WorldWideScience

Sample records for additional protocol ratification

  1. Additional protocol between France, EURATOM and IAEA. 2001-2002 ordinary session. Project of law authorizing the ratification of the additional protocol to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency relative to the application of warranties in France; Protocole additionnel entre la France, Euratom et l'AIEA. Session ordinaire de 2001-2002. Projet de loi autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    This additional protocol to the agreement between France, EURATOM and the IAEA aims at reinforcing the nuclear weapons non-proliferation regime. This protocol widens the field of competences of the IAEA with the supply of new information relative to: the civil nuclear cooperation between France and countries having no nuclear weapons in the domain of fuel cycle; the regular inspection of French nuclear facilities; the trade (import and export) of medium- or high-level radioactive wastes containing plutonium, highly enriched uranium or {sup 233}U, and the trade of some non-nuclear equipments or materials with countries having no nuclear weapons. The protocol defines also some practical dispositions relative to the delays and periodicity of controls, to the transmission of data, to the appointment of IAEA inspectors and their access to the facilities and sites considered. The list of the activities and equipments covered by the protocol are given in appendixes. (J.S.)

  2. Law project adopted by the Senate and authorizing the ratification of the additional protocol to the agreement between France, the European atomic energy community and the international atomic energy agency relative to the application of warranties in France; Projet de loi adopte par le Senat autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en Franc

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    This project of law concerns an additional protocol to the agreement of warranties signed on September 22, 1998 between France, the European atomic energy community and the IAEA. This agreement concerns the declaration of all information relative to the R and D activities linked with the fuel cycle and involving the cooperation with a foreign country non endowed with nuclear weapons. These information include the trade and processing of nuclear and non-nuclear materials and equipments devoted to nuclear reactors (pressure vessels, fuel loading/unloading systems, control rods, force and zirconium tubes, primary coolant pumps, deuterium and heavy water, nuclear-grade graphite), to fuel reprocessing plants, to isotope separation plants (gaseous diffusion, laser enrichment, plasma separation, electromagnetic enrichment), to heavy water and deuterium production plants, and to uranium conversion plants. (J.S.)

  3. The activities of the Republic of Serbia in achieving the objectives given by the ratification of the Protocol on water and health

    Directory of Open Access Journals (Sweden)

    Jovanović Ljiljana M.

    2015-01-01

    Full Text Available By the ratification of the Protocol on water and health, the Republic of Serbia accepted the obligations of that international treaty, which is also the key instrument in advancing the water-and-sanitation- realted goal of the Commitment to Act of the Parma Declaration on Environment and Health. For the purpose of the achieving and maintaining the established and validated Protocol on Watwr and Health targets, and in order to obtain the high level of protection against water-related diseases, the continuous cooperation between ministries and institutions of health and environment is needed, as well as the mobilization on local and regional level, which will contribute to awareness raising in each individual of the necessity of the water resources and environmental protection, as well as of the hygienic promotion and health protection.

  4. Workshop to promote the ratification of the protocol on heavy metals across the entire UN ECE region

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-12-15

    Within the workshop of the German Federal Environment Agency (Dessau-Rosslau, Federal Republic of Germany) at 14th to 16th May, 2008 in Yerevan (Armenia), the following lectures were held: (1) The convention and its protocols - framework and requirements (Tea Aulavuo); (2) Development of the heavy metals protocol up to now (D. Jost); (3) Experiences in transposing the obligations of the HM protocol into national law (Ivan Angelov); (4) Evaluation of concentrations of air pollutants and depositions of HM over the EECCA region (Ilia Ilyin); (5) The effectiveness of the HM protocol - emission reductions and costs (TNO-study) (M. van het Bolscher); (6) Technologies and techniques and their emission reduction potential and costs (Andre Peeters Weem); (7) Synergies of reduction of HM and particulate matter (Katja Kraus); (8) Critical loads / critical levels and effects of HM - integrated assessment (Jean-Paul Hettelingh); (9) Additional technical measures / options and their reduction potential (M. van het Bolscher); (10) Overview of the situation in the EECCA region - evaluation of a questionnaire of the Secretariat of the LRTAP Convention and ideas on revising the protocol and its annexes (Johan Sliggers); (11) Future aims of the TF (Katja Kraus).

  5. Protocol for ADDITION-PRO

    DEFF Research Database (Denmark)

    Johansen, Nanna Borup; Hansen, Anne-Louise Smidt; Jensen, Troels M

    2012-01-01

    disease and microvascular diabetic complications. We also require a better understanding of the mechanisms that underlie and drive early changes in cardiometabolic physiology. The ADDITION-PRO study was designed to address these issues among individuals at different levels of diabetes risk recruited from...... Danish primary care. METHODS/DESIGN: ADDITION-PRO is a population-based, longitudinal cohort study of individuals at high risk for diabetes. 16,136 eligible individuals were identified at high risk following participation in a stepwise screening programme in Danish general practice between 2001 and 2006...... at high risk for diabetes. The detailed phenotyping of this cohort will also allow a number of research questions concerning early changes in cardiometabolic physiology to be addressed....

  6. Report realized on behalf of the Foreign Affairs Commission, of Defense and Armed Forces on the law project allowing the additional protocol ratification to the agreement between France, European Community of the atomic energy and the International Atomic Energy Agency relative to the guaranties application in France; Rapport fait au nom de la commission des affaires etrangeres, de la defense et des forces armees sur le projet de loi autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    In a first part the author presents the International Atomic Energy Agency and its missions in the nuclear non proliferation policy especially in the agreements with the states of the TNP (Treaty of Nuclear non Proliferation). the today position of France is then analyzed towards the IAEA and the novations added by the additional protocol. (A.L.B.)

  7. Report realized on the behalf of the Foreign Affairs Commission on the law project, adopted by the Senate, authorizing the added protocol ratification to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency relative to the guaranties application in France; Rapport fait au nom de la Commission des Affaires Etrangeres sur le projet de Loi, adopte par le Senat, autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-02-01

    This document presents the analyse of the law project, adopted by the Senate, authorizing the added protocol ratification to the agreement between France, the Atomic Energy European Community and the International Atomic Energy Agency relative to the guaranties application in France. It deals with the nuclear proliferation fight in France and the the program of enhancement of guaranties in the framework of the IAEA. (A.L.B.)

  8. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    Energy Technology Data Exchange (ETDEWEB)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  9. Feature ratification procedures in some CIS countries

    Directory of Open Access Journals (Sweden)

    Eldar R. Hisamov

    2011-04-01

    Full Text Available This article attempts a comparative analysis of legislative procedures for the ratification of international treaties in various countries of the Commonwealth of Independent States (CIS.

  10. New START: The Contentious Road to Ratification

    Directory of Open Access Journals (Sweden)

    Elizabeth Zolotukhina

    2011-01-01

    Full Text Available Senate ratification of the New START treaty re-established effective bilateral inspection and monitoring of American and Russian nuclear holdings and has the potential to further enhance U.S.-Russian cooperation on key issues, including containing the Iranian nuclear program, and further reductions in the two countries' arsenals. Although the accord was widely heralded as a foreign policy success of the Obama administration, the contentious Senate ratification may impede future progress on arms control.

  11. Report on July 2015 Additional Protocol Coordinators Best Practices Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Gitau, Ernest T.N. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Burbank, Roberta L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Finch, Valerie A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-07-31

    After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old), identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.

  12. The Role of Additional Pulses in Electropermeabilization Protocols

    Science.gov (United States)

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. Here we introduce a theoretical model that takes into account this effect in the application of an EP-based protocol, and its validation with experimental measurements. The theoretical model describes the electric field distribution by a nonlinear Laplace equation with a variable conductivity coefficient depending on the electric field, the temperature and the quantity of pulses, and the Penne's Bioheat equation for temperature variations. In the experiments, a vegetable tissue model (potato slice) is used for measuring electric currents and tissue electropermeabilized area in different EP protocols. Experimental measurements show that, during sequential pulses and keeping constant the applied voltage, the electric current density and the blackened (electropermeabilized) area increase. This behavior can only be attributed to a rise in the electric conductivity due to a higher number of pulses. Accordingly, we present a theoretical modeling of an EP protocol that predicts correctly the increment in the electric current density observed experimentally during the addition of pulses. The model also demonstrates that the electric current increase is due to a rise in the electric conductivity, in turn induced by temperature and pulse number, with no significant changes in the electric field distribution. The EP model introduced, based on a novel formulation of the electric conductivity, leads to a more realistic description of the EP phenomenon, hopefully providing more accurate

  13. THE LISBON TREATY: A SINUOUS RATIFICATION

    Directory of Open Access Journals (Sweden)

    Adrian-Gabriel Corpădean

    2011-03-01

    Full Text Available This article deals with the intricate ratification process of the Lisbon Treaty, while focusing on the thorny issues of Euroscepticism and democratic deficit within the European Union in the current institutional context. The study is based on a wide research endeavour, whose purpose has been to encompass multiple points of view on the future of the European Union, seen from the perspective of the Treaty of Lisbon and its reception in all member states. These viewpoints include the ones found in the speciality literature, as well as in the press that published representative articles during the debates on the ratification of the Lisbon Treaty. Useful attempts are made in order to classify the member states of the EU according to various relevant criteria in their attitude germane to the ratification of the Treaty, so as to outline new waves of Euroscepticism, opt-outs and criticism. Apart from an institutional and a legal perspective, this study presents a large number of political, national and even cultural aspects encountered in attitudes and courses of action pertaining to the future of European Construction, seen through the eyes of the reform process carried out by the latest EU major legal document.

  14. Recommended Protocol for Round Robin Studies in Additive Manufacturing

    Science.gov (United States)

    Moylan, Shawn; Brown, Christopher U.; Slotwinski, John

    2016-01-01

    One way to improve confidence and encourage proliferation of additive manufacturing (AM) technologies and parts is by generating more high quality data describing the performance of AM processes and parts. Many in the AM community see round robin studies as a way to generate large data sets while distributing the cost among the participants, thereby reducing the cost to individual users. The National Institute of Standards and Technology (NIST) has conducted and participated in several of these AM round robin studies. While the results of these studies are interesting and informative, many of the lessons learned in conducting these studies concern the logistics and methods of the study and unique issues presented by AM. Existing standards for conducting interlaboratory studies of measurement methods, along with NIST’s experience, form the basis for recommended protocols for conducting AM round robin studies. The role of round robin studies in AM qualification, some of the limitations of round robin studies, and the potential benefit of less formal collaborative experiments where multiple factors, AM machine being only one, are varied simultaneously are also discussed. PMID:27274602

  15. Recommended Protocol for Round Robin Studies in Additive Manufacturing.

    Science.gov (United States)

    Moylan, Shawn; Brown, Christopher U; Slotwinski, John

    2016-03-01

    One way to improve confidence and encourage proliferation of additive manufacturing (AM) technologies and parts is by generating more high quality data describing the performance of AM processes and parts. Many in the AM community see round robin studies as a way to generate large data sets while distributing the cost among the participants, thereby reducing the cost to individual users. The National Institute of Standards and Technology (NIST) has conducted and participated in several of these AM round robin studies. While the results of these studies are interesting and informative, many of the lessons learned in conducting these studies concern the logistics and methods of the study and unique issues presented by AM. Existing standards for conducting interlaboratory studies of measurement methods, along with NIST's experience, form the basis for recommended protocols for conducting AM round robin studies. The role of round robin studies in AM qualification, some of the limitations of round robin studies, and the potential benefit of less formal collaborative experiments where multiple factors, AM machine being only one, are varied simultaneously are also discussed.

  16. Diffusion of innovations theory applied to global tobacco control treaty ratification.

    Science.gov (United States)

    Valente, Thomas W; Dyal, Stephanie R; Chu, Kar-Hai; Wipfli, Heather; Fujimoto, Kayo

    2015-11-01

    This study applies diffusion of innovations theory to understand network influences on country ratification of an international health treaty, the Framework Convention for Tobacco Control (FCTC). From 2003 to 2014 approximately 90% of United Nations member countries ratified the FCTC. We hypothesized that communication between tobacco control advocates on GLOBALink, a 7000-member online communication forum in existence from 1992 to 2012, would be associated with the timing of treaty ratification. We further hypothesized dynamic network influences such that external influence decreased over time, internal influence increased over time, and the role of opinion leader countries varied over time. In addition we develop two concepts: Susceptibility and influence that uncover the micro-level dynamics of network influence. Statistical analyses lend support to the influence of co-subscriptions on GLOBALink providing a conduit for inter-country influences on treaty ratification and some support for the dynamic hypotheses. Analyses of susceptibility and infection indicated particularly influential countries. These results have implications for the study of policy diffusion as well as dynamic models of behavior change.

  17. Additional protocols and regional cooperation on peaceful uses of nuclear energy in northeast Asia

    Energy Technology Data Exchange (ETDEWEB)

    Choe, Kwan Kyoo [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2004-07-01

    The main object of this article is to clarify the relations between the implementation of the Protocols Additional to Safeguards Agreement (hereinafter referred to as the Additional Protocols) and the feasibility of the regional cooperation on peaceful uses of nuclear energy in Northeast Asia (NEA). The regionalism has a strong tendency to be based in advance on regional cooperation. The regionalism has three main structural elements in its definition: geographical proximity, cultural resemblance, and cooperative attitudes among all the countries concerned. The Additional Protocols allow the IAEA to access to more detailed information and nuclear activities of a State party. The aspect that the Additional Protocols could increase the nuclear transparency will result in ultimately promoting the confidence among the regional nations concerned.

  18. U.S. Ratification of the Chemical Weapons Convention

    Science.gov (United States)

    2011-12-01

    safeguard trade secrets. Leading corpora- tions such as DuPont, Dow, and Monsanto also supported CWC ratification to improve the public image of the...represented large chemical companies such as Dow, DuPont, and Monsanto , was highly effective at contacting senators, putting out useful information, and

  19. Law project (no. 1329) adopted by the Senate and authorizing the ratification of the agreement between the French Republic, the European Atomic Energy Community and the International Atomic Energy Agency relative to the enforcement of warranties in the framework of the treaty of nuclear weapons prohibition in South America and the Caribbeans area (two protocols together); Projet de loi (no. 1329) adopte par le Senat autorisant la ratification de l'accord entre la Republique francaise, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties dans le cadre du traite visant l'interdiction des armes nucleraires en Amerique latine et dans les Caraibes (ensemble deux protocoles)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-01-01

    The French Senate adopted on January 6, 2004 the project of law which authorizes the ratification of the agreement between France, the European atomic energy community and the IAEA about the enforcement of warranties in the framework of the treaty of interdiction of nuclear weapons in South America and in the Caribbean area signed in Vienna (Austria) on March 21, 2000. The text of this treaty is attached to this law. (J.S.)

  20. Hierarchical Management to be Implemented on Ratification Risk of Certification Institution

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    @@ Recently, the China National Accreditation Service for Conformity Assessment (CNAS) has promulgated Measures for Hierarchical Management of Ratification Risk of Certification Institution (hereinafter referred to as Measures), which was put into execution.

  1. Report made on behalf of the commission of foreign affairs about the law project, adopted by the Senate, authorizing the ratification of the agreement between the French Republic, the European Atomic Energy Community and the International Atomic Energy Agency relative to the enforcement of warranties in the framework of the treaty of nuclear weapons prohibition in South America and the Caribbeans area (two protocols together); Rapport fait au nom de la commission des affaires etrangeres sur le projet de loi, adopte par le senat, autorisant la ratification de l'accord entre la Republique francaise, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties dans le cadre du traite visant l'interdiction des armes nucleaires en Amerique latine et dans les Caraibes (ensemble deux protocoles)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This report comments the reasons of the signature of the agreement between France, EURATOM and the IAEA for the reinforcement of IAEA's non-proliferation controls in the South America and Caribbean areas (law project no. 1329). The ratification of this agreement will have only few concrete consequences but will contribute to the promotion of non-proliferation and to the enforcement of warranties in the framework of the treaty of interdiction of nuclear weapons in South America and in the Caribbean area (signed in Vienna, Austria, on March 21, 2000). The commission of foreign affairs adopted this law project on March 3, 2004. (J.S.)

  2. Oak Ridge National Laboratory's Preparations for Additional Protocol Implementation

    Energy Technology Data Exchange (ETDEWEB)

    McCowan, Janie [ORNL; Cain, Ronald A [ORNL

    2009-01-01

    The United States Additional Protocol (AP) with the International Atomic Energy Agency (IAEA) entered into force (EIF) January 6, 2009. In anticipation of the EIF, the Department of Energy (DOE) National Nuclear Security Administration Office of International Regimes and Agreements (NA-243) began the initial DOE AP data call on November 3, 2008. This paper describes the Oak Ridge National Laboratory's (ORNL's) preparation, organization, and development efforts to successfully implement the AP and complete the AP data call. ORNL had 35 days to identify declarable activities and finalize the declaration line items (DLIs) for submission to NA-243. To be able to respond within the required time frame, many preparation activities at ORNL were necessary, such as determining the AP coordinator (APC) and team roles; conducting site awareness training; creating the ORNL Standards-Based Management System (SBMS) procedure Reporting of Nuclear Fuel Cycle Activities; training personnel; and defining site implementation software tools. Identifying, updating, compiling, reviewing, and submitting the DLIs to NA-243 were all critical activities for successfully implementing the AP and completing the AP data call at ORNL.

  3. Whither the TPP? Political Economy of Ratification and Effect on Trade Architecture in East Asia

    Directory of Open Access Journals (Sweden)

    Byung-il Choi

    2016-09-01

    Full Text Available In the race for establishing trading architecture consistent with new landscape of the global economy, the US is ahead of the game by concluding the Trans Pacific Partnership Agreement with 11 countries. To make it reality, the ratification is essential. In the battle for ratification in the US, declining globalism confronts rising protectionism. This paper models the ratification process as contest between globalism and protectionism, and analyzes the optimal timing for ratification. Based on this framework, various ratification scenarios are analyzed. The paper argues less likelihood for the lame-duck session passage and more likelihood for prolonged and protracted delay, due to changing political dynamics and declining intellectual support for globalism. Hence, the future of Trans Pacific Partnership Agreement may prove different, compared to the North American Free Trade Agreement and the Korea-US Free Trade Agreement, both of which were renegotiated and ratified eventually. Then, the US would lose the first move advantage. The paper also discusses strategic implications of delayed ratification on the evolution of trading architecture in East Asia.

  4. Implementation of the IAEA Additional Protocol in the Philippines: USDOE/PNRI Cooperation

    Energy Technology Data Exchange (ETDEWEB)

    Sequis, Julietta E.; Cain, Ronald A.; Burbank, Roberta L.; Hansen, Linda H.; VanSickle, Matthew; Killinger, Mark H.; Elkhamri, Oksana O.

    2011-07-19

    The Philippines entered into force the International Atomic Energy Agency (IAEA) Additional Protocol (AP) in February 2010. The Philippine Nuclear Research Institute (PNRI) is the government agency responsible for implementing the AP. In June 2010 the IAEA invited the U.S. Department of Energy (DOE) to help conduct a joint national training seminar on the AP. DOE presented to PNRI its AP international technical assistance program, administered by the International Nuclear Safeguards and Engagement Program (INSEP), which helps partner countries implement the AP. In coordination with the IAEA, DOE established this program in 2008 to complement IAEA AP seminars with long-term country-specific cooperation from the perspective of a Member State. The US version of the AP is the same version as that of non-nuclear weapon states except for the addition of a national security exclusion. Due to this, DOE cooperation with other countries enables the sharing of valuable lessons learned in implementing the AP. DOE/INSEP described to PNRI the various areas of cooperation it offers to interested countries, whether they are preparing for entry into force or already implementing the AP. Even countries that have entered the AP into force are sometimes not fully prepared to implement it well, and welcome cooperation to improve their implementation process. PNRI and DOE/INSEP subsequently agreed to cooperate in several areas to enhance the efficiency and effectiveness of the Philippines AP implementation. These areas include providing working-level training to PNRI staff and preparing an information document that details that training for future reference, assisting with the development of an outreach program and procedures for AP reporting and complementary access, and identifying Annex II equipment and non-nuclear materials whose export must be reported under the AP. DOE laboratory representatives, funded by INSEP, met again with PNRI in February 2011 to provide training for PNRI AP

  5. 75 FR 4323 - Additional Quantitative Fit-testing Protocols for the Respiratory Protection Standard

    Science.gov (United States)

    2010-01-27

    ..., grimace, bending over, and final normal breathing. The TSI PortaCount Plus fit-testing instrument...-mask and ambient-air sampling tubes. \\2\\ This protocol eliminated the initial normal-breathing exercise... sample tube. The instrument cannot know the path taken by a particle found in the breathing zone of a...

  6. Comparison of Channel Estimation Protocols for Coherent AF Relaying Networks in the Presence of Additive Noise and LO Phase Noise

    Directory of Open Access Journals (Sweden)

    Stefan Berger

    2010-01-01

    Full Text Available Channel estimation protocols for wireless two-hop networks with amplify-and-forward (AF relays are compared. We consider multiuser relaying networks, where the gain factors are chosen such that the signals from all relays add up coherently at the destinations. While the destinations require channel knowledge in order to decode, our focus lies on the channel estimates that are used to calculate the relay gains. Since knowledge of the compound two-hop channels is generally not sufficient to do this, the protocols considered here measure all single-hop coefficients in the network. We start from the observation that the direction in which the channels are measured determines (1 the number of channel uses required to estimate all coefficient and (2 the need for global carrier phase reference. Four protocols are identified that differ in the direction in which the first-hop and the second-hop channels are measured. We derive a sensible measure for the accuracy of the channel estimates in the presence of additive noise and phase noise and compare the protocols based on this measure. Finally, we provide a quantitative performance comparison for a simple single-user application example. It is important to note that the results can be used to compare the channel estimation protocols for any two-hop network configuration and gain allocation scheme.

