladesh, bahkan Indonesia telah menjadi negara pihak. Akibatnya, Pemerintah Thailand dan Bangladesh kerap menangkap pengungsi Rohingya yang masuk ke negaranya bahkan mengusir mereka untuk kembali ke Myanmar. Padahal, sebagai pencari suaka yang terancam persekusi, etnis Rohingya dilindungi oleh hukum Hak Asasi Manusia khususnya prinsip non-refoulement. Artikel ini menganalisa dilema antara aturan Smuggling Protokol yang bertujuan mencegah dan menegakan hukum atas terjadinya kejahatan penyelundupan manusia dengan kewajiban memberikan pengaman untuk melindungi hak-hak para pengungsi yang terancam persekusi. Artikel ini berkesimpulan bahwa meskipun Smuggling Protocol mampu untuk memberikan keseimbangan antara penegakan hukum kejahatan perlindungan manusia dan perlindungan pencari suaka, akan tetapi pada akhirnya semua tergantung dari keinginan negara untuk menerapkan Smuggling Protocol tersebut melalui aturan implementasi yang jelas namun proporsional. Abstract Again, thousands of Rohingya flee Myanmar to escape persecution after they saw their homes burned down, their family executed, and also suffered rape and torture by the Myanmar’s Military. In order to flee to Thailand or Bangladesh, Rohingyas often resort to using people smugglers and have to pay large amount of money. It is the only option left for desperate Rohingyas trying to save their lives. Smuggling of Migrants is criminal act under Smuggling Protocol. Thai and Bangladesh authorities

  13. Inter-comparison of NIOSH and IMPROVE protocols for OC and EC determination: implications for inter-protocol data conversion

    Science.gov (United States)

    Wu, Cheng; Huang, X. H. Hilda; Ng, Wai Man; Griffith, Stephen M.; Zhen Yu, Jian

    2016-09-01

    Organic carbon (OC) and elemental carbon (EC) are operationally defined by analytical methods. As a result, OC and EC measurements are protocol dependent, leading to uncertainties in their quantification. In this study, more than 1300 Hong Kong samples were analyzed using both National Institute for Occupational Safety and Health (NIOSH) thermal optical transmittance (TOT) and Interagency Monitoring of Protected Visual Environment (IMPROVE) thermal optical reflectance (TOR) protocols to explore the cause of EC disagreement between the two protocols. EC discrepancy mainly (83 %) arises from a difference in peak inert mode temperature, which determines the allocation of OC4NSH, while the rest (17 %) is attributed to a difference in the optical method (transmittance vs. reflectance) applied for the charring correction. Evidence shows that the magnitude of the EC discrepancy is positively correlated with the intensity of the biomass burning signal, whereby biomass burning increases the fraction of OC4NSH and widens the disagreement in the inter-protocol EC determination. It is also found that the EC discrepancy is positively correlated with the abundance of metal oxide in the samples. Two approaches (M1 and M2) that translate NIOSH TOT OC and EC data into IMPROVE TOR OC and EC data are proposed. M1 uses direct relationship between ECNSH_TOT and ECIMP_TOR for reconstruction: M1 : ECIMP_TOR = a × ECNSH_TOT + b; while M2 deconstructs ECIMP_TOR into several terms based on analysis principles and applies regression only on the unknown terms: M2 : ECIMP_TOR = AECNSH + OC4NSH - (a × PCNSH_TOR + b), where AECNSH, apparent EC by the NIOSH protocol, is the carbon that evolves in the He-O2 analysis stage, OC4NSH is the carbon that evolves at the fourth temperature step of the pure helium analysis stage of NIOSH, and PCNSH_TOR is the pyrolyzed carbon as determined by the NIOSH protocol. The implementation of M1 to all urban site data (without considering seasonal specificity

  14. Study of effective dose of various protocols in equipment cone beam CT

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O.; Caldas, L. V. E.; Lara, P. A.

    2014-08-01

    Currently the cone beam computed tomography is widely used in various procedures of dental radiology. Although the doses values associated with the procedures of cone beam CT are low compared to typical values associated with dental radiology procedure in multi slices CT. However can be high compared to typical values of other techniques commonly used in dental radiology. The present scenario is a very wide range of designs of equipment and, consequently, lack of uniformity in all parameters associated with x-ray generation and geometry. In this context, this study aimed to evaluate and calculate the absorbed dose in organs and tissues relevant and estimate effective dose for different protocols with different geometries of exposure in five cone beam CT equipment. For this, a female Alderson anthropomorphic phantom, manufactured by Radiology Support Devices was used. The phantom was irradiated with 26 dosimeters LiF: Mg, Ti (TLD-100), inserted in organs and tissues along the layers forming the head and neck of the phantom. The equipment used, in this present assessment, was: i-CAT Classical, Kodak 9000 3D, Gendex GXCB 500, Sirona Orthophos X G 3D and Planmeca Pro Max 3D. The effective doses were be determined by the ICRP 103 weighting factors. The values were between 7.0 and 111.5 micro Sv, confirming the broad dose range expected due to the diversity of equipment and protocols used in each equipment. The values of effective dose per Fov size were: between 7 and 51.2 micro Sv for located Fov; between 17.6 and 52.0 micro Sv for medium Fov; and between 11.5 and 43.1 micro Sv to large Fov (maxillofacial). In obtaining the effective dose the measurements highlighted a relevance contribution of dose absorbed by the remaining organs (36%), Salivary glands (30%), thyroid (12%) and bone marrow (12%). (Author)