  7. [ILO conventions on occupational safety and health with reference to ratification status of Japan].

    Science.gov (United States)

    Takahashi, K; Okubo, T

    1995-07-01

    This paper grouped together recent ILO conventions relevant to occupational safety and health (OSH) in order to clarify their characteristics and form an overview. There are 13 such conventions adopted by ILO during the period 1960-1993. Each of these conventions have distinct goals to cover respective areas of OSH, which was contrasted with each other. Conventions are subject to ratification, thus the ratification status of Japan was statistically compared to that of ILO and OECD member states. As at June 1993, Japan ratified three of such conventions, which was slightly higher than the average number ratified by all ILO member states and ranked 11th among 24 OECD member states. The relative ratification status of Japan on ILO Conventions fared better with those relevant to OSH than others. ILO Conventions are inter-related by reference and note, thus ratification of basic conventions such as C. 155 (Occupational Safety and Health Convention) and C. 148 (Working Environment Convention), neither of which is ratified by Japan, should be prioritized to further promote ratification status in the OSH area.

  8. The Effects of AFGP Addition and Removing Protocol of CPA on Vitrification Cryopreservation of Osteoblasts

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    1 Introduction Vitrification is an effective method for cryopreservation of cells~([1, 2]). However, cells are usually damaged due to the osmotic injury caused by the higher concentrations of cryoprotective agents (CPA) during CPA removing. The ice recrystallization in thawing solution can also hurt cells seriously. Antifreeze glycoprotein (AFGPs) is extremely efficient at inhibiting ice recrystallization~([3]).The effects of Removing protocols and AFGP on cell viability were investigated. 2 Materials and M...

  9. 32 CFR 151.6 - Resolution of ratification, with reservations, as agreed to by the Senate on July 15, 1953.

    Science.gov (United States)

    2010-07-01

    ... POLICIES AND INFORMATION § 151.6 Resolution of ratification, with reservations, as agreed to by the Senate..., or alters the right of the United States of America to safeguard its own security by excluding or... ratification, it is the sense of the Senate that: (a) The criminal jurisdiction provisions of Article VII...

  10. CLASS ACTION AGAINST THE NON-IMMEDIACY OF RATIFICATION OF THE 1990 MIGRANT WORKERS CONVENTION

    Directory of Open Access Journals (Sweden)

    Wisnu Aryo Dewanto

    2014-03-01

    Full Text Available Ratification of treaties in Indonesia can be regarded as mere political acts, as ratification itself  does not yet rule for its enforcement in Indonesia’s jurisdiction. As stipulated in Article 11 of the 1945Indonesian Constitution, these ratifications are still subject to consent from the Indonesian House of Representatives (DPR as they are the appointed institution in Indonesia with treaty-making powers. The act of ratification by the Indonesian Government is regarded as a ratification only in the international sense, where such action would only make the treaty enter into force internationally, but not internally within Indonesia. This paper seeks to analyze the legal implications which signatureand ratification of international treaties may hold in the Indonesian government. Such is done by studying the class action lawsuit for Indonesia being signatories the Convention on the Protection of the Rights of All Migrant Workers and Member of Their Families and its failure continue to further ratify the Convention. Ratifikasi perjanjian internasional merupakan tindakan politik yang memerlukan persetujuan dari  Dewan Perwakilan Rakyat (DPR sebagai lembaga dengan treaty-making power sebagaimana yangdiatur oleh Pasal 11 UUD 1945. Tindakan ratifikasi oleh Pemerintah Indonesia hanya bermakna sebagairatification hanya dalam the international sense, yakni membuat perjanjian tersebut berlaku di levelinternasional, bukan berlaku di wilayah hukum Republik Indonesia. Artikel ini menganalisis proses andimplikasi hukum diratifikasinya dan ditandatanganinya suatu perjanjian internasional oleh PemerintahIndonesia dengan menelaah gugatan class action yang dilakukan terhadap Pemerintah Indonesia mengenaibelum diratifikasinya Konvensi Buruh Migran.

  11. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Path replacement additional network feature

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Path replacement additional network feature

  12. Information technology - Telecommunications and information exchange between systems - Private Integrated Services Network - Inter-exchange signalling protocol - Call interception additional network feature

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private Integrated Services Network - Inter-exchange signalling protocol - Call interception additional network feature

  13. The entry into force of the Additional Protocol in the European Union: The new dimension of safeguards in Europe

    Energy Technology Data Exchange (ETDEWEB)

    Recio, M. [Deputy Direction General for Nuclear Energy, Direction General for Energy Policy and Mines Ministry of Industry, Tourism and Trade, Paseo de la Castellana, 160 Madrid 28046 (Spain)]. E-mail: MRecio@mityc.es; Prieto, N. [Asesoria Juridica, Direccion de Division Administracion, Enresa, c/Emilio Vargas, 7, Madrid 28043 (Spain)]. E-mail: nprs@enresa.es

    2006-07-01

    The Additional Protocol to the Safeguards Agreement with the International Atomic Energy Agency (IAEA) has entered into force on 30 April 2004. This completes the implementation in the EU of what undoubtedly represents the most ambitious project undertaken by the IAEA, designed to reinforce its current safeguards system, a project that the international community considers to be a key component strengthening the fight against one of the most serious threats for world security: nuclear proliferation. (author)

  14. Arthrocentesis with or without additional drugs in temporomandibular joint inflammatory-degenerative disease: comparison of six treatment protocols*.

    Science.gov (United States)

    Manfredini, D; Rancitelli, D; Ferronato, G; Guarda-Nardini, L

    2012-04-01

    The aim of the present pilot investigation was to compare the effectiveness of six treatment protocols providing temporomandibular joint (TMJ) arthrocentesis with or without additional drugs to manage symptoms in patients with inflammatory-degenerative TMJ disease. A consecutive series of 72 patients with TMJ osteoarthritis (axis group IIIb) with pain lasting from more than 6 months were randomly assigned to one of the groups receiving the following treatment protocols: single-session two-needle arthrocentesis (A), single-session two-needle arthrocentesis plus corticosteroid (B), single-session two-needle arthrocentesis plus low molecular weight hyaluronic acid (HA) (C), single-session two-needle arthrocentesis plus high molecular weight HA (D), 5 weekly two-needle arthrocenteses plus low molecular weight HA (E) and 5 weekly single-needle arthrocenteses plus low molecular weight HA (F). At the 3-month follow-up, improvement with respect to mean baseline values was recorded in all the five treatment groups completing the protocol. No significant differences emerged between groups in any outcome variable. The protocol providing five sessions of two-needle arthrocenteses plus low molecular weight HA allowed achieving the highest improvement in almost all the outcome variables. Findings suggested that no statistically significant differences existed between the treatment groups. The clinical significance of these findings needs to be tested with future studies on larger samples with longer follow-up periods.

  15. Impératifs et limites de la croissance

    Directory of Open Access Journals (Sweden)

    Rolf Steppacher

    2006-07-01

    Full Text Available La théorie de la croissance domine l’actualité. Pourtant, il devient chaque jour plus évident que la poursuite de ce programme mondial n’est pas indéfiniment réalisable, compte tenu des limites imposées par les écosystèmes. Plus surprenant encore, l’impératif de croissance est parvenu à se dissimuler sous le masque de la durabilité. Devenu « durable » ou « soutenable », le développement s’accommode plutôt bien du capitalisme, sans questionner pour autant le cœur du paradoxe contemporain : comment parler de durabilité sans remettre en cause en même temps le système économique ? Comment maintenir une croissance illimitée – elle-même alimentée par une industrie publicitaire créatrice de désirs illimités – sans remettre parallèlement en question l’utilisation que nous faisons des ressources non renouvelables ? Plus que jamais et à l’heure où le développement durable s’impose comme le nouveau messianisme technologique, il devient vital de s’interroger sur le fonctionnement nécessairement problématique des économies modernes et de leurs choix énergétiques. Aller au-delà du consensus politique actuel fondé sur la tyrannie de la croissance, ne pas succomber à l’incantation technocratique, penser l’action, l’innovation et les transformations économiques génératrices du bien-être, concevoir que toute société porte en elle un projet qui ne se réduit pas à une capacité gestionnaire, rechercher les sources de la richesse et les raisons de sa fin possible. Voilà quelques-unes des ambitions de Rolf Steppacher, économiste à l’institut universitaire d’études du développement (IUED à Genève et observateur critique de l’évolution du développement durable et de son pendant, la décroissance. Il nous livre ici quelques clés d’interprétation. Entretien réalisé par Olivier Walther.

  16. Carrying out"Administrative Ratification Law"%行政许可法:推进产业发展的法制化

    Institute of Scientific and Technical Information of China (English)

    夏竞辉

    2004-01-01

    It is said that "Administrative Ratification Law" is put into practice from 1st July this year. Then the State Council and MII both issue related schemes in order to promote the implementation of "Administration Ratification Law". The enforcement of the "Administrative Ratification Law" will have a great and deep influence on the transfer of the governmental functions, reform of administrative methods and advancement of legal administration. The comparative centralization of administrative ratification right and the unified handling of administrative ratification reflected in the law can be said a summary and extension of the latest years, successful experience and is also a legal confirmation of this kind of practice.

  17. Bath additives for the treatment of childhood eczema (BATHE): protocol for multicentre parallel group randomised trial

    Science.gov (United States)

    Santer, Miriam; Rumsby, Kate; Ridd, Matthew J; Francis, Nick A; Stuart, Beth; Chorozoglou, Maria; Wood, Wendy; Roberts, Amanda; Thomas, Kim S; Williams, Hywel C; Little, Paul

    2015-01-01

    Introduction Bath emollients are widely prescribed for childhood eczema, yet evidence of their benefits over direct application of emollients is lacking. Objectives To determine the clinical and cost-effectiveness of adding bath emollient to the standard management of eczema in children Methods and analysis Design: Pragmatic open 2-armed parallel group randomised controlled trial. Setting: General practitioner (GP) practices in England and Wales. Participants: Children aged over 12 months and less than 12 years with eczema, excluding inactive or very mild eczema (5 or less on Nottingham Eczema Severity Scale). Interventions: Children will be randomised to either bath emollients plus standard eczema care or standard eczema care only. Outcome measures: Primary outcome is long-term eczema severity, measured by the Patient-Oriented Eczema Measure (POEM) repeated weekly for 16 weeks. Secondary outcomes include: number of eczema exacerbations resulting in healthcare consultations over 1 year; eczema severity over 1 year; disease-specific and generic quality of life; medication use and healthcare resource use; cost-effectiveness. Aiming to detect a mean difference between groups of 2.0 (SD 7.0) in weekly POEM scores over 16 weeks (significance 0.05, power 0.9), allowing for 20% loss to follow-up, gives a total sample size of 423 children. We will use repeated measures analysis of covariance, or a mixed model, to analyse weekly POEM scores. We will control for possible confounders, including baseline eczema severity and child's age. Cost-effectiveness analysis will be carried out from a National Health Service (NHS) perspective. Ethics and dissemination This protocol was approved by Newcastle and North Tyneside 1 NRES committee 14/NE/0098. Follow-up will be completed in 2017. Findings will be disseminated to participants and carers, the public, dermatology and primary care journals, guideline developers and decision-makers. Trial registration number ISRCTN

  18. Woodrow Wilson and the U.S. Ratification of the Treaty of Versailles. Lesson Plan.

    Science.gov (United States)

    Pyne, John; Sesso, Gloria

    1995-01-01

    Presents a high school lesson plan on the struggle over ratification of the Treaty of Versailles and U.S. participation in the League of Nations. Includes a timeline of events, four primary source documents, and biographical portraits of two opposing senators. Provides student objectives and step-by-step instructional procedures. (CFR)

  19. Bath additives for the treatment of childhood eczema (BATHE): protocol for multicentre parallel group randomised trial.

    Science.gov (United States)

    Santer, Miriam; Rumsby, Kate; Ridd, Matthew J; Francis, Nick A; Stuart, Beth; Chorozoglou, Maria; Wood, Wendy; Roberts, Amanda; Thomas, Kim S; Williams, Hywel C; Little, Paul

    2015-11-01

    Bath emollients are widely prescribed for childhood eczema, yet evidence of their benefits over direct application of emollients is lacking. Objectives To determine the clinical and cost-effectiveness of adding bath emollient to the standard management of eczema in children Pragmatic open 2-armed parallel group randomised controlled trial. General practitioner (GP) practices in England and Wales. Children aged over 12 months and less than 12 years with eczema, excluding inactive or very mild eczema (5 or less on Nottingham Eczema Severity Scale). Children will be randomised to either bath emollients plus standard eczema care or standard eczema care only. Primary outcome is long-term eczema severity, measured by the Patient-Oriented Eczema Measure (POEM) repeated weekly for 16 weeks. Secondary outcomes include: number of eczema exacerbations resulting in healthcare consultations over 1 year; eczema severity over 1 year; disease-specific and generic quality of life; medication use and healthcare resource use; cost-effectiveness. Aiming to detect a mean difference between groups of 2.0 (SD 7.0) in weekly POEM scores over 16 weeks (significance 0.05, power 0.9), allowing for 20% loss to follow-up, gives a total sample size of 423 children. We will use repeated measures analysis of covariance, or a mixed model, to analyse weekly POEM scores. We will control for possible confounders, including baseline eczema severity and child's age. Cost-effectiveness analysis will be carried out from a National Health Service (NHS) perspective. This protocol was approved by Newcastle and North Tyneside 1 NRES committee 14/NE/0098. Follow-up will be completed in 2017. Findings will be disseminated to participants and carers, the public, dermatology and primary care journals, guideline developers and decision-makers. ISRCTN84102309. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  20. Improving a mother to child HIV transmission programme through health system redesign: quality improvement, protocol adjustment and resource addition.

    Directory of Open Access Journals (Sweden)

    Michele S Youngleson

    Full Text Available BACKGROUND: Health systems that deliver prevention of mother to child transmission (PMTCT services in low and middle income countries continue to underperform, resulting in thousands of unnecessary HIV infections of newborns each year. We used a combination of approaches to health systems strengthening to reduce transmission of HIV from mother to infant in a multi-facility public health system in South Africa. METHODOLOGY/PRINCIPAL FINDINGS: All primary care sites and specialized birthing centers in a resource constrained sub-district of Cape Metro District, South Africa, were enrolled in a quality improvement (QI programme. All pregnant women receiving antenatal, intrapartum and postnatal infant care in the sub-district between January 2006 and March 2009 were included in the intervention that had a prototype-innovation phase and a rapid spread phase. System changes were introduced to help frontline healthcare workers to identify and improve performance gaps at each step of the PMTCT pathway. Improvement was facilitated and spread through the use of a Breakthrough Series Collaborative that accelerated learning and the spread of successful changes. Protocol changes and additional resources were introduced by provincial and municipal government. The proportion of HIV-exposed infants testing positive declined from 7.6% to 5%. Key intermediate PMTCT processes improved (antenatal AZT increased from 74% to 86%, PMTCT clients on HAART at the time of labour increased from 10% to 25%, intrapartum AZT increased from 43% to 84%, and postnatal HIV testing from 79% to 95% compared to baseline. CONCLUSIONS/SIGNIFICANCE: System improvement methods, protocol changes and addition/reallocation of resources contributed to improved PMTCT processes and outcomes in a resource constrained setting. The intervention requires a clear design, leadership buy-in, building local capacity to use systems improvement methods, and a reliable data system. A systems improvement

  1. The Fiscal Pact and the Problem of its Ratification - Selected Aspects

    Directory of Open Access Journals (Sweden)

    Andrzej Borodo

    2013-12-01

    Full Text Available The treaty on Stability, Coordination and Governance in the Economic and Monetary Union dated 2 March 2012 (called the fiscal act is the law rela-ting to the economic and budgetary matters of the Member States of the European Union, mainly to the deficit and public debt. The treaty in focus encroaches on the budgetary powers of the Parliament and the government. On February 2012, the Parliament passed the act of law entitling the President of the Republic of Poland to ratify the treaty. The procedure for the ratification of the treaty appears to be questionable. A question arises whether the content of the treaty justifies the adoption of the law authorizing the ratification by ordinary or qualified majority (in accordance with Article 89, paragraph 1 of the Constitution, or paragraph 1 and 2 of Article 90 of the Constitution.

  2. L’impératif en français parlé

    Directory of Open Access Journals (Sweden)

    Nguyen Minh Chinh

    2016-01-01

    Full Text Available Dans la grammaire française, l’impératif est considéré comme le moyen typique pour exprimer l’injonction. Il peut être utilisé pour tout but injonctif, du plus léger (prière, sollicitation au plus péremptoire (ordre, commandement. Cependant, l’impératif n’exprime pas toujours la valeur injonctive proprement dite, les locuteurs peuvent l’utiliser pour d’autres buts tels que l’expression de la condition ou de l’interrogation, etc. Partant de l’idée qu’à l’oral chaque genre a son vocabulaire de construction, ses formes d’organisation, ses contenus attendus, ses modes productifs, la caractérisation des genres est un préalable à la constitution de corpus utilisables pour des tâches de l’étude. Je présenterai dans cet article l’analyse des caractéristiques pragmatiques des énoncés impératifs et de leur répartition en m’appuyant sur l’analyse des occurrences retirées de 5 situations différentes.

  3. Global warming and environmental production efficiency ranking of the Kyoto Protocol nations.

    Science.gov (United States)

    Feroz, Ehsan H; Raab, Raymond L; Ulleberg, Gerald T; Alsharif, Kamal

    2009-02-01

    This paper analyzes the United Nations Organization's Kyoto Protocol nations to address two questions. First, what are the environmental production efficiency rankings of these nations? Second, is there a relationship between a nation's ratification status and its environmental production efficiency ranking? Our findings suggest that the nations that have ratified the Kyoto Protocol are more likely to be environmentally production efficient as compared to the nations that have not ratified the Protocol.

  4. Remote Sensing and the Kyoto Protocol: A Workshop Summary

    Science.gov (United States)

    Rosenqvist, Ake; Imhoff, Marc; Milne, Anthony; Dobson, Craig

    2000-01-01

    The Kyoto Protocol to the United Nations Framework Convention on Climate Change contains quantified, legally binding commitments to limit or reduce greenhouse gas emissions to 1990 levels and allows carbon emissions to be balanced by carbon sinks represented by vegetation. The issue of using vegetation cover as an emission offset raises a debate about the adequacy of current remote sensing systems and data archives to both assess carbon stocks/sinks at 1990 levels, and monitor the current and future global status of those stocks. These concerns and the potential ratification of the Protocol among participating countries is stimulating policy debates and underscoring a need for the exchange of information between the international legal community and the remote sensing community. On October 20-22 1999, two working groups of the International Society for Photogrammetry and Remote Sensing (ISPRS) joined with the University of Michigan (Michigan, USA) to convene discussions on how remote sensing technology could contribute to the information requirements raised by implementation of, and compliance with, the Kyoto Protocol. The meeting originated as a joint effort between the Global Monitoring Working Group and the Radar Applications Working Group in Commission VII of the ISPRS, co-sponsored by the University of Michigan. Tile meeting was attended by representatives from national government agencies and international organizations and academic institutions. Some of the key themes addressed were: (1) legal aspects of transnational remote sensing in the context of the Kyoto Protocol; (2) a review of the current and future and remote sensing technologies that could be applied to the Kyoto Protocol; (3) identification of areas where additional research is needed in order to advance and align remote sensing technology with the requirements and expectations of the Protocol; and 94) the bureaucratic and research management approaches needed to align the remote sensing

  5. The ratification status of ILO conventions related to occupational safety and health and its relationship with reported occupational fatality rates.

    Science.gov (United States)

    Wilson, Donald J; Takahashi, Ken; Sakuragi, Sonoko; Yoshino, Masako; Hoshuyama, Tsutomu; Imai, Teppei; Takala, Jukka

    2007-01-01

    The aim of this study was to assess the relationship between the ratification status of occupational safety and health (OSH)-related ILO conventions and reported occupational fatality rates of ILO member countries, while controlling for possible confounding factors. ILO member states were divided into 4 levels of income status, based on the gross national income per capita. Seventeen conventions designated as OSH-related were examined. Reported country occupational fatality rates were compared according to the ratification status of these 17 conventions and multiple regression analyses were conducted to assess the relationship between the fatality rates, ratification status, income level and length of ILO membership. Fatality rates were inversely and significantly related to income levels. In general, non-ratifying countries had higher work-related fatality rates than ratifying countries. A statistical model for identifying predictors of fatal injury rates showed that a larger number of conventions ratified was significantly associated with lower fatality rates. The fact that non-ratifying countries generally have higher fatality rates than ratifying ones supports the notion that all countries should promote ratification of ILO conventions aimed at improving OSH conditions.

  6. After Indonesia’s Ratification: The ASEAN Agreement on Transboundary Haze Pollution and Its Effectiveness As a Regional Environmental Governance Tool

    OpenAIRE

    Daniel Heilmann

    2015-01-01

    On 20 January 2015 Indonesia deposited its instrument of ratification for the ASEAN Agreement on Transboundary Haze Pollution with the ASEAN Secretariat, becoming the last ASEAN member state to join the treaty. Haze pollution poses a serious health threat to the people of Indonesia, Singapore and Malaysia, and for decades haze pollution has been a highly contentious issue among ASEAN member states. This article argues that Indonesia's ratification will not be an immediate game changer. The me...