  15. Study of effective dose of various protocols in equipment cone beam CT

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federale de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Caldas, L. V. E.; Lara, P. A., E-mail: mrs2206@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    Currently the cone beam computed tomography is widely used in various procedures of dental radiology. Although the doses values associated with the procedures of cone beam CT are low compared to typical values associated with dental radiology procedure in multi slices CT. However can be high compared to typical values of other techniques commonly used in dental radiology. The present scenario is a very wide range of designs of equipment and, consequently, lack of uniformity in all parameters associated with x-ray generation and geometry. In this context, this study aimed to evaluate and calculate the absorbed dose in organs and tissues relevant and estimate effective dose for different protocols with different geometries of exposure in five cone beam CT equipment. For this, a female Alderson anthropomorphic phantom, manufactured by Radiology Support Devices was used. The phantom was irradiated with 26 dosimeters LiF: Mg, Ti (TLD-100), inserted in organs and tissues along the layers forming the head and neck of the phantom. The equipment used, in this present assessment, was: i-CAT Classical, Kodak 9000 3D, Gendex GXCB 500, Sirona Orthophos X G 3D and Planmeca Pro Max 3D. The effective doses were be determined by the ICRP 103 weighting factors. The values were between 7.0 and 111.5 micro Sv, confirming the broad dose range expected due to the diversity of equipment and protocols used in each equipment. The values of effective dose per Fov size were: between 7 and 51.2 micro Sv for located Fov; between 17.6 and 52.0 micro Sv for medium Fov; and between 11.5 and 43.1 micro Sv to large Fov (maxillofacial). In obtaining the effective dose the measurements highlighted a relevance contribution of dose absorbed by the remaining organs (36%), Salivary glands (30%), thyroid (12%) and bone marrow (12%). (Author)

  16. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  17. Implementation of a Rapid, Protocol-based TIA Management Pathway.

    Science.gov (United States)

    Jarhult, Susann J; Howell, Melissa L; Barnaure-Nachbar, Isabelle; Chang, Yuchiao; White, Benjamin A; Amatangelo, Mary; Brown, David F; Singhal, Aneesh B; Schwamm, Lee H; Silverman, Scott B; Goldstein, Joshua N

    2018-03-01

    Our goal was to assess whether use of a standardized clinical protocol improves efficiency for patients who present to the emergency department (ED) with symptoms of transient ischemic attack (TIA). We performed a structured, retrospective, cohort study at a large, urban, tertiary care academic center. In July 2012 this hospital implemented a standardized protocol for patients with suspected TIA. The protocol selected high-risk patients for admission and low/intermediate-risk patients to an ED observation unit for workup. Recommended workup included brain imaging, vascular imaging, cardiac monitoring, and observation. Patients were included if clinical providers determined the need for workup for TIA. We included consecutive patients presenting during a six-month period prior to protocol implementation, and those presenting between 6-12 months after implementation. Outcomes included ED length of stay (LOS), hospital LOS, use of neuroimaging, and 90-day risk of stroke or TIA. From 01/2012 to 06/2012, 130 patients were evaluated for TIA symptoms in the ED, and from 01/2013 to 06/2013, 150 patients. The final diagnosis was TIA or stroke in 45% before vs. 41% after (p=0.18). Following the intervention, the inpatient admission rate decreased from 62% to 24% (pTIA among those with final diagnosis of TIA was 3% for both periods. Implementation of a TIA protocol significantly reduced ED LOS and total hospital LOS.

  18. A mechanical protocol to replicate impact in walking footwear.

    Science.gov (United States)

    Price, Carina; Cooper, Glen; Graham-Smith, Philip; Jones, Richard

    2014-01-01

    Impact testing is undertaken to quantify the shock absorption characteristics of footwear. The current widely reported mechanical testing method mimics the heel impact in running and therefore applies excessive energy to walking footwear. The purpose of this study was to modify the ASTM protocol F1614 (Procedure A) to better represent walking gait. This was achieved by collecting kinematic and kinetic data while participants walked in four different styles of walking footwear (trainer, oxford shoe, flip-flop and triple-density sandal). The quantified heel-velocity and effective mass at ground-impact were then replicated in a mechanical protocol. The kinematic data identified different impact characteristics in the footwear styles. Significantly faster heel velocity towards the floor was recorded walking in the toe-post sandals (flip-flop and triple-density sandal) compared with other conditions (e.g. flip-flop: 0.36±0.05 ms(-1) versus trainer: 0.18±0.06 ms(-1)). The mechanical protocol was adapted by altering the mass and drop height specific to the data captured for each shoe (e.g. flip-flop: drop height 7 mm, mass 16.2 kg). As expected, the adapted mechanical protocol produced significantly lower peak force and accelerometer values than the ASTM protocol (pfootwear style specific. Copyright © 2014 Elsevier B.V. All rights reserved.

  19. Comparison of two imaging protocols for acute stroke: unenhanced cranial CT versus a multimodality cranial CT protocol with perfusion imaging

    International Nuclear Information System (INIS)

    Langer, R. D.; Gorkom, K. Neidl van.; Kaabi, Ho Al.; Torab, F.; Czechowski, J.; Nagi, M.; Ashish, G. M.

    2007-01-01

    Full text: The aim of the study was to validate a multimodality cranial computed tomography (CCT) protocol for patients with acute stroke in the United Arab Emirates as a basic imaging procedure for a stroke unit. Therefore, a comparative study was conducted between two groups: retrospective, historical group 1 with early unenhanced CCT and prospective group 2 undergoing a multimodality CCT protocol. Follow-up unenhanced CCT >48 h served as gold standard in both groups. Group 1: Early unenhanced CCT of 50 patients were evaluated retrospectively, using Alberta Stroke Program Early CT Score, and compared with the definite infarction on follow-up CCT. Group 2: 50 patients underwent multimodality CCT (unenhanced CCT, perfusion studies: cerebral blood flow, cerebral blood volume, mean transit time and CT angiography) <8 h after clinical onset and follow-up studies. Modified National Institute of Health Stroke Scale was used clinically in both groups. Group 1 showed 38 men, 12 women, clinical onset 2-8 h before CCT and modified National Institute of Health Stroke Scale 0-28. Group 2 included 38 men, 12 women, onset 3-8 h before CCT, modified National Institute of Health Stroke Scale 0-28. Sensitivity was 58.3% in group 1 and 84.2% in group 2. Computed tomography angiography detected nine intracranial occlusions/stenoses. The higher sensitivity of the multimodality CCT protocol justifies its use as a basic diagnostic tool for the set-up of a first-stroke unit in the United Arab Emirates

  20. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  1. Accelerated rehabilitation compared with a standard protocol after distal radial fractures treated with volar open reduction and internal fixation: a prospective, randomized, controlled study.

    Science.gov (United States)

    Brehmer, Jess L; Husband, Jeffrey B

    2014-10-01

    There are relatively few studies in the literature that specifically evaluate accelerated rehabilitation protocols for distal radial fractures treated with open reduction and internal fixation (ORIF). The purpose of this study was to compare the early postoperative outcomes (at zero to twelve weeks postoperatively) of patients enrolled in an accelerated rehabilitation protocol with those of patients enrolled in a standard rehabilitation protocol following ORIF for a distal radial fracture. We hypothesized that patients with accelerated rehabilitation after volar ORIF for a distal radial fracture would have an earlier return to function compared with patients who followed a standard protocol. From November 2007 to November 2010, eighty-one patients with an unstable distal radial fracture were prospectively randomized to follow either an accelerated or a standard rehabilitation protocol after undergoing ORIF with a volar plate for a distal radial fracture. Both groups began with gentle active range of motion at three to five days postoperatively. At two weeks, the accelerated group initiated wrist/forearm passive range of motion and strengthening exercises, whereas the standard group initiated passive range of motion and strengthening at six weeks postoperatively. Patients were assessed at three to five days, two weeks, three weeks, four weeks, six weeks, eight weeks, twelve weeks, and six months postoperatively. Outcomes included Disabilities of the Arm, Shoulder and Hand (DASH) scores (primary outcome) and measurements of wrist flexion/extension, supination, pronation, grip strength, and palmar pinch. The patients in the accelerated group had better mobility, strength, and DASH scores at the early postoperative time points (zero to eight weeks postoperatively) compared with the patients in the standard rehabilitation group. The difference between the groups was both clinically relevant and statistically significant. Patients who follow an accelerated rehabilitation

  2. Isolation of cancer cells by "in situ" microfluidic biofunctionalization protocols

    KAUST Repository

    De Vitis, Stefania; Matarise, Giuseppina; Pardeo, Francesca; Catalano, Rossella; Malara, Natalia Maria; Trunzo, Valentina; Tallerico, Rossana; Gentile, Francesco T.; Candeloro, Patrizio; Coluccio, Maria Laura; Massaro, Alessandro S.; Viglietto, Giuseppe; Carbone, Ennio; Kutter, Jö rg Peter; Perozziello, Gerardo; Di Fabrizio, Enzo M.

    2014-01-01

    The aim of this work is the development of a microfluidic immunosensor for the immobilization of cancer cells and their separation from healthy cells by using "in situ" microfluidic biofunctionalization protocols. These protocols allow to link antibodies on microfluidic device surfaces and can be used to study the interaction between cell membrane and biomolecules. Moreover they allow to perform analysis with high processing speed, small quantity of reagents and samples, short reaction times and low production costs. In this work the developed protocols were used in microfluidic devices for the isolation of cancer cells in heterogeneous blood samples by exploiting the binding of specific antibody to an adhesion protein (EpCAM), overexpressed on the tumor cell membranes. The presented biofunctionalization protocols can be performed right before running the experiment: this allows to have a flexible platform where biomolecules of interest can be linked on the device surface according to the user's needs. © 2014 Elsevier B.V. All rights reserved.

  3. The Use Of Spikes Protocol In Cancer: An Integrative Review

    Directory of Open Access Journals (Sweden)

    Fernando Henrique de Sousa

    2017-03-01

    Full Text Available This is an integrative review which aimed to evaluate the use of the SPIKES protocol in Oncology. We selected articles published in Medline and CINAHL databases between 2005-2015, in English, with the descriptors defined by the Medical Subject Headings (MeSH:cancer, neoplasms, plus the uncontrolled descriptor: protocol spikes.  Six articles met the inclusion criteria and were analyzed in full, three thematic categories were established: aspects inherent to the health care professional; Aspects related to the patient and aspects related to the protocol. The main effects of the steps of SPIKES protocol can provide the strengthening of ties between health professionals and patients, and ensure the maintenance and quality of this relationship.  The results indicate an important limiting factor for effective doctor-patient relationship, the little training provided to medical professionals communication of bad news, verified by the difficulty reported in this moment through interviews in the analyzed studies.