  7. An efficient and mild protocol for the synthesis of unsymmetrical ureas in the absence of catalyst and additives

    Institute of Scientific and Technical Information of China (English)

    Rahman Hosseinzadeh; Yaghoub Sarrafi; Nora Aghili

    2010-01-01

    A new practical method for the synthesis of unsymmetrical ureas was achieved by reaction of phenylurea with primary and secondary amines under neutral and mild condition in very good yields. The reaction took place in refluxing dioxane and does not require any catalyst or additives.

  8. Addition of novobiocin in pre-enrichment step can improve Salmonella culture protocol of modified semisolid Rappaport-Vassiliadis

    DEFF Research Database (Denmark)

    Jensen, Annette Nygaard; Sørensen, Gitte; Baggesen, Dorte Lau

    2003-01-01

    The aim was to investigate the effect of addition of Novobiocin to the non-selective buffered peptone water (BPW) for pre-enrichment of Salmonella in connection with plating on modified semisolid Rappaport-Vassiliadis (MSRV). In a semi-quantitative study, the level of Salmonella following pre-enr...

  9. Ratification vote on taxonomic proposals to the International Committee on Taxonomy of Viruses (2016).

    Science.gov (United States)

    Adams, Michael J; Lefkowitz, Elliot J; King, Andrew M Q; Harrach, Balázs; Harrison, Robert L; Knowles, Nick J; Kropinski, Andrew M; Krupovic, Mart; Kuhn, Jens H; Mushegian, Arcady R; Nibert, Max; Sabanadzovic, Sead; Sanfaçon, Hélène; Siddell, Stuart G; Simmonds, Peter; Varsani, Arvind; Zerbini, Francisco Murilo; Gorbalenya, Alexander E; Davison, Andrew J

    2016-10-01

    This article lists the changes to virus taxonomy approved and ratified by the International Committee on Taxonomy of Viruses (ICTV) in April 2016.Changes to virus taxonomy (the Universal Scheme of Virus Classification of the International Committee on Taxonomy of Viruses [ICTV]) now take place annually and are the result of a multi-stage process. In accordance with the ICTV Statutes ( http://www.ictvonline.org/statutes.asp ), proposals submitted to the ICTV Executive Committee (EC) undergo a review process that involves input from the ICTV Study Groups (SGs) and Subcommittees (SCs), other interested virologists, and the EC. After final approval by the EC, proposals are then presented for ratification to the full ICTV membership by publication on an ICTV web site ( http://www.ictvonline.org/ ) followed by an electronic vote. The latest set of proposals approved by the EC was made available on the ICTV website by January 2016 ( https://talk.ictvonline.org/files/proposals/ ). A list of these proposals was then emailed on 28 March 2016 to the 148 members of ICTV, namely the EC Members, Life Members, ICTV Subcommittee Members (including the SG chairs) and ICTV National Representatives. Members were then requested to vote on whether to ratify the taxonomic proposals (voting closed on 29 April 2016).

  10. REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS, INFCIRC/540 (Corrected) VOLUME II/III IAEA COMMITTEE 24, Major Issues Underlying the Model Additional Protocol (1996-1997).

    Energy Technology Data Exchange (ETDEWEB)

    Rosenthal, M.D.; Saum-Manning, L.; Houck, F.

    2010-01-01

    Volume I of this Review traces the origins of the Model Additional Protocol. It covers the period from 1991, when events in Iraq triggered an intensive review of the safeguards system, until 1996, when the IAEA Board of Governors established Committee 24 to negotiate a new protocol to safeguards agreement. The period from 1991-1996 set the stage for this negotiation and shaped its outcome in important ways. During this 5-year period, many proposals for strengthening safeguards were suggested and reviewed. Some proposals were dropped, for example, the suggestion by the IAEA Secretariat to verify certain imports, and others were refined. A rough consensus was established about the directions in which the international community wanted to go, and this was reflected in the draft of an additional protocol that was submitted to the IAEA Board of Governors on May 6, 1996 in document GOV/2863, Strengthening the Effectiveness and Improving the Efficiency of the Safeguards System - Proposals For Implementation Under Complementary Legal Authority, A Report by the Director General. This document ended with a recommendation that, 'the Board, through an appropriate mechanism, finalize the required legal instrument taking as a basis the draft protocol proposed by the Secretariat and the explanation of the measures contained in this document.'

  11. Self reported awareness of child maltreatment among school professionals in Saudi Arabia: impact of CRC ratification.

    Science.gov (United States)

    AlBuhairan, Fadia S; Inam, Sarah S; AlEissa, Majid A; Noor, Ismail K; Almuneef, Maha A

    2011-12-01

    The Convention on the Rights of the Child (CRC) was ratified by Saudi Arabia 15 years ago; yet addressing the issue of child maltreatment only began in more recent years. School professionals play a significant role in children's lives, as they spend a great deal of time with them and are hence essential to protecting and identifying those in danger or at risk. The objective of this study is to identify school professional's awareness of child maltreatment and the existing national policies and procedures to examine the extent of efforts made in Saudi Arabia and to activate the roles of schools and school professionals in protecting children from violence and implementation of Article 19 of the CRC. This was a cross-sectional study, where school professionals from randomly selected schools throughout the country were invited to participate in a self-administered questionnaire. A total of 3,777 school professionals participated in the study. Fifty-five percent of professionals had at least 10 years of work experience. A low-level of awareness of child maltreatment was found in about 1/3 of school professionals. Only 1.9% of school professionals had ever attended any sort of specific training on child maltreatment, though 69.3% of those who had not, were willing to attend future training. With regards to awareness of CRC Article 19 or policies and procedures addressing child maltreatment, only 22% reported being aware of it. The majority of school professionals in Saudi Arabia have a low-intermediate level of awareness of child maltreatment, ratification of CRC, and related national policies and procedures, yet most are willing to attend training programs on this subject matter. Efforts need to be made in the country to fill this gap. Copyright © 2011 Elsevier Ltd. All rights reserved.

  12. Bill project authorizing the ratification of the statutes of the International Renewable Energy Agency (IRENA); Projet de Loi autorisant la ratification des statuts de l'Agence internationale pour les energies renouvelables (IRENA)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    After a presentation text describing the content of each of the 20 articles of the statutes of the International Renewable Energy Agency (IRENA), this document contains the full text of these statutes. A third text is the bill project authorizing the ratification of these statutes, and described the economic, financial, social, environmental, administrative or juridical consequences of the implementation of the agreement or convention associated with the creation of the agency. The text also recalls the negotiation process, and indicates the place given to the French language

  13. U.S. ratification of the CRC and reducing child poverty: can we get there from here?

    Science.gov (United States)

    Aber, J Lawrence; Hammond, Andrew S; Thompson, Scott M

    2010-01-01

    If the United States finally ratifies the United Nations Convention of the Rights of the Child (CRC), will it improve the country's to effectively combat child poverty and thereby improve child well-being? This article addresses this and related questions in two ways. First, the authors examine how ratification of the CRC has influenced the efforts of other wealthy Anglophone countries to reduce child poverty. Second, they draw on lessons learned from these other countries' efforts to generate predictions about America's postratification future. The authors conclude that, while the CRC is a compelling, practical tool, a communications strategy and business plan are necessary complements to achieve desired results.

  14. Carbon emissions. The economic benefits of the Kyoto Protocol.

    Science.gov (United States)

    De Leo, G A; Rizzi, L; Caizzi, A; Gatto, M

    2001-10-04

    The third Conference of the Parties in Kyoto set the target of reducing greenhouse-gas emissions by an average of 5.3% with respect to 1990 values by 2008-2012. One of the main objections to the protocol's ratification is that compliance would pose an unbearable economic burden on the countries involved. But we show here that this is not the case if costs apart from the direct costs of energy production are also considered. Costs are also incurred in rectifying damage to human health, material goods, agriculture and the environment related to greenhouse-gas emissions.

  15. Nouvelle méthode d'évaluation des cycles régénératifs

    OpenAIRE

    2013-01-01

    Publié aux Editions Mersenne Catégorie: Sciences et techniques Energies ScienceLib :Volume5 N°131105ISSN2111-4706; Les turbines à vapeur basés sur les cycles de Rankine et de Hirn comportant des soutirages régénératifs sont utilisés dans l'industrie depuis le début du 20 ème sciècle. C'est partucilièrement le cas dans les installations de production d'électricité.Tout le monde connaît la célèbre relation de Carnot qui dit que le meilleur rendement théorique d'un cycle obéit à l'hypothèse des ...

  16. After Indonesia’s Ratification: The ASEAN Agreement on Transboundary Haze Pollution and Its Effectiveness As a Regional Environmental Governance Tool

    Directory of Open Access Journals (Sweden)

    Daniel Heilmann

    2015-01-01

    Full Text Available On 20 January 2015 Indonesia deposited its instrument of ratification for the ASEAN Agreement on Transboundary Haze Pollution with the ASEAN Secretariat, becoming the last ASEAN member state to join the treaty. Haze pollution poses a serious health threat to the people of Indonesia, Singapore and Malaysia, and for decades haze pollution has been a highly contentious issue among ASEAN member states. This article argues that Indonesia’s ratification will not be an immediate game changer. The mechanisms of the agreement are too weak to contribute much to a reduction of haze pollution in the region. The agreement is designed according to the ASEAN way: a non-binding approach that is based on the principles of state sovereignty and non-intervention. This makes it unlikely that the agreement itself will bring about change, even now that all ASEAN member states have ratified it.

  17. Optimisation thermique de moules d'injection construits par des processus génératifs

    Science.gov (United States)

    Boillat, E.; Glardon, R.; Paraschivescu, D.

    2002-12-01

    Une des potentialités les plus remarquables des procédés de production génératifs, comme le frittage sélectif par laser, est leur capacité à fabriquer des moules pour l'injection plastique équipés directement de canaux de refroidissement conformes, parfaitement adaptés aux empreintes Pour que l'industrie de l'injection puisse tirer pleinement parti de cette nouvelle opportunité, il est nécessaire de mettre à la disposition des moulistes des logiciels de simulation capables d'évaluer les gains de productivité et de qualité réalisables avec des systèmes de refroidissement mieux adaptés. Ces logiciels devraient aussi être capables, le cas échéant, de concevoir le système de refroidissement optimal dans des situations où l'empreinte d'injection est complexe. Devant le manque d'outils disponibles dans ce domaine, le but de cet article est de proposer un modèle simple de moules d'injection. Ce modèle permet de comparer différentes stratégies de refroidissement et peut être couplé avec un algorithme d'optimisation.

  18. A simple protocol for the michael addition of indoles with electron deficient olefins catalysed by TBAHS in aqueous media and their broad spectrum antibacterial activity

    Indian Academy of Sciences (India)

    M Damodiran; R Senthil Kumar; P M Sivakumar; Mukesh Doble; Paramasivan T Perumal

    2009-01-01

    Tetrabutylammonium hydrogen sulfate catalysed addition of indoles to electron deficient olefins in water generated the corresponding Michael adducts in good to excellent yield. The Michael addition of indole occurred regioselectively at position 3 and the -alkylated products have not been observed. The synthesized compounds were tested for their antibacterial activity against four microorganisms namely, E. coli NCIM 2931, S. aureus NCIM 5021, P. vulgaris NCIM 2813, P. aeruginosa NCIM 5029 by micro dilution method. These compounds showed MIC (Minimum Inhibitory Concentration) values in the range of 0.16-2.67 M.

  19. Addition of Propranolol in Resistant Arterial hypertension Treatment (APROPRIATE study): study protocol for a randomized double-blind placebo-controlled trial.

    Science.gov (United States)

    Constantine, G R; Ranasinghe, P; Weeratunga, P; Weeraratne, C; Galappatthy, P; Rajapakse, S; Senarath, U; Katulanda, P

    2017-03-14

    hypertension. This study will provide the necessary groundwork for future large-scale, multicentered clinical trials. The result, positive or negative, should provide a step change in the evidence guiding current and future policies regarding treatment of resistant hypertension. Sri Lanka Clinical Trials Registry, identifier: SLCTR/2016/002 . Registered on 27 January 2016; Study protocol version 2.1.

  20. The ADDITION-Cambridge trial protocol: a cluster – randomised controlled trial of screening for type 2 diabetes and intensive treatment for screen-detected patients

    Directory of Open Access Journals (Sweden)

    Kinmonth Ann

    2009-05-01

    Full Text Available Abstract Background The increasing prevalence of type 2 diabetes poses a major public health challenge. Population-based screening and early treatment for type 2 diabetes could reduce this growing burden. However, the benefits of such a strategy remain uncertain. Methods and design The ADDITION-Cambridge study aims to evaluate the effectiveness and cost-effectiveness of (i a stepwise screening strategy for type 2 diabetes; and (ii intensive multifactorial treatment for people with screen-detected diabetes in primary care. 63 practices in the East Anglia region participated. Three undertook the pilot study, 33 were allocated to three groups: no screening (control, screening followed by intensive treatment (IT and screening plus routine care (RC in an unbalanced (1:3:3 randomisation. The remaining 27 practices were randomly allocated to IT and RC. A risk score incorporating routine practice data was used to identify people aged 40–69 years at high-risk of undiagnosed diabetes. In the screening practices, high-risk individuals were invited to take part in a stepwise screening programme. In the IT group, diabetes treatment is optimised through guidelines, target-led multifactorial treatment, audit, feedback, and academic detailing for practice teams, alongside provision of educational materials for newly diagnosed participants. Primary endpoints are modelled cardiovascular risk at one year, and cardiovascular mortality and morbidity at five years after diagnosis of diabetes. Secondary endpoints include all-cause mortality, development of renal and visual impairment, peripheral neuropathy, health service costs, self-reported quality of life, functional status and health utility. Impact of the screening programme at the population level is also assessed through measures of mortality, cardiovascular morbidity, health status and health service use among high-risk individuals. Discussion ADDITION-Cambridge is conducted in a defined high-risk group

  1. The ADDITION-Cambridge trial protocol: a cluster – randomised controlled trial of screening for type 2 diabetes and intensive treatment for screen-detected patients

    Science.gov (United States)

    Echouffo-Tcheugui, Justin B; Simmons, Rebecca K; Williams, Kate M; Barling, Roslyn S; Prevost, A Toby; Kinmonth, Ann Louise; Wareham, Nicholas J; Griffin, Simon J

    2009-01-01

    Background The increasing prevalence of type 2 diabetes poses a major public health challenge. Population-based screening and early treatment for type 2 diabetes could reduce this growing burden. However, the benefits of such a strategy remain uncertain. Methods and design The ADDITION-Cambridge study aims to evaluate the effectiveness and cost-effectiveness of (i) a stepwise screening strategy for type 2 diabetes; and (ii) intensive multifactorial treatment for people with screen-detected diabetes in primary care. 63 practices in the East Anglia region participated. Three undertook the pilot study, 33 were allocated to three groups: no screening (control), screening followed by intensive treatment (IT) and screening plus routine care (RC) in an unbalanced (1:3:3) randomisation. The remaining 27 practices were randomly allocated to IT and RC. A risk score incorporating routine practice data was used to identify people aged 40–69 years at high-risk of undiagnosed diabetes. In the screening practices, high-risk individuals were invited to take part in a stepwise screening programme. In the IT group, diabetes treatment is optimised through guidelines, target-led multifactorial treatment, audit, feedback, and academic detailing for practice teams, alongside provision of educational materials for newly diagnosed participants. Primary endpoints are modelled cardiovascular risk at one year, and cardiovascular mortality and morbidity at five years after diagnosis of diabetes. Secondary endpoints include all-cause mortality, development of renal and visual impairment, peripheral neuropathy, health service costs, self-reported quality of life, functional status and health utility. Impact of the screening programme at the population level is also assessed through measures of mortality, cardiovascular morbidity, health status and health service use among high-risk individuals. Discussion ADDITION-Cambridge is conducted in a defined high-risk group accessible through primary

  2. The roles of parties with different commitments under the Kyoto Protocol and implications for NAFTA

    Energy Technology Data Exchange (ETDEWEB)

    Fauteux, P. [Environment Canada, Ottawa, ON (Canada). Climate Change Bureau

    2002-07-01

    A government perspective on climate change negotiations was presented with particular reference to Canada's cleaner energy exports, the Kyoto mechanism and the second commitment period. The author emphasized the importance of cleaner energy exports for Canada, although progress is likely to be slow in this area because of the opposition among other Parties. Whatever approach the United States takes to trading, it must be compatible with the Kyoto Protocol. Eligibility for trading in North America was discussed with reference to what effect Canada's ratification of the Protocol would have on energy exports. It was noted that if Canada ratifies, it could be both a buyer and a seller, whereas the United States could only buy and Mexico could only sell. The author also suggested that developing countries or major emitters should take on commitments in order to provide greater compatibility in the North American context, especially if the United States rejoined the Kyoto Protocol.

  3. Addition of telephone coaching to a physiotherapist-delivered physical activity program in people with knee osteoarthritis: A randomised controlled trial protocol

    Directory of Open Access Journals (Sweden)

    Bennell Kim L

    2012-12-01

    data. Follow-up assessments will also occur at 12 and 18 months. Discussion The findings will help determine whether the addition of telephone coaching sessions can improve sustainability of outcomes from a physiotherapist-delivered physical activity intervention in people with knee OA. Trial Registration Australian New Zealand Clinical Trials Registry reference: ACTRN12612000308897

  4. Optimising corticosteroid injection for lateral epicondylalgia with the addition of physiotherapy: A protocol for a randomised control trial with placebo comparison

    Directory of Open Access Journals (Sweden)

    Brooks Peter

    2009-06-01

    Full Text Available Abstract Background Corticosteroid injection and physiotherapy are two commonly prescribed interventions for management of lateral epicondylalgia. Corticosteroid injections are the most clinically efficacious in the short term but are associated with high recurrence rates and delayed recovery, while physiotherapy is similar to injections at 6 weeks but with significantly lower recurrence rates. Whilst practitioners frequently recommend combining physiotherapy and injection to overcome harmful effects and improve outcomes, study of the benefits of this combination of treatments is lacking. Clinicians are also faced with the paradox that the powerful anti-inflammatory corticosteroid injections work well, albeit in the short term, for a non-inflammatory condition like lateral epicondylalgia. Surprisingly, these injections have not been rigorously tested against placebo injections. This study primarily addresses both of these issues. Methods A randomised placebo-controlled clinical trial with a 2 × 2 factorial design will evaluate the clinical efficacy, cost-effectiveness and recurrence rates of adding physiotherapy to an injection. In addition, the clinical efficacy and adverse effects of corticosteroid injection beyond that of a placebo saline injection will be studied. 132 participants with a diagnosis of lateral epicondylalgia will be randomly assigned by concealed allocation to one of four treatment groups – corticosteroid injection, saline injection, corticosteroid injection with physiotherapy or saline injection with physiotherapy. Physiotherapy will comprise 8 sessions of elbow manipulation and exercise over an 8 week period. Blinded follow-up assessments will be conducted at baseline, 4, 8, 12, 26 and 52 weeks after randomisation. The primary outcome will be a participant rating of global improvement, from which measures of success and recurrence will be derived. Analyses will be conducted on an intention-to-treat basis using linear

  5. [International regulation of ethics committees on biomedical research as protection mechanisms for people: analysis of the Additional Protocol to the Convention on Human Rights and Biomedicine, concerning Biomedical Research of the Council of Europe].