  4. Isolation of cancer cells by "in situ" microfluidic biofunctionalization protocols

    KAUST Repository

    De Vitis, Stefania

    2014-07-01

    The aim of this work is the development of a microfluidic immunosensor for the immobilization of cancer cells and their separation from healthy cells by using "in situ" microfluidic biofunctionalization protocols. These protocols allow to link antibodies on microfluidic device surfaces and can be used to study the interaction between cell membrane and biomolecules. Moreover they allow to perform analysis with high processing speed, small quantity of reagents and samples, short reaction times and low production costs. In this work the developed protocols were used in microfluidic devices for the isolation of cancer cells in heterogeneous blood samples by exploiting the binding of specific antibody to an adhesion protein (EpCAM), overexpressed on the tumor cell membranes. The presented biofunctionalization protocols can be performed right before running the experiment: this allows to have a flexible platform where biomolecules of interest can be linked on the device surface according to the user\\'s needs. © 2014 Elsevier B.V. All rights reserved.

  5. A comparative study on the energy policies in Japan and Malaysia in fulfilling their nations' obligations towards the Kyoto Protocol

    International Nuclear Information System (INIS)

    Lau, Lee Chung; Tan, Kok Tat; Lee, Keat Teong; Mohamed, Abdul Rahman

    2009-01-01

    Global warming and the associated changes in the world climate pattern have been accepted world wide as the gravest threat to humanity in the 20th century. To mitigate the impacts of global warming, the Kyoto Protocol was established in 1997 with the objective of reducing global greenhouse gases (GHGs) emission, in particular carbon dioxide (CO 2 ), by 5.2% below 1990 levels. Developed nations that ratified the Protocol are committed to GHG reduction targets while developing nations are encouraged to reduce GHG emissions on a voluntary basis. Since most of the GHGs emissions come from the energy sector, energy policy plays an important role in fulfilling the Kyoto Protocol obligations. This year marks the beginning of the commitment period for the 2012 Kyoto Protocol. In this case, it would be worthwhile to compare the energy policies in Malaysia and Japan as these nations move towards fulfilling their obligations towards the Kyoto Protocol; bearing in mind that both countries ratified the Protocol, but that Japan commits a reduction target of 6% while Malaysia bears no obligation. Based on the comparison, recommendations were made on how a developing nation like Malaysia could adopt the policies implemented in Japan to suit local conditions and contribute significantly to GHG reduction.

  6. FLIP: An Internetwork Protocol for Supporting Distributed Systems

    NARCIS (Netherlands)

    Kaashoek, M.F.; van Renesse, R.; van Staveren, H.; Tanenbaum, A.S.

    1993-01-01

    Most modern network protocols give adequate support for traditional applications such as file transfer and remote login. Distributed applications, however, have different requirements 1993. Instead of using ad hoc protocols to meet each of the new requirements, we have designed a new protocol,

  7. Protocols for BNCT of glioblastoma multiforme at Brookhaven: Practical considerations

    Energy Technology Data Exchange (ETDEWEB)

    Chanana, A.D.; Coderre, J.A.; Joel, D.D.; Slatkin, D.N.

    1996-12-31

    In this report we discuss some issues considered in selecting initial protocols for boron neutron capture therapy (BNCT) of human glioblastoma multiforme. First the tolerance of normal tissues, especially the brain, to the radiation field. Radiation doses limits were based on results with human and animal exposures. Estimates of tumor control doses were based on the results of single-fraction photon therapy and single fraction BNCT both in humans and experimental animals. Of the two boron compounds (BSH and BPA), BPA was chosen since a FDA-sanctioned protocol for distribution in humans was in effect at the time the first BNCT protocols were written and therapy studies in experimental animals had shown it to be more effective than BSH.

  8. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  9. Implementation of enteral feeding protocol in an intensive care unit

    DEFF Research Database (Denmark)

    Padar, Martin; Uusvel, Gerli; Starkopf, Liis

    2017-01-01

    AIM: To determine the effects of implementing an enteral feeding protocol on the nutritional delivery and outcomes of intensive care patients. METHODS: An uncontrolled, observational before-and-after study was performed in a tertiary mixed medical-surgical intensive care unit (ICU). In 2013......, a nurse-driven enteral feeding protocol was developed and implemented in the ICU. Nutrition and outcome-related data from patients who were treated in the study unit from 2011-2012 (the Before group) and 2014-2015 (the After group) were obtained from a local electronic database, the national Population...... the groups. Patients in the After group had a lower 90-d (P = 0.026) and 120-d (P = 0.033) mortality. In the After group, enteral nutrition was prescribed less frequently (P = 0.039) on day 1 but significantly more frequently on all days from day 3. Implementation of the feeding protocol resulted in a higher...

  10. Recall of intensive care unit stay in patients managed with a sedation protocol or a sedation protocol with daily sedative interruption: a pilot study.

    Science.gov (United States)

    Ethier, Cheryl; Burry, Lisa; Martinez-Motta, Carlos; Tirgari, Sam; Jiang, Depeng; McDonald, Ellen; Granton, John; Cook, Deborah; Mehta, Sangeeta

    2011-04-01

    Analgesics and sedatives are integral for the relief of pain and anxiety in critically ill patients. However, these agents may contribute to amnesia for intensive care unit (ICU) events; which has been associated with development of posttraumatic stress disorder. Drug administration strategies that minimize sedative use have been associated with less amnesia. The objective of this pilot study was to evaluate recall of ICU stay in patients managed with 2 sedation strategies: a sedation protocol or a combination of sedation protocol and daily sedative/analgesic interruption. A questionnaire was administered on day 3 following ICU discharge to evaluate patients' recollections of pain, anxiety, fear, and sleep, as well as memories for specific ICU procedures. Participants were ICU survivors who had been enrolled in SLEAP - a randomized pilot trial comparing two sedation strategies, at 3 university-affiliated medical/surgical ICUs. Twenty-one patients who regained orientation within 72 hours of ICU discharge completed the questionnaire. More than 50% of patients recalled experiencing pain, anxiety, and fear to a moderate or extreme extent; and 57% reported inadequate sleep while in the ICU. Of the 21 patients, 48%, 33%, and 29% had no memories of endotracheal tube suctioning, being on a "breathing machine," and being bathed, respectively. A notable percentage of patients discharged from the ICU report moderate to extreme pain, anxiety, and fear, and inability to sleep during their ICU stay; and 29% to 48% have no recall of specific ICU events. Copyright © 2011 Elsevier Inc. All rights reserved.

  11. The impact of the Family Communication Coordinator (FCC) Protocol on the role stress of hospital chaplains.

    Science.gov (United States)

    Dodd-McCue, Diane; Tartaglia, Alexander

    2005-01-01

    The Family Communication Coordinator (FCC) Protocol was implemented to provide early family intervention and to facilitate effective communications during potential organ donation cases. Previous studies found the Protocol associated with improved donor outcome measures and with reduced role stress for ICU nurses caring for potential donors. The present study examines the impact of the Protocol on the perceived role stress of hospital chaplains serving as FCCs. All hospital chaplains serving as FCCs at an academic teaching hospital were surveyed. Their perceptions of job dimensions, role stress, job satisfaction, and commitment were measured; interviews and secondary data supplemented the surveys. The findings demonstrate that the FCC Protocol is associated with improved role stress, specifically role ambiguity and role conflict, among hospital chaplains serving as FCCs. Additionally, the findings suggest that satisfaction with the Protocol may be associated with experience with the Protocol.

  12. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  13. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  14. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature...... of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a process algebra model and deriving from this process models analysable by the Imperial PEPA Compiler and the LySatool....

  15. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  16. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  17. Pilot study: Assessing the effect of continual position monitoring technology on compliance with patient turning protocols

    OpenAIRE

    Schutt, Suann Cirigliano; Tarver, Christine; Pezzani, Michelle

    2017-01-01

    Abstract Aim The study aim was to evaluate if continual patient position monitoring, taking into account self‐turns and clinician‐assisted turns, would increase the percentage of time a patient's position changed at least every 2 hr. Background While patient turning has clinical benefits, current models to help staff remember to turn patients, such as “turn clocks” and timers, have not resulted in high compliance with turning protocols. In addition, reminders are based on arbitrary 2‐hr windo...

  18. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  19. A collaborative study on a Nordic standard protocol for detection and enumeration of thermotolerant Campylobacter in food (NMKL 119, 3. Ed., 2007)

    DEFF Research Database (Denmark)

    Rosenquist, Hanne; Bengtsson, Anja; Hansen, Tina Beck

    2007-01-01

    A Nordic standard protocol for detection and enumeration of thermotolerant Campylobacter in food has been elaborated (NMKL 119, 3. Ed., 2007). Performance and precision characteristics of this protocol were evaluated in a collaborative study with participation of 14 laboratories from seven European...... jejuni (SLV-542). Expected concentrations (95% C.I.) (cfu g(-1) or ml(-1)) of both strains in matrices were 0.6-1.4 and 23-60 for qualitative detection, and 0.6-1.4; 23-60; and 420-1200 for semi-quantitative detection. For quantitative determination, the expected concentrations of C. jejuni/C. coli were...

  20. Conducting Clinically Based Intimate Partner Violence Research: Safety Protocol Recommendations.

    Science.gov (United States)

    Anderson, Jocelyn C; Glass, Nancy E; Campbell, Jacquelyn C

    Maintaining safety is of utmost importance during research involving participants who have experienced intimate partner violence (IPV). Limited guidance on safety protocols to protect participants is available, particularly information related to technology-based approaches to informed consent, data collection, and contacting participants during the course of a study. The purpose of the article is to provide details on the safety protocol developed and utilized with women receiving care at an urban HIV clinic and who were taking part in an observational study of IPV, mental health symptoms, and substance abuse and their relationship to HIV treatment adherence. The protocol presents the technological strategies to promote safety and allow autonomy in participant decision-making throughout the research process, including Voice over Internet Protocol telephone numbers, and tablet-based eligibility screening and data collection. Protocols for management of participants at risk for suicide and/or intimate partner homicide that included automated high-risk messaging to participants and research staff and facilitated disclosure of risk to clinical staff based on participant preferences are discussed. Use of technology and partnership with clinic staff helped to provide an environment where research regarding IPV could be conducted without undue burden or risk to participants. Utilizing tablet-based survey administration provided multiple practical and safety benefits for participants. Most women who screened into high-risk categories for suicide or intimate partner homicide did not choose to have their results shared with their healthcare providers, indicating the importance of allowing participants control over information sharing whenever possible.

  1. Longer repetition duration increases muscle activation and blood lactate response in matched resistance training protocols

    Directory of Open Access Journals (Sweden)

    Hugo Cesar Martins-Costa

    2016-03-01

    Full Text Available Abstract This study analyzed the effect of different repetition durations on electromyographic and blood lactate responses of the bench press exercise. Fifteen recreationally trained male volunteers completed two training protocols, matched for intensity (% one-repetition maximum; 1RM, number of sets, number of repetitions, and rest intervals. One of the protocols was performed with a repetition duration of 4 s (2 s concentric: 2 s eccentric; 2:2 protocol, whereas the second protocol had a repetition duration of 6 s (2 s concentric: 4 s eccentric; 2:4 protocol. The results showed higher normalized integrated electromyography (pectoralis major and triceps brachii for the 2:4 protocol. Blood lactate concentration was also higher in the 2:4 protocol across all sets. These results show that adding 2 s to the eccentric action in matched training protocols increases muscle activation and blood lactate response, which reinforces the notion that increasing repetition duration is an alternative load progression in resistance training.