    Science.gov (United States)

    de Lecuona, Itziar

    2013-01-01

    The article explores and analyses the content of the Council of Europe's Additional Protocol to the Convention on Human Rights and Biomedicine concerning Biomedical Research regarding the standard legal instrument in biomedical research, issued by an international organization with leadership in bioethics. This implies ethics committees are mechanisms of protection of humans in biomedical research and not mere bureaucratic agencies and that a sound inescapable international regulatory framework exists for States to regulate biomedical research. The methodology used focuses on the analysis of the background, the context in which it is made and the nature and scope of the Protocol. It also identifies and analyses the characteristics and functions of ethics committees in biomedical research and, in particular, the information that should be provided to this bodies to develop their functions previously, during and at the end of research projects. This analysis will provide guidelines, suggestions and conclusions for the awareness and training of members of these committees in order to influence the daily practice. This paper may also be of interest to legal practitioners who work in different areas of biomedical research. From this practical perspective, the article examines the legal treatment of the Protocol to meet new challenges and classic issues in research: the treatment of human biological samples, the use of placebos, avoiding double standards, human vulnerability, undue influence and conflicts of interest, among others. Also, from a critical view, this work links the legal responses to develop work procedures that are required for an effective performance of the functions assigned of ethics committees in biomedical research. An existing international legal response that lacks doctrinal standards and provides little support should, however, serve as a guide and standard to develop actions that allow ethics committees -as key bodies for States- to advance in

  6. Report on the behalf of the Foreign Affairs, Defence and Armed Forces Commission on: the bill project (accelerated procedure) authorizing the ratification of the joint procurement agreement for a designation by auction of common bid platforms, and the bill project (accelerated procedure) authorizing the ratification of the joint procurement agreement for a designation by auction of an auction monitor. Nr 171; Rapport fait au nom de la commission des affaires etrangeres, de la defense et des forces armees sur le projet de loi (procedure acceleree) autorisant la ratification de l'accord de passation conjointe de marche en vue de la designation par adjudication de plates-formes d'encheres communes et sur le projet de loi (procedure acceleree) autorisant la ratification de l'accord de passation conjointe de marche en vue de la designation par adjudication d'une instance de surveillance des encheres. No. 171

    Energy Technology Data Exchange (ETDEWEB)

    Boulaud, Didier

    2011-12-07

    This document first presents the currently operating greenhouse gas emission quota trading scheme and its evolution according to which quotas will be put up for auction. Then, it more precisely describes different aspects of this arrangement: general economy of the auction system, common auction platforms, auction monitor, and market procedures. Consequences on the French law are presented. The ratification procedure is discussed

  7. Testing for identification of locking, maintenance and ratification of large expansion joints; Teste para identificacao de travamento, manutencao e aceitacao de junta de expansao de grande porte

    Energy Technology Data Exchange (ETDEWEB)

    Veiga, Jordana Luiza Barbosa da Costa; Lemos, Ricardo Jose Fernandes; Medeiros, Jorivaldo [Petroleo Brasileiro S.A. (PETROBRAS), Rio de Janeiro, RJ (Brazil)

    2012-07-01

    Piping systems connected to large machines must have high reliability. In particular systems that have traditionally turbo expander large diameter and operate at high temperatures (up to 760 deg C) and low pressure (less than 4 kgf/cm2). This paper focuses on verification, maintenance and ratification of the correct functioning of expansion joints ('JE') of a piping system (72 inches external diameter), connected to a turbo expander system. After verification of 'JE's' locking, it was necessary to intervene in the system to restore the correct operation, for reasons of delivery, only maintenance was carried out in the expansion joints connected to this system. These expansion joints were tested before and after the maintenance to ensure proper operation after installation and verify that the locking system had its origin in 'JE'. This paper presents the degradation observed in JE, maintenance performed and the results of the tests. (author)

  8. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  9. Evolution du parcours génératif : vers un remaniement des structures spatiales dans La Route d'Altamont de Gabrielle Roy

    Directory of Open Access Journals (Sweden)

    Navarette Pierre-Antoine

    2014-07-01

    Full Text Available A partir d’une sémiotique de l’espace appliquée à l’œuvre de G. Roy, La Route d’Altamont, publiée en 1966, nous nous proposons à travers cet article de mesurer l’évolution du modèle d’analyse du parcours génératif au sein de la théorie générale de la signification, tel qu’il a été présenté par A. J. Greimas et J. Courtès dans Le Dictionnaire raisonné de la théorie du langage, puis par J. Fontanille dans Sémiotique du discours et Sémiotique et littérature notamment, afin de pouvoir évaluer la pertinence de ses mécanismes et la puissance de son appareil théorique. Sur le plan épistémologique, nous nous intéresserons donc aux transformations qui se sont opérées lors du passage d’une version du parcours génératif à l’autre. Pour mener à bien cette étude, et pour pouvoir mesurer les implications d’un tel remaniement théorique, nous nous baserons donc sur des fragments textuels mettant en exergue précisément ce qu’autorise en matière de production de sens le nouveau modèle fontanillien : nous étudierons ainsi La Route d’Altamont de G. Roy afin de dégager des structures spatiales relevant d’un ordre sémiotique différent de celui que propose la théorie classique lorsque celle-ci, par exemple, situe exclusivement au niveau fondamental les valeurs abstraites et axiologiques.

  10. (dtltt) protocol

    African Journals Online (AJOL)

    2013-03-01

    Mar 1, 2013 ... Keywords: multi-access, multiservice, network, synchronous, asynchronous, traffic, timed-token. 1. ... 12, 13 ] SAFENET [14], Manufacturing Automation. Protocol (MAP) ...... ken circulation on mobile Ad Hoc Networks. 21th In-.

  11. The mesh network protocol evaluation and development

    OpenAIRE

    Pei Ping; PETRENKO Y.N.

    2015-01-01

    In this paper, we introduce a Mesh network protocol evaluation and development. It has a special protocol. We could easily to understand that how different protocols are used in mesh network. In addition to our comprehension, Multi – hop routing protocol could provide robustness and load balancing to communication in wireless mesh networks.

  12. GENERIC VERIFICATION PROTOCOL FOR DETERMINATION OF EMISSIONS REDUCTIONS OBTAINED BY USE OF ALTERNATIVE OR REFORMULATED LIQUID FUELS, FUEL ADDITIVES, FUEL EMULSIONS AND LUBRICANTS FOR HIGHWAY AND NONROAD USE DISEL ENGINES AND LIGHT DUTY GASOLINE ENGINES AND VEHICLES

    Science.gov (United States)

    This report sets standards by which the emissions reduction provided by fuel and lubricant technologies can be tested and be tested in a comparable way. It is a generic protocol under the Environmental Technology Verification program.

  13. Law project for the application of additional protocol to the agreement between France and the atomic energy european community and the international atomic energy agency relative to the application of guaranties in France, signed at Vienna the 22 september 1998; Projet de loi portant application du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France, signe a Vienne le 22 septembre 1998

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-04-15

    This law project aims to allow the application of the additional protocol. This protocol plans the transmission, by France, to IAEA of defined information. These information concern materials and nuclear activities non declared by States not owning the nuclear weapon. (A.L.B.)

  14. Report on the behalf of the Foreign Affairs Commission on the bill project n 3080 authorizing the ratification of the statutes of the International Renewable Energy Agency (IRENA); Rapport fait au nom de la Commission des Affaires Etrangeres sur le projet de loi n. 3080, autorisant la ratification des statuts de l'Agence Internationale pour les Energies Renouvelables (IRENA)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    This document first recalls that the creation of the International Renewable Energy Agency (IRENA) is due to a German initiative. It recalls the rather quick negotiations (2007-2009) which led to the creation of the Agency, outlines that its statutes were inspired by those of other organizations coming under the United Nations. It comments the content of the article which defines the agency's missions. Then it discusses some questions which have been shelved: the absence of China and Russia, the risk of non ratification by the United States, the language issue. In a second part, the document reports the discussions during the bill examination by the Commission. An appendix indicates the countries which have signed or ratified the IRENA statutes

  15. Quassia "biopiracy" case and the Nagoya Protocol: A researcher's perspective.

    Science.gov (United States)

    Bourdy, Geneviève; Aubertin, Catherine; Jullian, Valérie; Deharo, Eric

    2017-07-12

    Biopiracy accusations are common in the world of biodiversity research. At the end of 2015, a French NGO accused researchers from the Institut de Recherche pour le Développement (IRD) of biopiracy. These researchers had applied for a patent for a natural bioactive molecule against malaria and cancer, the Simalikalactone E, isolated from Quassia amara L. (Simaroubaceae) leaves. This biopiracy allegation triggered a huge wave of attacks from the media and social networks, and vehement recrimination from political officials in French Guiana against researchers who have been accused of ethical misconduct, by stealing the traditional knowledge of indigenous people. These accusations were made in the contentious context of the ratification of the Nagoya Protocol in the frame of implementing the French law on biodiversity, nature and landscapes. So, in an atmosphere of heightened emotions it is crucial to understand the issues behind these accusations. We describe herein the genesis of our discovery, present the detractors' arguments, and discuss the consequences of such biopiracy denunciations for scientific research. We also address our concerns about the gap between rhetoric and reality and the real impact of the Nagoya Protocol on biodiversity conservation. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  16. CJEU - Judgment of 23.9.2013 (grand chamber) - Case c-221/11 leyla Demirkan v Bundesrepublik Deutschland - Association agreement with Turkey - Article 41 of the additional protocol -freedom to provide services - Visa requirement: Turkey association agreement does not cover passive reception of services and Turkish nationals wishing to enter the Schengen area cannot benefit from this freedom

    NARCIS (Netherlands)

    Matera, C.

    2014-01-01

    With the Demirkan case the CJEU was called upon to clarify the scope of Article 41(1) of the Additional protocol to the EU - Turkey Association Agreement and affirm whether the Soysal and Savatli ruling was also applicable to the passive reception of services and, more specifically, to tourists. The

  17. CJEU - Judgment of 23.9.2013 (grand chamber) - Case c-221/11 leyla Demirkan v Bundesrepublik Deutschland - Association agreement with Turkey - Article 41 of the additional protocol -freedom to provide services - Visa requirement: Turkey association agreement does not cover passive reception of services and Turkish nationals wishing to enter the Schengen area cannot benefit from this freedom

    NARCIS (Netherlands)

    Matera, Claudio

    2014-01-01

    With the Demirkan case the CJEU was called upon to clarify the scope of Article 41(1) of the Additional protocol to the EU - Turkey Association Agreement and affirm whether the Soysal and Savatli ruling was also applicable to the passive reception of services and, more specifically, to tourists. The

  18. Taxation and Illicit Trade Protocol, “Lethal weapons” against Tobacco Industry

    Directory of Open Access Journals (Sweden)

    Stephen Lequet

    2016-03-01

    Full Text Available Tobacco taxation is the most effective way to reduce smoking prevalence. Without tax increase tobacco policy, the other measures of tobacco control are weakened. While the EU Directive of 2011 on tobacco taxation is being evaluated, it is important to recall issues of this tobacco control tool. Furthermore, it is urgent to dismantle some against-truths dealt out by tobacco industry, like the supposedly postponing consumption on an illegal market which would then expanding, negating the reduction of tobacco consumption. On this important topic, the WHO Illicit Trade Protocol introduces comprehensive set of measures ranging from control supply chain, strengthening penalties and technical and legal cooperation. The EU ratification is essential.

  19. Histology protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Tim D. Hewitson & Ian A. Darby (Eds Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 611, 2010 Pages: 230; € 83.15 ISBN: 978-1-60327-344-2 Impressive as it can sounds in the era that Biology see a clear dominance of reductionism with the idea that complexity can be disentagled more and more thanks to the use of molecular tools, the reader will remain fascinated by this slim and agile volume devoted to bring together what apparently are two separeted words: molecular biology and histology. Simply remembering to the youngest scientists.....

  20. Brazil and the strengthening of safeguard system of the International Atomic Energy Agency: from the four-part agreement to the additional protocol; O Brasil e o fortalecimento do sistema de salvaguardas da Agencia Internacional de Energia Atomica: do acordo quadripartite ao protocolo adicional

    Energy Technology Data Exchange (ETDEWEB)

    Moura, Carmen Lidia Richter Ribeiro

    2001-07-01

    The main objective of this paper is to analyse the evolution of IAEA verification system, that constitutes one of the main fundaments of the Non-proliferation nuclear weapons regimen, and to point out elements that contribute to inform the Brazilian position related to the Model Protocol additional to agreements for safeguard application: instrument that comprehend the most recent multilateral efforts of the nuclear verification

  1. Methow and Columbia Rivers studies: summary of data collection, comparison of database structure and habitat protocols, and impact of additional PIT tag interrogation systems to survival estimates, 2008-2012

    Science.gov (United States)

    Martens, Kyle D.; Tibbits, Wesley T.; Watson, Grace A.; Newsom, Michael A.; Connolly, Patrick J.

    2014-01-01

    designed to show some initial analysis and to disseminate summary information that could potentially be used in ongoing modeling efforts by USGS, Reclamation, and University of Idaho. The second chapter documents the database of fish and habitat data collected by USGS from 2004 through 2012 and compares USGS habitat protocols to the Columbia Habitat Monitoring Program (CHaMP) protocol. The third chapter is a survival analysis of fish moving through Passive Integrated Transponder (PIT) tag interrogation systems in the Methow and Columbia Rivers. It examines the effects of adding PIT tags and/or PIT tag interrogation systems on survival estimates of juvenile steelhead and Chinook salmon.

  2. Dual Mode Vehicle with In-Wheel Motor: Regenerative Braking Optimization Véhicule bi-mode avec moteurs roues : optimisation du freinage récupératif

    Directory of Open Access Journals (Sweden)

    Le Solliec G.

    2013-03-01

    Full Text Available To meet the growing need for mobility of people and goods while massively reducing CO2 emissions, the electrification of vehicles is an essential solution. The variety of vehicles and their use results in innovative solutions for adapted architecture. This is especially true for light commercial vehicles where the objective is to promote full electric use in urban conditions (zero emission vehicle while maintaining significant range autonomy on road. The project VelRoue, a partnership between Renault, Michelin and IFP Energies nouvelles, aims to develop a dedicated dual-mode vehicle using a conventional thermal powertrain on the front axle and in-wheel motors on the rear one each powertrain to its use and makes it possible to achieve a low level of homologation CO2 emissions. In addition to features that meet the specific use of a commercial vehicle, in this paper we will particularly demonstrate the benefit of such an architecture to optimize the regenerative braking while ensuring a safe dynamic behaviour. Pour faire face au besoin croissant de mobilité des personnes et des biens tout en réduisant massivement les émissions de CO2, l’électrification des véhicules est une solution majeure. La grande variété des véhicules et de leur utilisation conduit à la mise en place d’architectures adaptées et donc de solutions innovantes. Cela est particulièrement le cas pour le développement de véhicules utilitaires dont l’objectif est de promouvoir un usage tout électrique en ville (véhicule zéro émission tout en maintenant une autonomie significative pour un usage extra-urbain. Le projet VelRoue, un partenariat entre Renault, Michelin et IFP Energies nouvelles, a pour objectif le développement d’un véhicule utilitaire bi-mode utilisant un groupe motopropulseur thermique traditionnel sur le train avant et des moteurs roues sur le train arrière. Chaque système de propulsion sera alors séparément optimisé à son utilisation

  3. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  4. Minority Languages of the Russian Federation: Perspectives for a Ratification of the European Charter of Regional and Minority Languages. Mercator Working Papers = Las lenguas minoritarias de la Federacion Rusa Perspectivas para una ratificacion de la Carta Europea de las Lenguas Regionales y Minoritarias. Mercator Documentos de trabajo.

    Science.gov (United States)

    Vieytez, Eduardo J. Ruiz

    This paper describes the linguistic plurality of the Russian Federation, assessing the impact that the hypothetical ratification of the European Charter of Regional and Minority Languages could have on it. Four sections focus on the following: (1) "Introduction"; (2) "Part 1--The Linguistic Plurality of the Russian Federation": the linguistic…

  5. Minority Languages of the Russian Federation: Perspectives for a Ratification of the European Charter of Regional and Minority Languages. Mercator Working Papers = Las lenguas minoritarias de la Federacion Rusa Perspectivas para una ratificacion de la Carta Europea de las Lenguas Regionales y Minoritarias. Mercator Documentos de trabajo.

    Science.gov (United States)

    Vieytez, Eduardo J. Ruiz

    This paper describes the linguistic plurality of the Russian Federation, assessing the impact that the hypothetical ratification of the European Charter of Regional and Minority Languages could have on it. Four sections focus on the following: (1) "Introduction"; (2) "Part 1--The Linguistic Plurality of the Russian Federation":…

  6. Minority Languages of the Russian Federation: Perspectives for a Ratification of the European Charter of Regional and Minority Languages. Mercator Working Papers = Las lenguas minoritarias de la Federacion Rusa Perspectivas para una ratificacion de la Carta Europea de las Lenguas Regionales y Minoritarias. Mercator Documentos de trabajo.

    Science.gov (United States)

    Vieytez, Eduardo J. Ruiz

    This paper describes the linguistic plurality of the Russian Federation, assessing the impact that the hypothetical ratification of the European Charter of Regional and Minority Languages could have on it. Four sections focus on the following: (1) "Introduction"; (2) "Part 1--The Linguistic Plurality of the Russian Federation":…

  7. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...... of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....

  8. The DARS (Dopamine Augmented Rehabilitation in Stroke) trial: protocol for a randomised controlled trial of Co-careldopa treatment in addition to routine NHS occupational and physical therapy after stroke.

    Science.gov (United States)

    Bhakta, Bipin B; Hartley, Suzanne; Holloway, Ivana; Couzens, J Alastair; Ford, Gary A; Meads, David; Sackley, Catherine M; Walker, Marion F; Ruddock, Sharon P; Farrin, Amanda J

    2014-08-08

    Stroke has a huge impact, leaving more than a third of affected people with lasting disability and rehabilitation remains a cornerstone treatment in the National Health Service (NHS). Recovery of mobility and arm function post-stroke occurs through re-learning to use the affected body parts and/or learning to compensate with the lesser affected side. Promising evidence suggests that the addition of Co-careldopa to physical therapy and occupational therapy may improve the recovery of arm and leg movement and lead to improved function. Dopamine Augmented Rehabilitation in Stroke (DARS) is a multi-centre double-blind, randomised, placebo, controlled clinical trial of Co-careldopa in addition to routine NHS occupational therapy and physical therapy as part of early stroke rehabilitation. Participants will be randomised on a 1:1 basis to either Co-careldopa or placebo. The primary objective of the trial is to determine whether the addition of six weeks of Co-careldopa treatment to rehabilitation therapy can improve the proportion of patients who can walk independently eight weeks post-randomisation. The DARS trial will provide evidence as to whether Co-careldopa, in addition to routine NHS occupational and physical therapy, leads to a greater recovery of motor function, a reduction in carer dependency and advance rehabilitation treatments for people with stroke. ISRCTN99643613 assigned on 4 December 2009.

  9. Treatment Protocols as Hierarchical Structures

    Science.gov (United States)

    Ben-Bassat, Moshe; Carlson, Richard W.; Puri, Vinod K.; Weil, Max Harry

    1978-01-01

    We view a treatment protocol as a hierarchical structure of therapeutic modules. The lowest level of this structure consists of individual therapeutic actions. Combinations of individual actions define higher level modules, which we call routines. Routines are designed to manage limited clinical problems, such as the routine for fluid loading to correct hypovolemia. Combinations of routines and additional actions, together with comments, questions, or precautions organized in a branching logic, in turn, define the treatment protocol for a given disorder. Adoption of this modular approach may facilitate the formulation of treatment protocols, since the physician is not required to prepare complex flowcharts. This hierarchical approach also allows protocols to be updated and modified in a flexible manner. By use of such a standard format, individual components may be fitted together to create protocols for multiple disorders. The technique is suited for computer implementation. We believe that this hierarchical approach may facilitate standarization of patient care as well as aid in clinical teaching. A protocol for acute pancreatitis is used to illustrate this technique.

  10. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Ching-Nung Yang; Su-Hsuan Chu; Bing-Ling Lu

    2005-01-01

    Kak's quantum key distribution (QKD) protocol provides not only the distribution but also the integrity of secret key simultaneously in quantum channel. Consequently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the failure of Kak's protocol and show that Kak's protocol does not have the joint distribution and integration that the author declares in [1].

  11. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison pr

  12. Training program to prepare the U.S. DOE laboratories for the entry into force of the protocol additional to the agreement between the United States of America and the International Atomic Energy Agency for the application of safeguards in the United

    Energy Technology Data Exchange (ETDEWEB)

    Boyer, Brian David [Los Alamos National Laboratory; Stevens, Rebecca C [Los Alamos National Laboratory; Uribe, Eva C [Los Alamos National Laboratory; Sandoval, M Analisa [Los Alamos National Laboratory; Valente, John N [Los Alamos National Laboratory; Valente, John U [BNL; Jo, Jae H [BNL; Sellen, Joana [U.S. DOE/NNSA; Wonder, Edward [QINETIQ-NORTH AMERICA

    2009-01-01

    In 2008, a joint team from Brookhaven National Laboratory (BNL) and Los Alamos National Laboratory (LANL) consisting of specialists in training IAEA inspectors in the use of complementary access activities formulated a training program to prepare the U.S DOE laboratories for the entry into force of the U.S. Additional Protocol. Since the U.S. Additional Protocol would allow for IAEA access to the DOE laboratories under the aegis of complementary access activities, the DOE laboratories would need to prepare for such visits. The goal of the training was to ensure that the DOE laboratories would successfully host an IAEA complementary access. In doing so, the labs must be able to provide the IAEA with the information that the IAEA would need to resolve its questions about the U.S. Declaration and declared activities at the lab, and also protect certain equities, as provided under the U.S. Additional Protocol Article 1.b and c. which set forth a 'National Security Exclusion.' This 'NSE' states that the AP provisions apply within the United States 'excluding only instances where its application would result in access by the Agency to activities with direct national security significance to the United States or to location or information associated with such activities.' These activities are referred to collectively as DNSS-direct national security significance. Furthermore, the U.S. has a specific right to employ managed access, without prejudice to the right under Article 1.b, in connection with activities of DNSS. The provisions in Articles 1.b and 1.c are unique to the U.S. AP, and are additional to the more general right, under Article 7, to use managed access to protect from disclosure proprietary and/or proliferation-sensitive information, and to meet safety and security requirements, that is incorporated directly from the Model Additional Protocol. The BNL-LANL team performed training at Lawrence Livermore National Laboratory, Idaho

  13. The implications of Articles 37 and 40 of the Convention on the Rights of the Child for U.S. juvenile justice and U.S. ratification of the convention.

    Science.gov (United States)

    Mlyniec, Wallace J

    2010-01-01

    The Convention on the Rights of the Child (CRC) guarantees that children accused of crimes will have the right to fair court procedures and humane sentences. Current U.S. laws concerning the child's age when a court has jurisdiction, and others concerning sentencing practices and the place of confinement, contravene the provisions of the CRC. Some U.S. laws are consistent with the treaty but are nonetheless not enforced. Recent developments, including increasing understanding of brain development, U.S. Supreme Court decisions on the constitutionality of punishments for children, and the Committee on the Rights of the Child General Comment 10, will have substantial impacts on U.S. ratification. This article discusses Articles 37 and 40 of the CRC and their effect on U.S. practices if the treaty is ratified.