  2. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  3. Feeling Is Believing: A Secure Template Exchange Protocol

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.; Lee, Seong-Whan; Li, Stan Z.

    We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol efficiently calculates a shared secret key from biometric data. The protocol is used in an application where grip

  4. On the need of improved Accelerated Degradation Protocols (ADPs)

    DEFF Research Database (Denmark)

    Pizzutilo, E.; Geiger, S.; Grote, J. P.

    2016-01-01

    protocol covering the whole potential range from 0.6 to 1.5 VRHE. The latter is typically not addressed in literature. This finding is explained by taking into account platinum catalyzed carbon corrosion and transient platinum dissolution. Based on the obtained results, the question is raised...... protocols that are commonly used in the fuel cell community to simulate load cycle and start-stop conditions in proton exchange membrane fuel cells (PEMFCs). In contrast to previous assumptions, claiming a separation between carbon corrosion and platinum dissolution, in both standard protocols platinum...... dissolution and carbon corrosion are present at low rates, which is also reflected by a comparably low ECSA decrease. On the other hand, a huge increase in rate of both processes is observed during transitions from low to high potential regimes experienced by a PEMFC in operation, here studied in a third...

  5. Combining Mental Training and Physical Training With Goal-Oriented Protocols in Stroke Rehabilitation: A Feasibility Case Study

    Directory of Open Access Journals (Sweden)

    Xin Zhang

    2018-04-01

    Full Text Available Stroke is one of the leading causes of permanent disability in adults. The literature suggests that rehabilitation is key to early motor recovery. However, conventional therapy is labor and cost intensive. Robotic and functional electrical stimulation (FES devices can provide a high dose of repetitions and as such may provide an alternative, or an adjunct, to conventional rehabilitation therapy. Brain-computer interfaces (BCI could augment neuroplasticity by introducing mental training. However, mental training alone is not enough; but combining mental with physical training could boost outcomes. In the current case study, a portable rehabilitative platform and goal-oriented supporting training protocols were introduced and tested with a chronic stroke participant. A novel training method was introduced with the proposed rehabilitative platform. A 37-year old individual with chronic stroke participated in 6-weeks of training (18 sessions in total, 3 sessions a week, and 1 h per session. In this case study, we show that an individual with chronic stroke can tolerate a 6-week training bout with our system and protocol. The participant was actively engaged throughout the training. Changes in the Wolf Motor Function Test (WMFT suggest that the training positively affected arm motor function (12% improvement in WMFT score.

  6. Impact of a pain protocol including hypnosis in major burns.

    Science.gov (United States)

    Berger, Mette M; Davadant, Maryse; Marin, Christian; Wasserfallen, Jean-Blaise; Pinget, Christophe; Maravic, Philippe; Koch, Nathalie; Raffoul, Wassim; Chiolero, René L

    2010-08-01

    Pain is a major issue after burns even when large doses of opioids are prescribed. The study focused on the impact of a pain protocol using hypnosis on pain intensity, anxiety, clinical course, and costs. All patients admitted to the ICU, aged >18 years, with an ICU stay >24h, accepting to try hypnosis, and treated according to standardized pain protocol were included. Pain was scaled on the Visual Analog Scale (VAS) (mean of daily multiple recordings), and basal and procedural opioid doses were recorded. Clinical outcome and economical data were retrieved from hospital charts and information system, respectively. Treated patients were matched with controls for sex, age, and the burned surface area. Forty patients were admitted from 2006 to 2007: 17 met exclusion criteria, leaving 23 patients, who were matched with 23 historical controls. Altogether patients were 36+/-14 years old and burned 27+/-15%BSA. The first hypnosis session was performed after a median of 9 days. The protocol resulted in the early delivery of higher opioid doses/24h (ppatient. A pain protocol including hypnosis reduced pain intensity, improved opioid efficiency, reduced anxiety, improved wound outcome while reducing costs. The protocol guided use of opioids improved patient care without side effects, while hypnosis had significant psychological benefits.

  7. The effect of personalized versus standard patient protocols for radiostereometric analysis (RSA).

    Science.gov (United States)

    Muharemovic, O; Troelsen, A; Thomsen, M G; Kallemose, T; Gosvig, K K

    2018-05-01

    Increasing pressure in the clinic requires a more standardized approach to radiostereometric analysis (RSA) imaging. The aim of this study was to investigate whether implementation of personalized RSA patient protocols could increase image quality and decrease examination time and the number of exposure repetitions. Forty patients undergoing primary total hip arthroplasty were equally randomized to either a case or a control group. Radiographers in the case group were assisted by personalized patient protocols containing information about each patient's post-operative RSA imaging. Radiographers in the control group used a standard RSA protocol. At three months, radiographers in the case group significantly reduced (p RSA patient protocols have a positive effect on image quality and radiation dose savings. Implementation of personal patient protocols as a RSA standard will contribute to the reduction of examination time, thus ensuring a cost benefit for department and patient safety. Copyright © 2017 The College of Radiographers. Published by Elsevier Ltd. All rights reserved.

  8. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  9. Is Home-Based, High-Intensity Interval Training Cycling Feasible and Safe for Patients With Knee Osteoarthritis?: Study Protocol for a Randomized Pilot Study.

    Science.gov (United States)

    Keogh, Justin W L; Grigg, Josephine; Vertullo, Christopher J

    2017-03-01

    Osteoarthritis (OA) is a degenerative joint disease affecting the knee joint of many middle-aged and older adults. As OA symptoms typically involve knee pain and stiffness, individuals with knee OA are often insufficiently physically active, have low levels of physical function, and are at increased risk of other comorbidities and reduced quality of life. While moderate-intensity continuous training (MICT) cycling is often recommended, little is known about the feasibility, safety, and benefits of high-intensity interval training (HIIT) cycling for this population, even though the feasibility, safety, and benefits of HIIT have been demonstrated in other chronic disease groups. The primary objective of this pilot study was to examine the feasibility and safety of home-based HIIT and MICT cycling in middle-aged and older adults with knee OA. A secondary objective was to gain some insight into the relative efficacy of HIIT and MICT for improving health status (pain, stiffness, and disability), muscle function, and body composition in this population. This study protocol is being published separately to allow a detailed description of the research methods, explain the rationale for choosing the methodological details, and to stimulate consideration of the best means to simulate a research protocol that is relevant to a real-life treatment environment. Randomized pilot study protocol. This trial sought to recruit 40 middle-aged and older adults with knee OA. Participants were randomly allocated to either continuous (MICT) or HIIT home-based cycle training programs, with both programs requiring the performance of 4 cycling sessions (approximately 25 minutes per session) each week. Participants were measured at baseline and postintervention (8 weeks). Feasibility and safety were assessed by adherence rate, dropout rate, and number of adverse events. The relative efficacy of the cycling programs was investigated by 2 knee OA health status questionnaires (Western Ontario

  10. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  11. Validation of a ramp running protocol for determination of the true VO2max in mice

    Directory of Open Access Journals (Sweden)

    Mohamed Ayachi

    2016-08-01

    Full Text Available In the field of comparative physiology, it remains to be established whether the concept of VO2max is valid in the mouse and, if so, how this value can be accurately determined. In humans, VO2max is generally considered to correspond to the plateau observed when VO2 no longer rises with an increase in workload. In contrast, the concept of VO2peak tends to be used in murine studies. The objectives of the present study were to determine whether (i a continuous ramp protocol yielded a higher VO2peak than a stepwise, incremental protocol, and (ii the VO2peak measured in the ramp protocol corresponded to VO2max. The three protocols (based on intensity-controlled treadmill running until exhaustion with eight female FVB/N mice were performed in random order: (a an incremental protocol that begins at 10 m.min-1 speed and increases by 3 m.min-1 every 3 min. (b a ramp protocol with slow acceleration (3 m.min-2, and (c a ramp protocol with fast acceleration (12 m.min-2. Each protocol was performed with two slopes (0° and 25°. Hence, each mouse performed six exercise tests. We found that the value of VO2peak was protocol-dependent (p 8 mmol.l-1 and a respiratory exchange ratio >1. The total duration of the 3 m.min-2 0° ramp protocol was shorter than that of the incremental protocol. Taken as a whole, our results suggest that VO2max in the mouse is best determined by applying a ramp exercise protocol with slow acceleration and no treadmill slope.

  12. Computational Protocols for Prediction of Solute NMR Relative Chemical Shifts. A Case Study of L-Tryptophan in Aqueous Solution

    DEFF Research Database (Denmark)

    Eriksen, Janus J.; Olsen, Jógvan Magnus H.; Aidas, Kestutis

    2011-01-01

    to the results stemming from the conformations extracted from the MM conformational search in terms of replicating an experimental reference as well as in achieving the correct sequence of the NMR relative chemical shifts of L-tryptophan in aqueous solution. We find this to be due to missing conformations......In this study, we have applied two different spanning protocols for obtaining the molecular conformations of L-tryptophan in aqueous solution, namely a molecular dynamics simulation and a molecular mechanics conformational search with subsequent geometry re-optimization of the stable conformers...... using a quantum mechanically based method. These spanning protocols represent standard ways of obtaining a set of conformations on which NMR calculations may be performed. The results stemming from the solute–solvent configurations extracted from the MD simulation at 300 K are found to be inferior...

  13. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  14. Rush allergen specific immunotherapy protocol in feline atopic dermatitis: a pilot study of four cats.

    Science.gov (United States)

    Trimmer, Ann M; Griffin, Craig E; Boord, Mona J; Rosenkrantz, Wayne S

    2005-10-01

    Rush immunotherapy has been shown to be as safe as conventional immunotherapy in canine atopic patients. Rush immunotherapy has not been reported in the feline atopic patient. The purpose of this pilot study was to determine a safe protocol for rush immunotherapy in feline atopic patients. Four atopic cats diagnosed by history, physical examination and exclusion of appropriate differential diagnoses were included in the study. Allergens were identified via liquid phase immunoenzymatic testing (VARL: Veterinary Allergy Reference Labs, Pasadena, CA). Cats were premedicated with 1.5 mg triamcinolone orally 24 and 2 h prior to first injection and 10 mg hydroxyzine PO 24, 12 and 2 h prior to first injection. An intravenous catheter was placed prior to first injection. Allergen extracts (Greer Laboratories, Lenoir, North Carolina) were all administered subcutaneously at increasing protein nitrogen units (pnu) every 30 minutes for 5 h to maintenance dose of 15,000 pnus ml-1. Vital signs were assessed every 15 minutes. Two cats developed mild pruritus and the subsequent injection was delayed 30 minutes. No changes in either cat's vital signs were noted, nor was there any further pruritus. All four cats successfully completed rush immunotherapy. Two cats developed a dermal swelling on the dorsal neck one week later. In these four cats, this protocol appeared to be a safe regimen to reach maintenance therapy. A larger sample of feline patients is needed to determine the incidence of adverse reactions and to follow the success of ASIT based upon this method of induction.