  14. Protocol for the ADDITION-Plus study: a randomised controlled trial of an individually-tailored behaviour change intervention among people with recently diagnosed type 2 diabetes under intensive UK general practice care

    Directory of Open Access Journals (Sweden)

    Fanshawe Tom

    2011-04-01

    Full Text Available Abstract Background The increasing prevalence of type 2 diabetes poses both clinical and public health challenges. Cost-effective approaches to prevent progression of the disease in primary care are needed. Evidence suggests that intensive multifactorial interventions including medication and behaviour change can significantly reduce cardiovascular morbidity and mortality among patients with established type 2 diabetes, and that patient education in self-management can improve short-term outcomes. However, existing studies cannot isolate the effects of behavioural interventions promoting self-care from other aspects of intensive primary care management. The ADDITION-Plus trial was designed to address these issues among recently diagnosed patients in primary care over one year. Methods/Design ADDITION-Plus is an explanatory randomised controlled trial of a facilitator-led, theory-based behaviour change intervention tailored to individuals with recently diagnosed type 2 diabetes. 34 practices in the East Anglia region participated. 478 patients with diabetes were individually randomised to receive (i intensive treatment alone (n = 239, or (ii intensive treatment plus the facilitator-led individual behaviour change intervention (n = 239. Facilitators taught patients key skills to facilitate change and maintenance of key behaviours (physical activity, dietary change, medication adherence and smoking, including goal setting, action planning, self-monitoring and building habits. The intervention was delivered over one year at the participant's surgery and included a one-hour introductory meeting followed by six 30-minute meetings and four brief telephone calls. Primary endpoints are physical activity energy expenditure (assessed by individually calibrated heart rate monitoring and movement sensing, change in objectively measured dietary intake (plasma vitamin C, medication adherence (plasma drug levels, and smoking status (plasma cotinine levels at

  15. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  16. A New Watermarking Protocol against Conspiracy

    Institute of Scientific and Technical Information of China (English)

    ZHANG Jun; KOU Weidong; FAN Kai; CAO Xuefei

    2006-01-01

    A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.

  17. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  18. Additivity dominance

    Directory of Open Access Journals (Sweden)

    Paul Rozin

    2009-10-01

    Full Text Available Judgments of naturalness of foods tend to be more influenced by the process history of a food, rather than its actual constituents. Two types of processing of a ``natural'' food are to add something or to remove something. We report in this study, based on a large random sample of individuals from six countries (France, Germany, Italy, Switzerland, UK and USA that additives are considered defining features of what makes a food not natural, whereas ``subtractives'' are almost never mentioned. In support of this, skim milk (with major subtraction of fat is rated as more natural than whole milk with a small amount of natural vitamin D added. It is also noted that ``additives'' is a common word, with a synonym reported by a native speaker in 17 of 18 languages, whereas ``subtractive'' is lexicalized in only 1 of the 18 languages. We consider reasons for additivity dominance, relating it to omission bias, feature positive bias, and notions of purity.

  19. Palliative radiotherapy in addition to self-expanding metal stent for improving dysphagia and survival in advanced oesophageal cancer (ROCS: Radiotherapy after Oesophageal Cancer Stenting): study protocol for a randomized controlled trial.

    Science.gov (United States)

    Adamson, Douglas; Blazeby, Jane; Nelson, Annmarie; Hurt, Chris; Nixon, Lisette; Fitzgibbon, Jim; Crosby, Tom; Staffurth, John; Evans, Mim; Kelly, Noreen Hopewell; Cohen, David; Griffiths, Gareth; Byrne, Anthony

    2014-10-22

    The single most distressing symptom for patients with advanced esophageal cancer is dysphagia. Amongst the more effective treatments for relief of dysphagia is insertion of a self-expanding metal stent (SEMS). It is possible that the addition of a palliative dose of external beam radiotherapy may prolong the relief of dysphagia and provide additional survival benefit. The ROCS trial will assess the effect of adding palliative radiotherapy after esophageal stent insertion. The study is a randomized multicenter phase III trial, with an internal pilot phase, comparing stent alone versus stent plus palliative radiotherapy in patients with incurable esophageal cancer. Eligible participants are those with advanced esophageal cancer who are in need of stent insertion for primary management of dysphagia. Radiotherapy will be administered as 20 Gray (Gy) in five fractions over one week or 30 Gy in 10 fractions over two weeks, within four weeks of stent insertion. The internal pilot will assess rates and methods of recruitment; pre-agreed criteria will determine progression to the main trial. In total, 496 patients will be randomized in a 1:1 ratio with follow up until death. The primary outcome is time to progression of patient-reported dysphagia. Secondary outcomes include survival, toxicity, health resource utilization, and quality of life. An embedded qualitative study will explore the feasibility of patient recruitment by examining patients' motivations for involvement and their experiences of consent and recruitment, including reasons for not consenting. It will also explore patients' experiences of each trial arm. The ROCS study will be a challenging trial studying palliation in patients with a poor prognosis. The internal pilot design will optimize methods for recruitment and data collection to ensure that the main trial is completed on time. As a pragmatic trial, study strengths include collection of all follow-up data in the usual place of care, and a focus on

  20. Research on Protocol Migration

    Institute of Scientific and Technical Information of China (English)

    汪芸; 顾冠群; 等

    1996-01-01

    This paper elaborates the concept and model of protocol migration in network interconnection.Migration strategies and principles are discussed and several cases are studied in detail which show the basic procedure and techniques used in protocol migration.

  1. To assess whether indoor residual spraying can provide additional protection against clinical malaria over current best practice of long-lasting insecticidal mosquito nets in The Gambia: study protocol for a two-armed cluster-randomised trial

    Directory of Open Access Journals (Sweden)

    Parker David

    2011-06-01

    Full Text Available Abstract Background Recently, there has been mounting interest in scaling-up vector control against malaria in Africa. It needs to be determined if indoor residual spraying (IRS with DDT will provide significant marginal protection against malaria over current best practice of long-lasting insecticidal nets (LLINs and prompt treatment in a controlled trial, given that DDT is currently the most persistent insecticide for IRS. Methods A 2 armed cluster-randomised controlled trial will be conducted to assess whether DDT IRS and LLINs combined provide better protection against clinical malaria in children than LLINs alone in rural Gambia. Each cluster will be a village, or a group of small adjacent villages; all clusters will receive LLINs and half will receive IRS in addition. Study children, aged 6 months to 13 years, will be enrolled from all clusters and followed for clinical malaria using passive case detection to estimate malaria incidence for 2 malaria transmission seasons in 2010 and 2011. This will be the primary endpoint. Exposure to malaria parasites will be assessed using light and exit traps followed by detection of Anopheles gambiae species and sporozoite infection. Study children will be surveyed at the end of each transmission season to estimate the prevalence of Plasmodium falciparum infection and the prevalence of anaemia. Discussion Practical issues concerning intervention implementation, as well as the potential benefits and risks of the study, are discussed. Trial Registration ISRCTN01738840 - Spraying And Nets Towards malaria Elimination (SANTE

  2. Cryptographic Protocols under Quantum Attacks

    CERN Document Server

    Lunemann, Carolin

    2011-01-01

    The realm of this thesis is cryptographic protocol theory in the quantum world. We study the security of quantum and classical protocols against adversaries that are assumed to exploit quantum effects to their advantage. Security in the quantum world means that quantum computation does not jeopardize the assumption, underlying the protocol construction. But moreover, we encounter additional setbacks in the security proofs, which are mostly due to the fact that some well-known classical proof techniques are forbidden by certain properties of a quantum environment. Interestingly, we can exploit some of the very same properties to the benefit of quantum cryptography. Thus, this work lies right at the heart of the conflict between highly potential effects but likewise rather demanding conditions in the quantum world.

  3. Topological Design of Protocols

    CERN Document Server

    Jaffe, Arthur; Wozniakowski, Alex

    2016-01-01

    We give a topological simulation for tensor networks that we call the two-string model. In this approach we give a new way to design protocols, and we discover a new multipartite quantum communication protocol. We introduce the notion of topologically compressed transformations. Our new protocol can implement multiple, non-local compressed transformations among multi-parties using one multipartite resource state.

  4. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol com...

  5. A pilot cluster randomised controlled trial to investigate the addition of direct access to physiotherapy to usual GP-led primary care for adults with musculoskeletal pain: the STEMS pilot trial protocol (ISRCTN23378642).

    Science.gov (United States)

    Bishop, Annette; Tooth, Stephanie; Protheroe, Joanne; Salisbury, Chris; Ogollah, Reuben O; Jowett, Sue; Hay, Elaine M; Foster, Nadine E

    2015-01-01

    Musculoskeletal problems are common, accounting for up to 30 % of general practitioner (GP) consultations and are a major cause of chronic disability worldwide. Demand for health care for musculoskeletal conditions is likely to continue to rise given the ageing population and the increasing impact of these common painful conditions. Physiotherapists are well equipped to deliver evidence-based management for these conditions. Direct access allows patients to access physiotherapy without seeing their GP or another referring practitioner first; however, for most patients in the UK, access to National Health Service physiotherapy is controlled through GP referral. The aim of this pilot, pragmatic, cluster trial is to assess the feasibility of a future large trial to compare the clinical and cost-effectiveness of the additional offer of direct access to physiotherapy versus continuing with usual GP-led primary care alone for adults with common musculoskeletal problems. The pilot will focus on process outcomes to assess feasibility, although performance of the likely outcomes of a main trial will also be assessed. This is a two-arm parallel, cluster RCT where GP practices are the units of randomisation (the clusters), yet data are collected from individual patients with musculoskeletal problems (the participants). A direct access service will be set up in the participating physiotherapy service to provide the option of direct access to patients of the intervention arm practices. Inclusion criteria are broad to reflect the 'real-world' operation of an NHS physiotherapy direct access service for patients with musculoskeletal pain. Data collection will be through patient self-reported questionnaires at baseline, 2, 6 and 12 months and medical record review. No previous trials have been conducted into direct access to physiotherapy for patients with musculoskeletal problems. The strengths of the STEMS pilot trial are its size, the length of follow-up, and collection of

  6. Military veterans with mental health problems: a protocol for a systematic review to identify whether they have an additional risk of contact with criminal justice systems compared with other veterans groups

    Directory of Open Access Journals (Sweden)

    Taylor James

    2012-11-01

    Full Text Available Abstract Background There is concern that some veterans of armed forces, in particular those with mental health, drug or alcohol problems, experience difficulty returning to a civilian way of life and may subsequently come into contact with criminal justice services and imprisonment. The aim of this review is to examine whether military veterans with mental health problems, including substance use, have an additional risk of contact with criminal justice systems when compared with veterans who do not have such problems. The review will also seek to identify veterans’ views and experiences on their contact with criminal justice services, what contributed to or influenced their contact and whether there are any differences, including international and temporal, in incidence, contact type, veteran type, their presenting health needs and reported experiences. Methods/design In this review we will adopt a methodological model similar to that previously used by other researchers when reviewing intervention studies. The model, which we will use as a framework for conducting a review of observational and qualitative studies, consists of two parallel synthesis stages within the review process; one for quantitative research and the other for qualitative research. The third stage involves a cross study synthesis, enabling a deeper understanding of the results of the quantitative synthesis. A range of electronic databases, including MEDLINE, PsychINFO, CINAHL, will be systematically searched, from 1939 to present day, using a broad range of search terms that cover four key concepts: mental health, military veterans, substance misuse, and criminal justice. Studies will be screened against topic specific inclusion/exclusion criteria and then against a smaller subset of design specific inclusion/exclusion criteria. Data will be extracted for those studies that meet the inclusion criteria, and all eligible studies will be critically appraised. Included

  7. Potlining Additives

    Energy Technology Data Exchange (ETDEWEB)

    Rudolf Keller

    2004-08-10

    In this project, a concept to improve the performance of aluminum production cells by introducing potlining additives was examined and tested. Boron oxide was added to cathode blocks, and titanium was dissolved in the metal pool; this resulted in the formation of titanium diboride and caused the molten aluminum to wet the carbonaceous cathode surface. Such wetting reportedly leads to operational improvements and extended cell life. In addition, boron oxide suppresses cyanide formation. This final report presents and discusses the results of this project. Substantial economic benefits for the practical implementation of the technology are projected, especially for modern cells with graphitized blocks. For example, with an energy savings of about 5% and an increase in pot life from 1500 to 2500 days, a cost savings of $ 0.023 per pound of aluminum produced is projected for a 200 kA pot.

  8. Additivity dominance

    OpenAIRE

    2009-01-01

    Judgments of naturalness of foods tend to be more influenced by the process history of a food, rather than its actual constituents. Two types of processing of a ``natural'' food are to add something or to remove something. We report in this study, based on a large random sample of individuals from six countries (France, Germany, Italy, Switzerland, UK and USA) that additives are considered defining features of what makes a food not natural, whereas ``subtractives'' are almost never mentioned....

  9. Sulfite Additives

    OpenAIRE

    1988-01-01

    The CMA recommends that sulfites be banned as food preservatives when satisfactory and safe alternatives are available. When there is no suitable substitute strict labelling requirements on foods should be imposed for sulfite additives. The association supports the efforts of the Health Protection Branch of the Department of National Health and Welfare to regulate sulfites in the food and drug industry to prevent adverse reactions in people sensitive to sulfites. The CMA recommends that the D...

  10. Blind Collective Signature Protocol

    Directory of Open Access Journals (Sweden)

    Nikolay A. Moldovyan

    2011-06-01

    Full Text Available Using the digital signature (DS scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed protocols can be used also as protocols for simultaneous signing a contract. The proposed blind collective DS protocol represents a particular implementation of the blind multisignature schemes that is a novel type of the signature schemes. The proposed protocols are the first implementations of the multisignature schemes based on Belarusian signature standard.

  11. Encryption Switching Protocols

    OpenAIRE

    Couteau, Geoffroy; Peters, Thomas; Pointcheval, David

    2016-01-01

    International audience; We formally define the primitive of encryption switching protocol (ESP), allowing to switch between two encryption schemes. Intuitively, this two-party protocol converts given ciphertexts from one scheme into ciphertexts of the same messages under the other scheme, for any polynomial number of switches, in any direction. Although ESP is a special kind of two-party computation protocol, it turns out that ESP implies general two-party computation (2-PC) under natural con...

  12. Multiparty Quantum Cryptographic Protocol

    Institute of Scientific and Technical Information of China (English)

    M. Ramzan; M. K. Khan

    2008-01-01

    We propose a multiparty quantum cryptographic protocol. Unitary operators applied by Bob and Charlie, on their respective qubits of a tripartite entangled state encoding a classical symbol that can be decoded at Alice's end with the help of a decoding matrix. Eve's presence can be detected by the disturbance of the decoding matrix. Our protocol is secure against intercept-resend attacks. Furthermore, it is efficient and deterministic in the sense that two classical bits can be transferred per entangled pair of qubits. It is worth mentioning that in this protocol, the same symbol can be used for key distribution and Eve's detection that enhances the effciency of the protocol.

  13. Diagrammatization of the Transmission Control Protocol

    Directory of Open Access Journals (Sweden)

    Sabah Al-Fedaghi

    2012-09-01

    Full Text Available With the wide spread of Internet services, developers and users need a greater understanding of the technology of networking. Acquiring a clear understanding of communication protocols is an important step in understanding how a network functions; however, many protocols are complicated, and explaining them can be demanding. In addition, protocols are often explained in terms of traffic analysis and oriented toward technical staff and those already familiar with network protocols. This paper aims at proposing a diagrammatic methodology to represent protocols in general, with a focus on the Transmission Control Protocol and Secure Sockets Layer in particular. The purpose is to facilitate understanding of protocols for learning and communication purposes. The methodology is based on the notion of flow of primitive things in a system with six stages: creation, release, transfer, arrival, acceptance, and processing. Though the method presents a basic description of protocols without in-depth analysis of all aspects and mechanisms, the resultant conceptual description is a systematic specification that utilizes a few basic notions that assist in illustrating functionality and support comprehension.

  14. Composing Interfering Abstract Protocols

    Science.gov (United States)

    2016-04-01

    Fähndrich and K. R. M. Leino. Heap monotonic typestate. In IWACO 2003. [11] X. Feng. Local rely-guarantee reasoning . In POPL ’09. [12] T. Freeman...While protocol-based techniques to reason about interference abound, they do not address two practical concerns: the decidability of protocol...46 C Examples using Informal Extensions 48 C.1 Monotonic Counter

  15. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  16. On using Mobile IP Protocols

    Directory of Open Access Journals (Sweden)

    Fayza A. Nada

    2006-01-01

    Full Text Available The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol has been designed within the IETF to support the mobility of users who wish to connect to the Internet and maintain communications as they move from place to place. This study describes and summarizes the current Internet draft for mobile IP (MIPv4 with its major components: agent discovery, registration and tunneling. In addition, we outline the available encapsulation techniques and route optimization procedure. In the end, we describe the design of the new protocol for transparent routing of IPv6 packets to mobile IPv6 nodes operating in the Internet.

  17. An acid-catalyzed macrolactonization protocol.

    Science.gov (United States)

    Trost, Barry M; Chisholm, John D

    2002-10-17

    [reaction: see text] An efficient macrolactonization protocol devoid of any base was developed derived from the use of vinyl esters in transesterification. Subjecting a hydroxy acid and ethoxyacetylene to 2 mol % [RuCl(2)(p-cymene)](2) in toluene followed by addition of camphorsulfonic acid or inverse addition provided macrolactones in good yields.

  18. IPv6 Protocol Analyzer

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    With the emerging of next generation Intemet protocol (IPv6), it is expected to replace the current version of Internet protocol (IPv4) that will be exhausted in the near future. Besides providing adequate address space, some other new features are included into the new 128 bits of IP such as IP auto configuration, quality of service, simple routing capability, security, mobility and multicasting. The current protocol analyzer will not be able to handle IPv6 packets. This paper will focus on developing protocol analyzer that decodes IPv6 packet. IPv6 protocol analyzer is an application module,which is able to decode the IPv6 packet and provide detail breakdown of the construction of the packet. It has to understand the detail construction of the IPv6, and provide a high level abstraction of bits and bytes of the IPv6 packet.Thus it increases network administrators' understanding of a network protocol,helps he/she in solving protocol related problem in a IPv6 network environment.

  19. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  20. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  1. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    . In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise......Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification...... implementations that closely correspond to their legal specification, thereby increasing trust....

  2. 1996 : Track Count Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The goal of St. Vincent National Wildlife Refuge's Track Count Protocol is to provide an index to the population size of game animals inhabiting St. Vincent Island.

  3. Quantum deniable authentication protocol

    Science.gov (United States)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  4. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    the secure computation. Especially we look at the communication complexity of protocols in this model, and perfectly secure protocols. We show general protocols for any finite functionality with statistical security and optimal communication complexity (but exponential amount of preprocessing). And for two......This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  5. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  6. Cognitive Protocol Stack Design

    Science.gov (United States)

    2015-12-30

    directly related to the protocol stack, e.g., environmental or positioning data) that can be exploited to design and test novel cognitive networking ...quality of service (QoS) is challenging. Currently, 5G technologies are being developed to answer the need for further increasing network capacity, and...SECURITY CLASSIFICATION OF: In the ARO “Cognitive Protocol Stack Design" project we proposed cognitive networking solutions published in international

  7. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    2017-08-04

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  8. Information Flow in Secret Sharing Protocols

    CERN Document Server

    Kashefi, Elham; Mhalla, Mehdi; Perdrix, Simon

    2009-01-01

    The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC), error correction and secret sharing amongst others. In addition they are at the forefront in terms of implementations. As such they represent an excellent opportunity to move towards integrated protocols involving many of these elements. In this paper we look at expressing and extending graph state secret sharing and MBQC in a common framework and graphical language related to flow. We do so with two main contributions. First we express in entirely graphical terms which set of players can access which information in graph state secret sharing protocols. These succinct graphical descriptions of access allow us to take known results from graph theory to make statements on the generalisation of the previous schemes to present new secret sharing protocols. Second, we give a set of necessary condit...

  9. Privacy-Preserving Protocols for Eigenvector Computation

    CERN Document Server

    Pathak, Manas A

    2010-01-01

    In this paper, we present a protocol for computing the dominant eigenvector of a collection of private data distributed across multiple parties, with the individual parties unwilling to share their data. Our proposed protocol is based on secure multiparty computation with a trusted third-party arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We also augment the protocol with randomization to make it difficult, with a high probability, for any party to estimate properties of the data belonging to other parties from the intermediate steps. The previous approaches towards this problem were based on expensive QR decomposition of correlation matrices, we present an efficient algorithm using the power iteration method. We present an analysis of the correctness, security, efficiency of protocol and experiments over a prototype implementation.

  10. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  11. Cochleotoxicity monitoring protocol.

    Science.gov (United States)

    Ferreira Penêda, José; Barros Lima, Nuno; Ribeiro, Leandro; Helena, Diamantino; Domingues, Bruno; Condé, Artur

    2017-05-10

    Cochlear damage is frequent in long-term aminoglycosides therapy or chemotherapeutic treatments with platinum-based agents. Despite its prevalence, it is currently underestimated and underdiagnosed. A monitoring protocol is vital to the early detection of cochleotoxicity and its implementation is widely encouraged in every hospital unit. Our aim was to elaborate a cochleotoxicity monitoring protocol for patients treated with platinum compounds or aminoglycosides antibiotics. PubMed® database was searched using terms relevant to drug cochleotoxicity in order to identify the most adequate protocol. Several articles and guidelines influenced our decision. There is no consensus on a universal monitoring protocol. Its formulation and application rely heavily on available resources and personnel. High-frequency audiometry and otoacoustic emissions play an important role on early detection of cochleotoxicity caused by aminoglycoside antibiotics and platinum compounds. A cochleotoxicity monitoring protocol consisting on an initial evaluation, treatment follow-up and post-treatment evaluation is proposed. Copyright © 2017 Elsevier España, S.L.U. and Sociedad Española de Otorrinolaringología y Cirugía de Cabeza y Cuello. All rights reserved.

  12. Cytoskeleton - Methods and Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-03-01

    Full Text Available Cytoskeleton - Methods and ProtocolsSecond edition, 2010; Ray H. Gavin (Ed; Springer Protocols methods in molecular biology, vol. 586 Humana press, Totowa, New Jersey (USA; Pages: 390; €95.44; ISBN: 978-1-60761-375-6Ray H. Gavin, from the Brooklyn College of The City University of New York, Brooklyn, NY, USA, wrote a few line as preface of this book. This is quite understandable: there is not a great need of words when there are facts that sustain and favour the dissemination of a cultural product. This is the case of the second edition of Cytoskeleton - Methods and Protocols, which appears just ten years after the first edition...

  13. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  14. Blind Cognitive MAC Protocols

    CERN Document Server

    Mehanna, Omar; Gamal, Hesham El

    2008-01-01

    We consider the design of cognitive Medium Access Control (MAC) protocols enabling an unlicensed (secondary) transmitter-receiver pair to communicate over the idle periods of a set of licensed channels, i.e., the primary network. The objective is to maximize data throughput while maintaining the synchronization between secondary users and avoiding interference with licensed (primary) users. No statistical information about the primary traffic is assumed to be available a-priori to the secondary user. We investigate two distinct sensing scenarios. In the first, the secondary transmitter is capable of sensing all the primary channels, whereas it senses one channel only in the second scenario. In both cases, we propose MAC protocols that efficiently learn the statistics of the primary traffic online. Our simulation results demonstrate that the proposed blind protocols asymptotically achieve the throughput obtained when prior knowledge of primary traffic statistics is available.

  15. IP Routing Protocols

    Science.gov (United States)

    Nolasco Pinto, Armando

    2002-03-01

    Uyless Black is a widely known expert in computer networks and data communications. He is author of more than ten books in the communication technologies field, which puts him in a good position to address this topic. In IP Routing Protocols he starts by providing the background and concepts required for understanding TCP/IP technology. This is done clearly and assumes little prior knowledge of the area. As might be expected, he emphasizes the IP route discovery problem. Later he details several routing protocols.

  16. Apoptosis - Methods and Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-03-01

    Full Text Available Apoptosis - Methods and ProtocolsSecond edition, 2009; Peter Erhardt and Ambrus Toth (Eds; Springer Protocols - Methods in molecular biology, vol. 559; Humana press, Totowa, New Jersey (USA; Pages: 400; €88.35; ISBN: 978-1-60327-016-8The editors rightly begin the preface telling us that: “The ability to detect and quantify apoptosis, to understand its biochemistry and to identify its regulatory genes and proteins is crucial to biomedical research”. Nowadays this is a grounding concept of biology and medicine. What is particularly remarkable...

  17. Security Protocol Design: A Case Study Using Key Distribution Protocols

    Directory of Open Access Journals (Sweden)

    Reiner Dojen

    2009-10-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities that lead to theattacks are analyzed and guidelines for effective security protocol design are proposed. The presented guidelines are applied to the Andrew Secure RPC protocol and its adapted versions. It is demonstrated that compliance with the guidelines successfully avoidsfreshness and parallel session attacks.

  18. PROFILE: Environmental Impact Assessment Under the National Environmental Policy Act and the Protocol on Environmental Protection to the Antarctic Treaty.

    Science.gov (United States)

    Ensminger; McCold; Webb

    1999-07-01

    / Antarctica has been set aside by the international community for protection as a natural reserve and a place for scientific research. Through the Antarctic Treaty of 1961, the signing nations agreed to cooperate in protecting the antarctic environment, in conducting scientific studies, and in abstaining from the exercise of territorial claims. The 1991 signing of the Protocol on Environmental Protection to the Antarctic Treaty (Protocol) by representatives of the 26 nations comprising the Antarctic Treaty Consultative Parties (Parties) significantly strengthened environmental protection measures for the continent. The Protocol required ratification by each of the governments individually prior to official implementation. The US government ratified the Protocol by passage of the Antarctic Science, Tourism, and Conservation Act of 1997. Japan completed the process by ratifying the Protocol on December 15, 1997. US government actions undertaken in Antarctica are subject to the requirements of both the Protocol and the US National Environmental Policy Act (NEPA). There are differences in the scope and intent of the Protocol and NEPA; however, both require environmental impact assessment (EIA) as part of the planning process for proposed actions that have the potential for environmental impacts. In this paper we describe the two instruments and highlight key similarities and differences with particular attention to EIA. Through this comparison of the EIA requirements of NEPA and the Protocol, we show how the requirements of each can be used in concert to provide enhanced environmental protection for the antarctic environment. NEPA applies only to actions of the US government; therefore, because NEPA includes certain desirable attributes that have been refined and clarified through numerous court cases, and because the Protocol is just entering implementation internationally, some recommendations are made for strengthening the procedural requirements of the Protocol

  19. Protocol Materials: A Clarification.

    Science.gov (United States)

    Innerd, Wilfred; O'Gorman, David

    "Protocol materials" are records or recordings of a wide variety of behavioral situations. Characteristically they are neither simulated nor extensively edited. They are to be used for the empirical verification of concepts derived from both educational theory and the social sciences. They are attempts to capture reality so that it may be studied…

  20. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  1. THE MASTER PROTOCOL CONCEPT

    Science.gov (United States)

    Allegra, Carmen J.

    2015-01-01

    During the past decade, biomedical technologies have undergone an explosive evolution---from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars---to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demand the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study). PMID:26433553

  2. A family of quantum protocols

    CERN Document Server

    Devetak, I; Winter, A

    2003-01-01

    We introduce two dual, purely quantum protocols: for entanglement distillation assisted by quantum communication (``mother'' protocol) and for entanglement assisted quantum communication (``father'' protocol). We show how a large class of ``children'' protocols (including many previously known ones) can be derived from the two by direct application of teleportation or super-dense coding. Furthermore, the parent may be recovered from most of the children protocols by making them ``coherent''. We also summarize the various resource trade-offs these protocols give rise to.

  3. A Survey on Coverage Control Protocols in Wireless Sensor Networks

    OpenAIRE

    2013-01-01

    Coverage control algorithms play an important role in Wireless sensor network. Effective coverage control algorithms sense its coverage area with less energy spent. These coverage control models falls under various approaches like clustering, evolutionary, mobility based approaches. This paper makes a detailed survey on coverage control protocols coming under various classifications. In addition, it also discussed several protocols working mechanism with its evaluation metrics.

  4. Experimental Eavesdropping Attack against Ekert's Protocol based on Wigner's Inequality

    CERN Document Server

    Bovino, F A; Castagnoli, G C; Degiovanni, I P; Berchera, I R; Castelletto, S; Rastello, M L

    2003-01-01

    We experimentally implemented an eavesdropping attack against the Ekert protocol for quantum key distribution based on the Wigner inequality. We demonstrate a serious lack of security of this protocol when the eavesdropper gains total control of the source. In addition we tested a modified Wigner inequality which should guarantee a secure quantum key distribution.

  5. An Enhanced Security Protocol for Fast Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Sakurai, Kouichi; Hori, Yoshiaki

    Recently, Kempf and Koodli have proposed a security protocol for Fast Mobile IPv6 (FMIPv6). Through the SEcure Neighbor Discovery (SEND) protocol, it achieves secure distribution of a handover key, and consequently becomes a security standard for FMIPv6. However, it is still vulnerable to redirection attacks. In addition, due to the SEND protocol, it suffers from denial of service attacks and expensive computational cost. In this paper, we present a security protocol, which enhances Kempf-Koodli's one with the help of the AAA infrastructure.

  6. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  7. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Directory of Open Access Journals (Sweden)

    Ning Li

    2016-03-01

    Full Text Available Underwater acoustic sensor networks (UASNs have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  8. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  9. Use of YouScope to implement systematic microscopy protocols.

    Science.gov (United States)

    Lang, Moritz; Rudolf, Fabian; Stelling, Jörg

    2012-04-01

    Complex microscopy protocols, e.g., to dynamically track multiple signals in living cells under different conditions, are becoming more common. However, the implementation of complex protocols on modern, motorized microscopes often requires their reformulation into low-level machine language. This recoding is a time-consuming and error-prone task that often requires advanced programming skills. This unit describes how to use the high level, open-source microscope control platform YouScope to implement complex measurement protocols. Three protocols detail how to install and configure YouScope on a motorized microscope, how to use YouScope to quickly assess the quality of a sample, and how to set up imaging protocols for cells in a microplate. In addition to these protocols, descriptions are given for the use of various other tools YouScope provides to successfully accomplish various microscopy tasks.

  10. Mitosis Methods & Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Mitosis Methods & Protocols Andrew D. McAinsh (Edt Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 545, 2009 ISBN: 978-1-60327-992-5   It is quite clear from the contents of this book that the remarkably fascinating phenomenon of mitosis (that captured, and still is capturing, the attention of entire generations of scientists is still open to research. This is mainly due to our lack of knowledge of so many multifaced events of this extraordinarly complex process. The reader giving a glace through the Contents and Contributors sections is speechless: All of the first-class models (i.e., budding yeast, Caenorabditis, Drosophila, Xenopus and Human are presented..... 

  11. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  12. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  13. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  14. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo;

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  15. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  16. CT protocol review and optimization.

    Science.gov (United States)

    Kofler, James M; Cody, Dianna D; Morin, Richard L

    2014-03-01

    To reduce the radiation dose associated with CT scans, much attention is focused on CT protocol review and improvement. In fact, annual protocol reviews will soon be required for ACR CT accreditation. A major challenge in the protocol review process is determining whether a current protocol is optimal and deciding what steps to take to improve it. In this paper, the authors describe methods for pinpointing deficiencies in CT protocols and provide a systematic approach for optimizing them. Emphasis is placed on a team approach, with a team consisting of at least one radiologist, one physicist, and one technologist. This core team completes a critical review of all aspects of a CT protocol and carefully evaluates proposed improvements. Changes to protocols are implemented only with consensus of the core team, with consideration of all aspects of the CT examination, including image quality, radiation dose, patient care and safety, and workflow.

  17. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 74683-79494

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  18. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  19. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  20. Protocol for a Delay-Tolerant Data-Communication Network

    Science.gov (United States)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  1. A Hybrid Quorum Protocol for Improved Availability, Capacity, Load and Reduced Overhead

    Science.gov (United States)

    Pandey, Parul; Tripathi, Maheshwari

    2016-12-01

    Data replication is playing a vital role in the design of distributed information systems. This paper presents a novel and efficient distributed algorithm for managing replicated data and for better performance and availability. This paper presents an extension to existing wheel protocol for improved performance. Wheel protocol imposes a logical wheel structure on the set of copies of an object and gives smallest read quorum. In addition to small read quorum size for read intensive applications, it is necessary to have good write availability as well. This paper proposes two hybrid wheel protocols, which superimpose logarithmic and ring protocols on top of the wheel protocol. It shows that, both protocols help in improving write availability, read capacity, load and message overhead and also compare their performances with wheel and other protocols. Hybrid protocols expand usage of wheel protocol to different type of applications.

  2. Stabilizing token schemes for population protocols

    CERN Document Server

    Canepa, Davide

    2008-01-01

    In this paper we address the stabilizing token circulation and leader election problems in population protocols model augmented with oracles. Population protocols is a recent model of computation that captures the interactions of biological systems. In this model emergent global behavior is observed while anonymous finite-state agents(nodes) perform local peer interactions. Uniform self-stabilizing leader election or token circulation are impossible in such systems without additional assumptions. Therefore, the classical model has been augmented with the eventual leader detector, $\\Omega?$, that eventually detects the presence or the absence of a leader. In this work we propose some impossibility results related to self-stabilizing implementation of leader election and token circulation in this model. Then we propose deterministic and probabilistic self-stabilizing solutions for token circulation and leader election for various topologies (chains, trees and arbitrary networks). Additionally, we prove the nece...

  3. Stream Control Transmission Protocol Steganography

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows. This paper describes potential steganographic methods that may be applied to SCTP and may pose a threat to network security. Proposed methods utilize new, characteristic SCTP features like multi-homing and multistreaming. Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.

  4. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    Energy Technology Data Exchange (ETDEWEB)

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  5. Early action to reduce greenhouse gas emissions before the commitment period of the Kyoto protocol: advantages and disadvantages.

    Science.gov (United States)

    Michaelowa, A; Rolfe, C

    2001-09-01

    Current "business as usual" projections suggest greenhouse gas emissions from industrialized nations will grow substantially over the next decade. However, if it comes into force, the Kyoto Protocol will require industrialized nations to reduce emissions to an average of 5% below 1990 levels in the 2008-2012 period. Taking early action to close this gap has a number of advantages. It reduces the risks of passing thresholds that trigger climate change "surprises." Early action also increases future generations' ability to choose greater levels of climate protection, and it leads to faster reductions of other pollutants. From an economic sense, early action is important because it allows shifts to less carbon-intensive technologies during the course of normal capital stock turnover. Moreover, many options for emission reduction have negative costs, and thus are economically worthwhile, because of paybacks in energy costs, healthcare costs, and other benefits. Finally, early emission reductions enhance the probability of successful ratification and lower the risk of noncompliance with the protocol. We discuss policy approaches for the period prior to 2008. Disadvantages of the current proposals for Credit for Early Action are the possibility of adverse selection due to problematic baseline calculation methods as well as the distributionary impacts of allocating a part of the emissions budget already before 2008. One simple policy without drawbacks is the so-called baseline protection, which removes the disincentive to early action due to the expectation that businesses may, in the future, receive emission rights in proportion to past emissions. It is particularly important to adopt policies that shift investment in long-lived capital stock towards less carbon-intensive technologies and to encourage innovation and technology development that will reduce future compliance costs.

  6. Survey protocol for invasive species

    OpenAIRE

    Menza, Charles

    2009-01-01

    This protocol was developed by the Biogeography Branch of NOAA’s Center for Coastal Monitoring and Assessment to support invasive species research by the Papahānaumokuākea Marine National Monument. The protocol’s objective is to detect Carijoa riisei and Hypnea musciformis in deepwater habitats using visual surveys by technical divers. Note: This protocol is designed to detect the presence or absence of invasive species. A distinct protocol is required to collect information on abundance ...

  7. A PROGRAMMED LABOUR - PROTOCOL

    Directory of Open Access Journals (Sweden)

    Savita

    2014-12-01

    Full Text Available A Prospective randomized Clinical study of outcome of labour following. “A Programmed labour. Protocol” was done at Department of OBG, MRMC Gulbarga. The Protocol was aimed with dual. Objective of Providing Pain relief during labour and teaching the goal of safe motherhood by optimizing objective outcome. AIMS AND OBJECTIVES: Shortening of duration of labour. Effect of labour analgesia. Monitoring of the events during labour. Lowering the incidence of operative deliveries. METHODS: 100 cases primi pregnant women admitted in labour room are randomly selected. It is designed to apply to low risk primi parous, singleton cephalic presentation without evidence of CPD and spontaneous onset of labour. RESULTS: Shortened duration of all the stages of Labour, especially significant reduction in duration of active phase of labour. CONCLUSION: The programmed labour is simple easy and effective method for painless and safe delivery.

  8. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  9. The importance of the Montreal Protocol in protecting climate.

    Science.gov (United States)

    Velders, Guus J M; Andersen, Stephen O; Daniel, John S; Fahey, David W; McFarland, Mack

    2007-03-20

    The 1987 Montreal Protocol on Substances that Deplete the Ozone Layer is a landmark agreement that has successfully reduced the global production, consumption, and emissions of ozone-depleting substances (ODSs). ODSs are also greenhouse gases that contribute to the radiative forcing of climate change. Using historical ODSs emissions and scenarios of potential emissions, we show that the ODS contribution to radiative forcing most likely would have been much larger if the ODS link to stratospheric ozone depletion had not been recognized in 1974 and followed by a series of regulations. The climate protection already achieved by the Montreal Protocol alone is far larger than the reduction target of the first commitment period of the Kyoto Protocol. Additional climate benefits that are significant compared with the Kyoto Protocol reduction target could be achieved by actions under the Montreal Protocol, by managing the emissions of substitute fluorocarbon gases and/or implementing alternative gases with lower global warming potentials.

  10. A Bayesian approach to optimizing cryopreservation protocols

    Directory of Open Access Journals (Sweden)

    Sammy Sambu

    2015-06-01

    Full Text Available Cryopreservation is beset with the challenge of protocol alignment across a wide range of cell types and process variables. By taking a cross-sectional assessment of previously published cryopreservation data (sample means and standard errors as preliminary meta-data, a decision tree learning analysis (DTLA was performed to develop an understanding of target survival using optimized pruning methods based on different approaches. Briefly, a clear direction on the decision process for selection of methods was developed with key choices being the cooling rate, plunge temperature on the one hand and biomaterial choice, use of composites (sugars and proteins as additional constituents, loading procedure and cell location in 3D scaffolding on the other. Secondly, using machine learning and generalized approaches via the Naïve Bayes Classification (NBC method, these metadata were used to develop posterior probabilities for combinatorial approaches that were implicitly recorded in the metadata. These latter results showed that newer protocol choices developed using probability elicitation techniques can unearth improved protocols consistent with multiple unidimensionally-optimized physical protocols. In conclusion, this article proposes the use of DTLA models and subsequently NBC for the improvement of modern cryopreservation techniques through an integrative approach.

  11. The Nagoya Protocol and Indigenous Peoples

    Directory of Open Access Journals (Sweden)

    Maria Yolanda Teran

    2016-07-01

    Full Text Available This article is about Indigenous peoples’ involvement in the Nagoya Protocol negotiations from 2006 to 2010, as well as in its implementation to stop biopiracy in order to protect Pachamama, Mother Earth, and to ensure our survival and the survival of coming generations. The Nagoya Protocol is an international instrument that was adopted in Nagoya, Japan in October 2010 by the Conference of Parties (COP 10 and ratified by 51 countries in Pyeongchang, South Korea in October 2014 at COP 12. This protocol governs access to genetic resources and the fair and equitable sharing of benefits arising from their utilization (access and benefit sharing [ABS]. It has several articles related to Indigenous peoples and traditional knowledge, as well as: The interrelation and inseparable nature between genetic resources and traditional knowledge; The diversity of circumstances surrounding traditional knowledge ownership, including by country; The identification of traditional knowledge owners; The declaration of Indigenous peoples' human rights; and The role of women in the biodiversity process. In addition, this protocol lays out obligations on access, specifically participation in equitable benefit sharing, the accomplishment of prior and informed consent, and the mutually agreed terms and elaboration of a national legal ABS framework with the participation of Indigenous peoples and local communities in order to have well-defined roles, responsibilities, and times of negotiations.

  12. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.;

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  13. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  14. Protocol for determining bull trout presence

    Science.gov (United States)

    Peterson, James; Dunham, Jason B.; Howell, Philip; Thurow, Russell; Bonar, Scott

    2002-01-01

    The Western Division of the American Fisheries Society was requested to develop protocols for determining presence/absence and potential habitat suitability for bull trout. The general approach adopted is similar to the process for the marbled murrelet, whereby interim guidelines are initially used, and the protocols are subsequently refined as data are collected. Current data were considered inadequate to precisely identify suitable habitat but could be useful in stratifying sampling units for presence/absence surveys. The presence/absence protocol builds on previous approaches (Hillman and Platts 1993; Bonar et al. 1997), except it uses the variation in observed bull trout densities instead of a minimum threshold density and adjusts for measured differences in sampling efficiency due to gear types and habitat characteristics. The protocol consists of: 1. recommended sample sizes with 80% and 95% detection probabilities for juvenile and resident adult bull trout for day and night snorkeling and electrofishing adjusted for varying habitat characteristics for 50m and 100m sampling units, 2. sampling design considerations, including possible habitat characteristics for stratification, 3. habitat variables to be measured in the sampling units, and 3. guidelines for training sampling crews. Criteria for habitat strata consist of coarse, watershed-scale characteristics (e.g., mean annual air temperature) and fine-scale, reach and habitat-specific features (e.g., water temperature, channel width). The protocols will be revised in the future using data from ongoing presence/absence surveys, additional research on sampling efficiencies, and development of models of habitat/species occurrence.

  15. Clinical validation protocols for noninvasive blood pressure monitors and their recognition by regulatory authorities and professional organizations: rationale and considerations for a single unified protocol or standard.

    Science.gov (United States)

    Ng, Kim-Gau

    2013-10-01

    Standardized protocols for validating the clinical accuracy of noninvasive blood pressure (NIBP) monitors have been available since 1987. Some of them were developed by standards bodies and others by professional organizations. They have been well-tested through use and progressively improved through multiple revisions; however, many methodological differences exist between them. In addition, for the purpose of regulatory approval or marketing clearance, some protocols are recognized in some countries but not in others; thus, manufacturers have to validate their NIBP monitors to more than one protocol in order to market them worldwide. The use of different protocols not only makes it difficult to compare one device with another but also complicates the validation, regulatory approval, marketing, and public acceptance of NIBP monitors, creating undue burden on manufacturers and unnecessary confusion among users. There is a need for protocol developers, standards bodies, and regulatory authorities to work together to develop and agree on a single unified protocol or standard, one that builds on the strengths of the various protocols that have been developed so far. It is apparent that there is already a trend toward convergence of the various protocols into two protocols, namely, the ISO 81060-2:2009 standard and the 2010 European Society of Hypertension International Protocol. With further reconciliation and consensus, it should be possible to integrate the best features of the ISO, European Society of Hypertension, and other protocols, along with further improvements, into a single unified protocol or standard.