  15. Study protocol: A Montessori approach to dementia-related, non-residential respite services in Australia.

    Science.gov (United States)

    Hanna, Andrew; Donnelly, James; Aggar, Christina

    2018-03-27

    Given the social burden and significant cost of dementia care in Australia, finding evidence-based approaches that improve outcomes, maintain independence, and reduce the impact on patients and families is essential. Finding effective ways to train and assist the healthcare staff who support these individuals is also critical, as they are considered to be at risk of workplace stress, burnout, and other psychological disturbances which negatively affects standards of care. The current paper describes a protocol for evaluating the effects of a Montessori-based approach to dementia care, in non-residential respite centres. An 18 month prospective observational, cohort controlled design is suggested that will compare participants from a community respite service that has undergone a Montessori-based workplace culture change and those from a service that provides a person-centred 'care as usual' approach. To achieve this, the protocol includes the assessment of participants across multiple variables on a monthly basis including the cognitive, behavioural, and emotional functioning of clients with dementia, levels of caregiver burden experienced by informal carers, and burnout, compassion satisfaction and workplace engagement among respite staff. The protocol also employs a qualitative evaluation of program fidelity. This approach will provide further insight into the potential benefits of early intervention with Montessori approaches for persons living with dementia in the community, their caregivers, and the staff and volunteers who assist them. Copyright © 2018 Elsevier B.V. All rights reserved.

  16. Implementation of the Welfare Quality broiler assessment protocol – final report : overview of outcome-based measurement of broiler welfare and a general discussion on the Welfare Quality broiler assessment protocol

    NARCIS (Netherlands)

    Jong, de I.C.; Gunnink, H.; Hindle, V.A.

    2015-01-01

    In the current report, two topics related to our study on the implementation of the Welfare Quality® broiler assessment protocol are discussed. First, animal-based measures for broiler welfare, currently included in the Welfare Quality® broiler assessment protocol, are discussed with respect to

  17. MAC-layer protocol for TCP fairness in Wireless Mesh Networks

    KAUST Repository

    Nawab, Faisal

    2012-08-01

    In this paper we study the interactions of TCP and IEEE 802.11 MAC in Wireless Mesh Networks (WMNs). We use a Markov chain to capture the behavior of TCP sessions, particularly the impact on network throughput performance due to the effect of queue utilization and packet relaying. A closed form solution is derived to numerically determine the throughput. Based on the developed model, we propose a distributed MAC protocol to alleviate the unfairness problem in WMNs. Our protocol uses the age of packet as a priority metric for packet scheduling. Simulation is conducted to validate our model and to illustrate the fairness characteristics of our proposed MAC protocol. We conclude that we can achieve fairness with only little impact on network capacity.

  18. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    International Nuclear Information System (INIS)

    Gerber, Naamit Kurshan; Wexler, Leonard H.; Singer, Samuel; Alektiar, Kaled M.; Keohan, Mary Louise; Shi, Weiji; Zhang, Zhigang; Wolden, Suzanne

    2013-01-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low risk, 61 (44%) at intermediate risk, and 44 (32%) at high risk. Forty-six percent were treated on or according to a prospective RMS protocol. The 5-year rate of overall survival (OS) was 45% for patients with nonmetastatic disease. The failure rates at 5 years for patients with nonmetastatic disease were 34% for local failure and 42% for distant failure. Among patients with nonmetastatic disease (n=94), significant factors associated with OS were histologic diagnosis, site, risk group, age, and protocol treatment. On multivariate analysis, risk group and protocol treatment were significant after adjustment for age. The 5-year OS was 54% for protocol patients versus 36% for nonprotocol patients. Conclusions: Survival in adult patients with nonmetastatic disease was significantly improved for those treated on RMS protocols, most of which are now open to adults

  19. Adult Rhabdomyosarcoma Survival Improved With Treatment on Multimodality Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Gerber, Naamit Kurshan [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wexler, Leonard H. [Department of Pediatrics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Singer, Samuel [Department of Surgery, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Alektiar, Kaled M. [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Keohan, Mary Louise [Department of Medicine, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Shi, Weiji; Zhang, Zhigang [Department of Epidemiology and Biostatistics, Memorial Sloan-Kettering Cancer Center, New York, New York (United States); Wolden, Suzanne, E-mail: woldens@mskcc.org [Department of Radiation Oncology, Memorial Sloan-Kettering Cancer Center, New York, New York (United States)

    2013-05-01

    Purpose: Rhabdomyosarcoma (RMS) is a pediatric sarcoma rarely occurring in adults. For unknown reasons, adults with RMS have worse outcomes than do children. Methods and Materials: We analyzed data from all patients who presented to Memorial Sloan-Kettering Cancer Center between 1990 and 2011 with RMS diagnosed at age 16 or older. One hundred forty-eight patients met the study criteria. Ten were excluded for lack of adequate data. Results: The median age was 28 years. The histologic diagnoses were as follows: embryonal 54%, alveolar 33%, pleomorphic 12%, and not otherwise specified 2%. The tumor site was unfavorable in 67% of patients. Thirty-three patients (24%) were at low r