  16. [A new protocol, is the spine still safe?].

    Science.gov (United States)

    Kokke, Marike C; Ham, Wietske; Leenen, Loek P H

    2015-01-01

    The latest version of the Dutch National Protocol Ambulance Care (Landelijk Protocol Ambulancezorg LPA8), introduced on 1 January 2015, contains too few guarantees of the safety of trauma patients in whom spinal immobilisation has to be performed. A number of strict indications have been removed and too much freedom is also permitted with respect to implementation. Although the previous standard method using a spinal board, collar and blocks did have disadvantages, the new operating method has been insufficiently substantiated and, in addition, is not well matched to the protocols of Accident and Emergency departments. It is vital that the agencies involved collaborate to reach a joint solution.

  17. A Secure Authenticated Key Exchange Protocol for Credential Services

    Science.gov (United States)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    In this paper, we propose a leakage-resilient and proactive authenticated key exchange (called LRP-AKE) protocol for credential services which provides not only a higher level of security against leakage of stored secrets but also secrecy of private key with respect to the involving server. And we show that the LRP-AKE protocol is provably secure in the random oracle model with the reduction to the computational Difie-Hellman problem. In addition, we discuss about some possible applications of the LRP-AKE protocol.

  18. Updatable Queue Protocol Based On TCP For Virtual Reality Environment

    CERN Document Server

    Al-Howaide, Ala'a Z; Salhieh, Ayad M

    2011-01-01

    The variance in number and types of tasks required to be implemented within Distributed Virtual Environments (DVE) highlights the needs for communication protocols can achieve consistency. In addition, these applications have to handle an increasing number of participants and deal with the difficult problem of scalability. Moreover, the real-time requirements of these applications make the scalability problem more difficult to solve. In this paper, we have implemented Updatable Queue Abstraction protocol (UQA) on TCP (TCP-UQA) and compared it with original TCP, UDP, and Updatable Queue Abstraction based on UDP (UDP-UQA) protocols. Results showed that TCP-UQA was the best in queue management.

  19. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  20. A Survey on Coverage Control Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    V.Nivedhitha

    2013-04-01

    Full Text Available Coverage control algorithms play an important role in Wireless sensor network. Effective coverage control algorithms sense its coverage area with less energy spent. These coverage control models falls under various approaches like clustering, evolutionary, mobility based approaches. This paper makes a detailed survey on coverage control protocols coming under various classifications. In addition, it also discussed several protocols working mechanism with its evaluation metrics.

  1. Internet-Protocol-Based Satellite Bus Architecture Designed

    Science.gov (United States)

    Slywczak, Richard A.

    2004-01-01

    NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.

  2. Efficient Protocols for Distributed Classification and Optimization

    CERN Document Server

    Daume, Hal; Saha, Avishek; Venkatasubramanian, Suresh

    2012-01-01

    In distributed learning, the goal is to perform a learning task over data distributed across multiple nodes with minimal (expensive) communication. Prior work (Daume III et al., 2012) proposes a general model that bounds the communication required for learning classifiers while allowing for $\\eps$ training error on linearly separable data adversarially distributed across nodes. In this work, we develop key improvements and extensions to this basic model. Our first result is a two-party multiplicative-weight-update based protocol that uses $O(d^2 \\log{1/\\eps})$ words of communication to classify distributed data in arbitrary dimension $d$, $\\eps$-optimally. This readily extends to classification over $k$ nodes with $O(kd^2 \\log{1/\\eps})$ words of communication. Our proposed protocol is simple to implement and is considerably more efficient than baselines compared, as demonstrated by our empirical results. In addition, we illustrate general algorithm design paradigms for doing efficient learning over distribute...

  3. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.

  4. Modular approach to the design and analysis of password-based security protocols

    Institute of Scientific and Technical Information of China (English)

    FENG DengGuo; CHEN WeiDong

    2007-01-01

    In this paper, a general framework for designing and analyzing password-based security protocols is presented, First we introduce the concept of "weak computational indistinguishability" based on current progress of password-based security protocols. Then, we focus on cryptographic foundations for password-based security protocols, i.e., the theory of "weak pseudorandomness". Furthermore, based on the theory of weak pseudorandomness, we present a modular approach to design and analysis of password-based security protocols. Finally, applying the modular approach, we design two kinds of password-based security protocols, i.e.,password-based session key distribution (PSKD) protocol and protected password change (PPC) protocol. In addition to having forward secrecy and improved efficiency, new protocols are proved secure.

  5. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    Science.gov (United States)

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  6. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  7. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  8. Interoperation between AODV protocol and AOHR protocol for mobile ad hoc networks

    Science.gov (United States)

    Wu, Shaochuan; Wang, Changhong; Zhang, Jiayan

    2009-12-01

    Although AOHR protocol has some excellent performance, no actual network utilizes AOHR as routing protocol. It is because that this protocol cannot interoperate with AODV protocol, which is the most famous routing protocol and used all over the world. The cost will be very huge to replace AODV protocol with AOHR protocol for existing networks, so the only feasible method is to modify AOHR protocol to interoperate with AODV as introduced in this paper. The simulation results prove that the modified AOHR protocol can help the existing AODV protocol provide routing service, and the interoperation of these two routing protocols is realized.

  9. Improved Authenticated Multi-Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  10. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol is formali......The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol...

  11. Automata-theoretic protocol programming

    NARCIS (Netherlands)

    Jongmans, Sung-Shik Theodorus Quirinus

    2016-01-01

    Parallel programming has become essential for writing scalable programs on general hardware. Conceptually, every parallel program consists of workers, which implement primary units of sequential computation, and protocols, which implement the rules of interaction that workers must abide by. As

  12. National Elk Refuge vaccination protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Proposal by the State of Wyoming, Wyoming Game and Fish Department, to vaccinate elk on the National Elk Refuge. The proposal provides a protocol for vaccinating elk...

  13. Assessment of Established Survey Protocols

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — A form and instructions for quickly and briefly assessing a previously (prior to 2013) reviewed or approved survey protocol for use as a National or Regional survey...

  14. Process for Reviewing Survey Protocols

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document describes the process for conducting two types of reviews of survey protocols. A quick assessment is used to acknowledge and describe to potential...

  15. Formal Modeling of Communication Protocols.

    Science.gov (United States)

    1981-03-01

    problems have been developed. 4 FORMAL MODELING OF COMMUNICATION PROTOCOLS The state machine model is motivated by the observation that protocols may be...simplest types of state machine model because they have only a single state variable (the state) which takes on a relatively small range of values. For...grammar, this correspondence is very apparent. For each state of the state machine model , we define a nonterminal symbol in the grammar. The inputs

  16. [Food additives and healthiness].

    Science.gov (United States)

    Heinonen, Marina

    2014-01-01

    Additives are used for improving food structure or preventing its spoilage, for example. Many substances used as additives are also naturally present in food. The safety of additives is evaluated according to commonly agreed principles. If high concentrations of an additive cause adverse health effects for humans, a limit of acceptable daily intake (ADI) is set for it. An additive is a risk only when ADI is exceeded. The healthiness of food is measured on the basis of nutrient density and scientifically proven effects.

  17. Efficient Protocols for Principal Eigenvector Computation over Private Data

    Directory of Open Access Journals (Sweden)

    Manas A. Pathak

    2011-12-01

    Full Text Available In this paper we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy constraints. Our proposed protocol is based on secure multi-party computation with a semi-honest arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We augment the protocol with randomization and oblivious transfer to make it difficult for any party to estimate properties of the data belonging to other parties from the intermediate steps. The previous approaches towards this problem were based on expensive QR decomposition of correlation matrices, we present an efficient algorithm using the power iteration method. We present an analysis of the correctness, security, and efficiency of protocol along with experimental results using a prototype implementation over simulated data and USPS handwritten digits dataset.

  18. A Secure and Efficient Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yuping Hu

    2009-06-01

    Full Text Available The Digital watermarking technology has become increasing popular in the protection digital copyright. However, in the practical application, the watermarking algorithms should be combined with a secure copyright protection protocol to solve the copyright protection problems completely. In this paper, a novel buyer-seller watermarking protocol is proposed for piracy tracing, in which a memoryless Watermark Certification Authority (WCA can offer a number of watermarks for a buyer simultaneously, avoiding itself being involved in each digital transaction operated between the buyer and the seller. Besides, in order to guarantee the anonymity of the buyer, the WCA can provide the buyer with an encrypted digital certificate and have it submitted directly to the seller by the buyer. In addition, the proposed protocol also can resolve other problems, such as the customer right problem, the binding attack problem, the anonymity problem, the conspiracy problem, the dispute problem. The analyses indicate that the proposed protocol is secure and practical.

  19. Advanced transport protocols for space communications

    Science.gov (United States)

    Fang, Jian

    Satellite IP networks are characterized by high bit error rates, long propagation delays, low bandwidth feedback links, and persistent fades resulting from varying weather patterns. A new unicast transport protocol is designed to address all the above challenges. Two new algorithms, Jump Start and Quick Recovery, are presented to replace the traditional Slow Start algorithm and to recover rapidly from multiple segment losses within one window of data. The characteristics of satellite IP networks also distinguish satellite multicasting from multicasting in terrestrial wirelined networks. A reliable data multicast transport protocol, TCP-Peachtree, is proposed to solve the acknowledgment implosion and scalability problems in satellite IP networks. Developments in space technology are enabling the realization of deep space missions. The scientific data from these missions need to be delivered to the Earth successfully. To achieve this goal, the InterPlaNetary Internet is proposed as the Internet of the deep space planetary networks, which is characterized by extremely high propagation delays, high link errors, asymmetrical bandwidth, and blackouts. A reliable transport protocol, TP-Planet, is proposed for data traffic in the InterPlaNetary Internet. TP-Planet deploys rate-based additive-increase multiplicative-decrease (AIMD) congestion control and replaces the inefficient slow start algorithm with a novel Initial State algorithm that allows the capture of link resources in a very fast and controlled manner. A new congestion detection and control mechanism is developed and a Blackout State is incorporated into the protocol operation. Multimedia traffic is also one part of the aggregate traffic over InterPlaNetary Internet backbone links and it has additional requirements such as minimum bandwidth, smooth traffic, and error control. To address all the above challenges, RCP-Planet is proposed. RCP-Planet consists of two novel algorithms, i.e., Begin State and

  20. Low-radiation-dose dual-phase MDCT protocol with split contrast media dose and time optimization: protocol design for renal donors evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Bazeed, Mohamed Fayez (Dept. of Diagnostic Radiology, Faculty of Medicine, Mansoura Univ. (Egypt)), email: bazeed@mans.eun.eg; Fooshang, Fawzy F (National Inst. of Urology and Nephrology (Egypt)); Ahmed, Magdy Aly (Nephrology Dept., Armed Forces Hospitals Southern Region (Saudi Arabia))

    2011-10-15

    Background A routine, multiphase, computed tomography (CT) protocol is associated with high radiation exposure to potential kidney donors. To reduce radiation exposure, several authors have suggested a reduction in the number of phases. Purpose To evaluate a low-radiation-dose, dual-phase protocol (i.e. a protocol with an unenhanced phase and combined vascular and excretory phase) for the preoperative evaluation of potential renal donors. Material and Methods Sixty-five potential renal donors were divided into two groups. The first group was scanned with a routine quadric-phase protocol (non-contrast, arterial, venous, and delayed), and the second group was scanned with a triple-phase protocol (dual phase protocol + venous phase). In the second group, we replaced CT angiography with a routine abdominal CT technique. In addition to the evaluation of renal arteries, veins, and excretory systems, the radiation dose of the suggested protocol was compared to that of the routine quadric-phase protocol. Results The suggested protocol was efficient in the evaluation of renal arteries, veins, and excretory systems in all studied potential renal donors. Renal arteries were well visualized in the combined vascular excretory phase using the routine abdominal CT technique; no significant difference was noted when these results were compared to those obtained from the CT angiography used in the quadric-phase protocol. The mean effective radiation dose of our suggested dual-phase protocol was only 34% of the dose resulting from the routine quadric-phase protocol. Conclusion Use of a low-radiation, dual-phase, CT protocol, which relied on both an unenhanced phase and a combined vascular and excretory phase, significantly reduced radiation dose. Furthermore, the proposed protocol provides adequate visualization of renal arteries and veins, and affords sufficient opacification of the urinary tract using improved acquisition triggering

  1. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  2. Additives in yoghurt production

    Directory of Open Access Journals (Sweden)

    Milna Tudor

    2008-02-01

    Full Text Available In yoghurt production, mainly because of sensory characteristics, different types of additives are used. Each group, and also each substance from the same group has different characteristics and properties. For that reason, for improvement of yoghurt sensory characteristics apart from addition selection, the quantity of the additive is very important. The same substance added in optimal amount improves yoghurt sensory attributes, but too small or too big addition can reduce yoghurt sensory attributes. In this paper, characteristics and properties of mostly used additives in yoghurt production are described; skimmed milk powder, whey powder, concentrated whey powder, sugars and artificial sweeteners, fruits, stabilizers, casein powder, inulin and vitamins. Also the impact of each additive on sensory and physical properties of yoghurt, syneresis and viscosity, are described, depending on used amount added in yoghurt production.

  3. Wire + Arc Additive Manufacturing

    OpenAIRE

    Williams, Stewart W.; Martina, Filomeno; Addison, Adrian C.; Ding, Jialuo; Pardal, Goncalo; Colegrove, Paul A.

    2016-01-01

    Depositing large components (>10 kg) in titanium, aluminium, steel and other metals is possible using Wire + Arc Additive Manufacturing. This technology adopts arc welding tools and wire as feedstock for additive manufacturing purposes. High deposition rates, low material and equipment costs, and good structural integrity make Wire+Arc Additive Manufacturing a suitable candidate for replacing the current method of manufacturing from solid billets or large forgings, especially with regards to ...

  4. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  5. A novel protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery under cardiopulmonary bypass.

    Science.gov (United States)

    Odaka, Mizuho; Minakata, Kenji; Toyokuni, Hideaki; Yamazaki, Kazuhiro; Yonezawa, Atsushi; Sakata, Ryuzo; Matsubara, Kazuo

    2015-08-01

    This study aimed to develop and assess the effectiveness of a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. We established a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. This novel protocol was assessed by comparing patients undergoing open heart surgery before (control group; n = 30) and after its implementation (protocol group; n = 31) at Kyoto University Hospital between July 2012 and January 2013. Surgical site infections (SSIs) were observed in 4 control group patients (13.3 %), whereas no SSIs were observed in the protocol group patients (P protocol group (P protocol significantly decreased the total antibiotic dose used in the perioperative period (P protocol group patients required this additional change in the antibiotic regimen (P protocol based on preoperative kidney function effectively prevents SSIs in patients undergoing open heart surgery.

  6. Automated addition of Chelex solution to tubes containing trace items

    DEFF Research Database (Denmark)

    Stangegaard, Michael; Hansen, Thomas Møller; Hansen, Anders Johannes;

    2011-01-01

    Extraction of DNA from trace items for forensic genetic DNA typing using a manual Chelex based extraction protocol requires addition of Chelex solution to sample tubes containing trace items. Automated of addition of Chelex solution may be hampered by high viscosity of the solution and fast sedim...

  7. Automated addition of Chelex solution to tubes containing trace items

    DEFF Research Database (Denmark)

    Stangegaard, Michael; Hansen, Thomas Møller; Hansen, Anders Johannes;

    2011-01-01

    Extraction of DNA from trace items for forensic genetic DNA typing using a manual Chelex based extraction protocol requires addition of Chelex solution to sample tubes containing trace items. Automated of addition of Chelex solution may be hampered by high viscosity of the solution and fast...

  8. Additive Manufactured Product Integrity

    Science.gov (United States)

    Waller, Jess; Wells, Doug; James, Steve; Nichols, Charles

    2017-01-01

    NASA is providing key leadership in an international effort linking NASA and non-NASA resources to speed adoption of additive manufacturing (AM) to meet NASA's mission goals. Participants include industry, NASA's space partners, other government agencies, standards organizations and academia. Nondestructive Evaluation (NDE) is identified as a universal need for all aspects of additive manufacturing.

  9. Polylactides in additive biomanufacturing.

    Science.gov (United States)

    Poh, Patrina S P; Chhaya, Mohit P; Wunner, Felix M; De-Juan-Pardo, Elena M; Schilling, Arndt F; Schantz, Jan-Thorsten; van Griensven, Martijn; Hutmacher, Dietmar W

    2016-12-15

    New advanced manufacturing technologies under the alias of additive biomanufacturing allow the design and fabrication of a range of products from pre-operative models, cutting guides and medical devices to scaffolds. The process of printing in 3 dimensions of cells, extracellular matrix (ECM) and biomaterials (bioinks, powders, etc.) to generate in vitro and/or in vivo tissue analogue structures has been termed bioprinting. To further advance in additive biomanufacturing, there are many aspects that we can learn from the wider additive manufacturing (AM) industry, which have progressed tremendously since its introduction into the manufacturing sector. First, this review gives an overview of additive manufacturing and both industry and academia efforts in addressing specific challenges in the AM technologies to drive toward AM-enabled industrial revolution. After which, considerations of poly(lactides) as a biomaterial in additive biomanufacturing are discussed. Challenges in wider additive biomanufacturing field are discussed in terms of (a) biomaterials; (b) computer-aided design, engineering and manufacturing; (c) AM and additive biomanufacturing printers hardware; and (d) system integration. Finally, the outlook for additive biomanufacturing was discussed. Copyright © 2016 Elsevier B.V. All rights reserved.

  10. Additive Gaussian Processes

    CERN Document Server

    Duvenaud, David; Rasmussen, Carl Edward

    2011-01-01

    We introduce a Gaussian process model of functions which are additive. An additive function is one which decomposes into a sum of low-dimensional functions, each depending on only a subset of the input variables. Additive GPs generalize both Generalized Additive Models, and the standard GP models which use squared-exponential kernels. Hyperparameter learning in this model can be seen as Bayesian Hierarchical Kernel Learning (HKL). We introduce an expressive but tractable parameterization of the kernel function, which allows efficient evaluation of all input interaction terms, whose number is exponential in the input dimension. The additional structure discoverable by this model results in increased interpretability, as well as state-of-the-art predictive power in regression tasks.

  11. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  12. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  13. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  14. Additive and polynomial representations

    CERN Document Server

    Krantz, David H; Suppes, Patrick

    1971-01-01

    Additive and Polynomial Representations deals with major representation theorems in which the qualitative structure is reflected as some polynomial function of one or more numerical functions defined on the basic entities. Examples are additive expressions of a single measure (such as the probability of disjoint events being the sum of their probabilities), and additive expressions of two measures (such as the logarithm of momentum being the sum of log mass and log velocity terms). The book describes the three basic procedures of fundamental measurement as the mathematical pivot, as the utiliz

  15. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  16. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  17. Developing protocols for obstetric emergencies.

    Science.gov (United States)

    Roth, Cheryl K; Parfitt, Sheryl E; Hering, Sandra L; Dent, Sarah A

    2014-01-01

    There is potential for important steps to be missed in emergency situations, even in the presence of many health care team members. Developing a clear plan of response for common emergencies can ensure that no tasks are redundant or omitted, and can create a more controlled environment that promotes positive health outcomes. A multidisciplinary team was assembled in a large community hospital to create protocols that would help ensure optimum care and continuity of practice in cases of postpartum hemorrhage, shoulder dystocia, emergency cesarean surgical birth, eclamptic seizure and maternal code. Assignment of team roles and responsibilities led to the evolution of standardized protocols for each emergency situation.

  18. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  19. Protocol Writing in Clinical Research

    Science.gov (United States)

    Al-Jundi, Azzam

    2016-01-01

    Writing a research proposal is probably one of the most challenging and difficult task as research is a new area for the majority of postgraduates and new researchers. The purpose of this article is to summarize the most important steps and necessary guidelines for producing a standard research protocol. Academic and administrative success of any project is usually determined by acquiring a grant for the related field of research. Hence, the quality of a protocol is primarily required to achieve success in this scientific competition. PMID:28050522

  20. Food additives data book

    National Research Council Canada - National Science Library

    Smith, Jim; Hong-Shum, Lily

    2011-01-01

    .... Compiled by food industry experts with a proven track record of producing high quality reference work, this volume is the definitive resource for technologists using food additives"-- "The use...

  1. Groups – Additive Notation

    Directory of Open Access Journals (Sweden)

    Coghetto Roland

    2015-06-01

    Full Text Available We translate the articles covering group theory already available in the Mizar Mathematical Library from multiplicative into additive notation. We adapt the works of Wojciech A. Trybulec [41, 42, 43] and Artur Korniłowicz [25].

  2. Food Additives and Hyperkinesis

    Science.gov (United States)

    Wender, Ester H.

    1977-01-01

    The hypothesis that food additives are causally associated with hyperkinesis and learning disabilities in children is reviewed, and available data are summarized. Available from: American Medical Association 535 North Dearborn Street Chicago, Illinois 60610. (JG)

  3. Additively Manufactured Propulsion System

    OpenAIRE

    Dushku, Matthew; Mueller, Paul

    2012-01-01

    New high-performance, carbon-fiber reinforced polymer material allows additive manufacturing to produce pressure vessels capable of high pressures (thousands of pounds per square inch). This advancement in turn allows integral hybrid propulsion which is revolutionary for both CubeSats and additively-manufactured spacecraft. Hybrid propulsion offers simplicity as compared to bipropellant liquid propulsion, significantly better safety compared to solid or monopropellant hydrazine propulsion, an...

  4. Biocoder: A programming language for standardizing and automating biology protocols

    Directory of Open Access Journals (Sweden)

    Thies William

    2010-11-01

    Full Text Available Abstract Background Published descriptions of biology protocols are often ambiguous and incomplete, making them difficult to replicate in other laboratories. However, there is increasing benefit to formalizing the descriptions of protocols, as laboratory automation systems (such as microfluidic chips are becoming increasingly capable of executing them. Our goal in this paper is to improve both the reproducibility and automation of biology experiments by using a programming language to express the precise series of steps taken. Results We have developed BioCoder, a C++ library that enables biologists to express the exact steps needed to execute a protocol. In addition to being suitable for automation, BioCoder converts the code into a readable, English-language description for use by biologists. We have implemented over 65 protocols in BioCoder; the most complex of these was successfully executed by a biologist in the laboratory using BioCoder as the only reference. We argue that BioCoder exposes and resolves ambiguities in existing protocols, and could provide the software foundations for future automation platforms. BioCoder is freely available for download at http://research.microsoft.com/en-us/um/india/projects/biocoder/. Conclusions BioCoder represents the first practical programming system for standardizing and automating biology protocols. Our vision is to change the way that experimental methods are communicated: rather than publishing a written account of the protocols used, researchers will simply publish the code. Our experience suggests that this practice is tractable and offers many benefits. We invite other researchers to leverage BioCoder to improve the precision and completeness of their protocols, and also to adapt and extend BioCoder to new domains.

  5. Biocoder: A programming language for standardizing and automating biology protocols.

    Science.gov (United States)

    Ananthanarayanan, Vaishnavi; Thies, William

    2010-11-08

    Published descriptions of biology protocols are often ambiguous and incomplete, making them difficult to replicate in other laboratories. However, there is increasing benefit to formalizing the descriptions of protocols, as laboratory automation systems (such as microfluidic chips) are becoming increasingly capable of executing them. Our goal in this paper is to improve both the reproducibility and automation of biology experiments by using a programming language to express the precise series of steps taken. We have developed BioCoder, a C++ library that enables biologists to express the exact steps needed to execute a protocol. In addition to being suitable for automation, BioCoder converts the code into a readable, English-language description for use by biologists. We have implemented over 65 protocols in BioCoder; the most complex of these was successfully executed by a biologist in the laboratory using BioCoder as the only reference. We argue that BioCoder exposes and resolves ambiguities in existing protocols, and could provide the software foundations for future automation platforms. BioCoder is freely available for download at http://research.microsoft.com/en-us/um/india/projects/biocoder/. BioCoder represents the first practical programming system for standardizing and automating biology protocols. Our vision is to change the way that experimental methods are communicated: rather than publishing a written account of the protocols used, researchers will simply publish the code. Our experience suggests that this practice is tractable and offers many benefits. We invite other researchers to leverage BioCoder to improve the precision and completeness of their protocols, and also to adapt and extend BioCoder to new domains.

  6. A localized coverage preserving protocol for wireless sensor networks.

    Science.gov (United States)

    Liu, Yuheng; Pu, Juhua; Zhang, Shuo; Liu, Yunlu; Xiong, Zhang

    2009-01-01

    In a randomly deployed and large scale wireless sensor network, coverage-redundant nodes consume much unnecessary energy. As a result, turning off these redundant nodes can prolong the network lifetime, while maintaining the degree of sensing coverage with a limited number of on-duty nodes. None of the off-duty eligibility rules in the literature, however, are sufficient and necessary conditions for eligible nodes. Hence redundancy or blind points might be incurred. In this paper we propose a complete Eligibility Rule based on Perimeter Coverage (ERPC) for a node to determine its eligibility for sleeping. ERPC has a computational complexity of O(N(2)log(N)), lower than the eligibility rule in the Coverage Control Protocol (CCP), O(N(3)), where N is the number of neighboring nodes. We then present a Coverage Preserving Protocol (CPP) to schedule the work state of eligible nodes. The main advantage of CPP over the Ottawa protocol lies in its ability to configure the network to any specific coverage degree, while the Ottawa protocol does not support different coverage configuration. Moreover, as a localized protocol, CPP has better adaptability to dynamic topologies than centralized protocols. Simulation results indicate that CPP can preserve network coverage with fewer active nodes than the Ottawa protocol. In addition, CPP is capable of identifying all the eligible nodes exactly while the CCP protocol might result in blind points due to error decisions. Quantitative analysis and experiments demonstrate that CPP can extend the network lifetime significantly while maintaining a given coverage degree.

  7. A Localized Coverage Preserving Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yuheng Liu

    2009-01-01

    Full Text Available In a randomly deployed and large scale wireless sensor network, coverage-redundant nodes consume much unnecessary energy. As a result, turning off these redundant nodes can prolong the network lifetime, while maintaining the degree of sensing coverage with a limited number of on-duty nodes. None of the off-duty eligibility rules in the literature, however, are sufficient and necessary conditions for eligible nodes. Hence redundancy or blind points might be incurred. In this paper we propose a complete Eligibility Rule based on Perimeter Coverage (ERPC for a node to determine its eligibility for sleeping. ERPC has a computational complexity of O(N2log(N, lower than the eligibility rule in the Coverage Control Protocol (CCP, O(N3, where N is the number of neighboring nodes. We then present a Coverage Preserving Protocol (CPP to schedule the work state of eligible nodes. The main advantage of CPP over the Ottawa protocol lies in its ability to configure the network to any specific coverage degree, while the Ottawa protocol does not support different coverage configuration. Moreover, as a localized protocol, CPP has better adaptability to dynamic topologies than centralized protocols. Simulation results indicate that CPP can preserve network coverage with fewer active nodes than the Ottawa protocol. In addition, CPP is capable of identifying all the eligible nodes exactly while the CCP protocol might result in blind points due to error decisions. Quantitative analysis and experiments demonstrate that CPP can extend the network lifetime significantly while maintaining a given coverage degree.

  8. Protocol Natuurplan voor biologische landbouwbedrijven.

    NARCIS (Netherlands)

    Smeding, F.W.

    1996-01-01

    The Protocol Nature Plan is a step by step approach leading to the design of a Nature Plan for a biological farm. The aim is to increase nature values and ecological relationships on the farm. Research results are translated into easy practical measures

  9. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    Compos- able framework by Canetti for specifying and analysing protocols, and show that our model is sound with respect to its standard computational interpretation. Our model supports powerful primitives such as homomorphic encryption and non-interactive zero-knowledge proofs, which we show may be used...

  10. Automata-theoretic protocol programming

    NARCIS (Netherlands)

    Jongmans, Sung-Shik Theodorus Quirinus

    2016-01-01

    Parallel programming has become essential for writing scalable programs on general hardware. Conceptually, every parallel program consists of workers, which implement primary units of sequential computation, and protocols, which implement the rules of interaction that workers must abide by. As progr

  11. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  12. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...

  13. The Kyoto Protocol and China

    Institute of Scientific and Technical Information of China (English)

    佘巧云

    2005-01-01

    The kyoto Protocol is an agreement to the United Nations Framework Convention on CLimate Change (UNFCCC)2,an international treaty on global warming .It is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by an average of 5.2% compared to the level of 1990 during the 2008-12 period.

  14. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrat...

  15. Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2004-01-01

    This paper introduces a process calculus with recursion which allows us to express an unbounded number of runs of the ping-pong protocols introduced by Dolev and Yao. We study the decidability issues associated with two common approaches to checking security properties, namely reachability analys...

  16. Probability Distributions over Cryptographic Protocols

    Science.gov (United States)

    2009-06-01

    exception. Cryptyc integrates use of pattern- matching in the spi calculus framework , which in turn allows the specification of nested cryptographic...programs too: the metaheuristic search for security protocols,” Information and Software Technology, vol. 43, pp. 891– 904, December 2001. 131 [9] X

  17. Metabolomics protocols for filamentous fungi.

    Science.gov (United States)

    Gummer, Joel P A; Krill, Christian; Du Fall, Lauren; Waters, Ormonde D C; Trengove, Robert D; Oliver, Richard P; Solomon, Peter S

    2012-01-01

    Proteomics and transcriptomics are established functional genomics tools commonly used to study filamentous fungi. Metabolomics has recently emerged as another option to complement existing techniques and provide detailed information on metabolic regulation and secondary metabolism. Here, we describe broad generic protocols that can be used to undertake metabolomics studies in filamentous fungi.

  18. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    BACKGROUND: Unacknowledged inconsistencies in the reporting of clinical trials undermine the validity of the results of the trials. Little is known about inconsistency in the reporting of academic clinical drug trials. Therefore, we investigated the prevalence of consistency between protocols and...

  19. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  20. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  1. Protocol biopsies for renal transplantation

    Directory of Open Access Journals (Sweden)

    Rush David

    2010-01-01

    Full Text Available Protocol biopsies in renal transplantation are those that are procured at predetermined times post renal transplantation, regardless of renal function. These biopsies have been useful to study the natural history of the transplanted kidney as they have detected unexpected - i.e. "subclinical" pathology. The most significant subclinical pathologies that have been detected with protocol biopsies have been acute lesions, such as cellular and antibody mediated rejection, and chronic lesions, such as interstitial fibrosis and tubular atrophy, and transplant glomerulopathy. The potential benefit of early recognition of the above lesions is that their early treatment may result in improved long-term outcomes. Conversely, the identification of normal histology on a protocol biopsy, may inform us about the safety of reduction in overall immunosuppression. Our centre, as well as others, is attempting to develop non-invasive methods of immune monitoring of renal transplant patients. However, we believe that until such methods have been developed and validated, the protocol biopsy will remain an indispensable tool for the complete care of renal transplant patients.

  2. Formally Generating Adaptive Security Protocols

    Science.gov (United States)

    2013-03-01

    a proven version of leader election and 2/3 consensus. In 2011 we did the same for a simple version of Paxos. At each stage of the evolution as our... leader election [2] and authentication [4] would suffice for Paxos as well. In preparation for the harder protocols, we had added expressive power to the

  3. Additive Manufacturing Infrared Inspection

    Science.gov (United States)

    Gaddy, Darrell

    2014-01-01

    Additive manufacturing is a rapid prototyping technology that allows parts to be built in a series of thin layers from plastic, ceramics, and metallics. Metallic additive manufacturing is an emerging form of rapid prototyping that allows complex structures to be built using various metallic powders. Significant time and cost savings have also been observed using the metallic additive manufacturing compared with traditional techniques. Development of the metallic additive manufacturing technology has advanced significantly over the last decade, although many of the techniques to inspect parts made from these processes have not advanced significantly or have limitations. Several external geometry inspection techniques exist such as Coordinate Measurement Machines (CMM), Laser Scanners, Structured Light Scanning Systems, or even traditional calipers and gages. All of the aforementioned techniques are limited to external geometry and contours or must use a contact probe to inspect limited internal dimensions. This presentation will document the development of a process for real-time dimensional inspection technique and digital quality record of the additive manufacturing process using Infrared camera imaging and processing techniques.

  4. Alternative additives; Alternative additiver

    Energy Technology Data Exchange (ETDEWEB)

    2007-08-15

    In this project a number of industrial and agricultural waste products have been characterised and evaluated in terms of alkali-getter performance. The intended use is for biomass-fired power stations aiming at reducing corrosion or slagging related problems. The following products have been obtained, characterised and evaluated: 1) Brewery draff 2) Danish de-gassed manure 3) Paper sludge 4) Moulding sand 5) Spent bleaching earth 6) Anorthosite 7) Sand 8) Clay-sludge. Most of the above alternative additive candidates are deemed unsuitable due to insufficient chemical effect and/or expensive requirements for pre-treatment (such as drying and transportation). 3 products were selected for full-scale testing: de-gassed manure, spent bleaching earth and clay slugde. The full scale tests were undertaken at the biomass-fired power stations in Koege, Slagelse and Ensted. Spent bleaching earth (SBE) and clay sludge were the only tested additive candidates that had a proven ability to react with KCl, to thereby reduce Cl-concentrations in deposits, and reduce the deposit flux to superheater tubes. Their performance was shown to nearly as good as commercial additives. De-gassed manure, however, did not evaluate positively due to inhibiting effects of Ca in the manure. Furthermore, de-gassed manure has a high concentration of heavy metals, which imposes a financial burden with regard to proper disposal of the ash by-products. Clay-sludge is a wet clay slurring, and drying and transportation of this product entails substantial costs. Spent bleaching does not require much pre-treatment and is therefore the most promising alternative additive. On the other hand, bleaching earth contains residual plant oil which means that a range of legislation relating to waste combustion comes into play. Not least a waste combustion fee of 330 DKK/tonne. For all alternative (and commercial) additives disposal costs of the increase ash by-products represents a significant cost. This is

  5. From additivity to synergism

    DEFF Research Database (Denmark)

    Ritz, Christian; Streibig, Jens Carl

    2014-01-01

    Interest in synergistic or antagonistic effects through mixture experiments has grown immensely over the past two decades, not the least within in pharmacology and toxicology. Several definitions of reference models exist; one commonly used reference model is concentration or dose addition, which...... assumes compounds, when administrated simultaneously, do not interfere with each other at the site of action. We focus on statistical modelling that allows evaluation of dose addition. We will describe several statistical approaches that are suitable for analysis mixture data where synergistic...... or antagonistic effects may be present. The statistical models are defined and explained and some of the approaches exemplified. Code in open-source software is provided....

  6. Additives for the Axe

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    On May 1,China will begin to ban the production and use of two food additives commonly used to "bleach" flour,benzoyl peroxide and calcium peroxide.The decision was made after 10 years of wrangling between the policy makers,manufacturers,scientists and consumers.The Ministry of Health said in a statement it was applying the ban in response to consumers’ concerns about chemical substances in food,and technical improvements that had made the two additives unnecessary in flour processing.Minister of Health Chen Zhu has also said

  7. Alcohols as gasoline additives

    Energy Technology Data Exchange (ETDEWEB)

    Jawetz, P.

    1982-12-01

    This paper showed that, when using alcohol octane-boosting additives to gasoline, one attains several goals at the same time: (a) there is an increased saving in petroleum crude, since the alcohol is not merely a substitute for gasoline but rather a substitute for the octane-boosting additives used in the manufacture of unleaded gasoline; and (b) the production of fermentation ethanol for a fuel purpose can help revitalize the agricultural sector in different economics systems, thus becoming a road to economic development.

  8. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  9. Does Glucagon Improve Survival in a Porcine (Sus Scrofa) of Adult Asphyxial Cardiac Arrest in Addition to Standard Epinephrine Therapy?

    Science.gov (United States)

    2012-01-17

    UDIIILI: oa. I..UN I ItA!.. I NUMDI:It Does Glucagon improve survival in a porcine (Sus Scrofa ) of adult asphyxial cardiac arrest in addition to...EXPIRATION DATE: 25 Mar 13 PROTOCOL TITLE: Does Glucagon Improve Survival in a Porcine (Sus scrofa ) Model of Adult Asphyxial Cardiac Arrest in Addition...Additions: Deletions: 2 Protocol No: A-2007-03 Protocol Title: Does Glucagon Improve Survival in a Porcine (Sus scrofa ) Model of Adult Asphyxial

  10. Biobased lubricant additives

    Science.gov (United States)

    Fully biobased lubricants are those formulated using all biobased ingredients, i.e. biobased base oils and biobased additives. Such formulations provide the maximum environmental, safety, and economic benefits expected from a biobased product. Currently, there are a number of biobased base oils that...

  11. Novel analysis and improvement of Yahalom protocol

    Institute of Scientific and Technical Information of China (English)

    CHEN Chun-ling; YU Han; L(U) Heng-shan; WANG Ru-chuan

    2009-01-01

    The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a novel method of analyzing protocol's security. First, a mathematical model of BAN-Yahalom protocol is constructed. Second, penetrators' abilities are restricted with a rigorous and formalized definition. Moreover, to increase the security of this protocol against potential attackers in practice, a further improvement is made to the protocol. Future application of this re-improved protocol is also discussed.

  12. Performance Evaluation of MANET Routing Protocols Based on Internet Protocols

    Directory of Open Access Journals (Sweden)

    Hilal Bello Said,

    2015-11-01

    Full Text Available The topology of mobile ad hoc network (MANET changes rapidly and unpredictably due to nodes mobility. This makes routing protocols very important to analyze so as to communicate efficiently between the wireless nodes. Another important issue in the MANET is the internet protocols IPv4 and IPV6. The former which have been conventionally in use for long and the latter which is seen as the future standard for network architecture is studied due to its improved protection and huge address space support. In this paper, performance of AODV, DYMO, OLSRv2 and OLSR are analyzed under the IPv4 and IPv6 standards using the Qualnet simulator. Distinct performance metrics viz. Packet delivery ratio, Throughput, Average End-to-End Delay, and Average jitter are selected for the experiment. The results are then analyzed and scrutinized to provide qualitative assessment of their performances.

  13. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  14. RTnet: a real-time protocol for broadcast-capable networks

    NARCIS (Netherlands)

    Hanssen, Ferdy; Jansen, Pierre G.; Scholten, Hans; Hattink, Tjalling

    2004-01-01

    This paper presents an overview of a real-time network protocol, meant to be used on fully-connected local area networks with a broadcast capability. The intended use of this protocol is an in-home digital network, with support for on-the-fly addition and removal of network nodes, for resource-lavis

  15. KoralQuery -- A General Corpus Query Protocol

    DEFF Research Database (Denmark)

    Bingel, Joachim; Diewald, Nils

    2015-01-01

    The task-oriented and format-driven development of corpus query systems has led to the creation of numerous corpus query languages (QLs) that vary strongly in expressiveness and syntax. This is a severe impediment for the interoperability of corpus analysis systems, which lack a common protocol....... In this paper, we present KoralQuery, a JSON-LD based general corpus query protocol, aiming to be independent of particular QLs, tasks and corpus formats. In addition to describing the system of types and operations that KoralQuery is built on, we exemplify the representation of corpus queries in the serialized...

  16. Numerical analysis of decoy state quantum key distribution protocols

    Energy Technology Data Exchange (ETDEWEB)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  17. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    Science.gov (United States)

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-09-08

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency.

  18. Fibred Coalgebraic Logic and Quantum Protocols

    Directory of Open Access Journals (Sweden)

    Daniel Marsden

    2014-12-01

    Full Text Available Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

  19. SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    RAVIKIRAN PEELUKHANA,

    2011-04-01

    Full Text Available The cloud virtualization technology improves the economy of scale for data centers through server consolidation, application consolidation and resources consolidation. Virtualization allows the provider to move Virtual Images from more congested host to less-congested hosts, as required. Enterprises also get improved server reliability, which in turn increases application performance. Despite these benefits, it includes major security challenges with the portability of Virtual Images between different cloud providers.The security and integrity of Virtual images is the foundation for the overall security of the cloud. Many of the Virtual images are intended to be shared by diverse and unrelated users. Unfortunately, existing approaches to cloud security built by cloud practitioners fall short when dealing with Virtual images. Secure transmission of virtual Images can bepossible by providing authentication using Blind Authentication protocol (BAP. The proposed approach authenticates the allocation of virtual images using Blind authentication protocol. It provides provable protection against replay and client side attacks even if the keys of the user are compromised. The encryption also provides template protection, revocability and alleviates the concerns on privacy in widespread use of biometrics. Carrying out the authentication in the encrypted domain is a secure process, while the encryption key acts as an additional layer of security.

  20. Identity-based authenticated key exchange protocols from the Tate pairing

    Science.gov (United States)

    Shen, Jun; Jin, Hong; Yang, Zhiyong; Cui, Xiang

    2011-12-01

    Key agreement protocols are designed to establish a session keys between two or multiple entities oven an insecure network and the session key is used to assure confidentiality thought encryption. With the advantages of identity-based (ID-based) cryptography, there have been many ID-based key agreement protocols proposed. However, most of them are based on Weil pairing, which is more cost of computation compared with Tate paring. In this paper, we propose a newly ID-based key agreement protocol from the Tate pairing. Compared with previous protocols, the new protocol minimizes the cost of computation with no extra message exchange time. In addition, the proposed protocol provides known key security, no key control, no key-compromise impersonation and perfect forward secrecy.

  1. Chapter 14: Chiller Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  2. An Introduction to Population Protocols

    Science.gov (United States)

    Aspnes, James; Ruppert, Eric

    Population protocols are used as a theoretical model for a collection (or population) of tiny mobile agents that interact with one another to carry out a computation. The agents are identically programmed finite state machines. Input values are initially distributed to the agents, and pairs of agents can exchange state information with other agents when they are close together. The movement pattern of the agents is unpredictable, but subject to some fairness constraints, and computations must eventually converge to the correct output value in any schedule that results from that movement. This framework can be used to model mobile ad hoc networks of tiny devices or collections of molecules undergoing chemical reactions. This chapter surveys results that describe what can be computed in various versions of the population protocol model.

  3. Kioto protocol; Protocolo de Kioto

    Energy Technology Data Exchange (ETDEWEB)

    Romero, A.

    2005-07-01

    Atmospheric contamination by greenhouse gases is a global problem, and thus its solution requires global measures. Although the consequences of climate change are questioned and the foreseeable effects are not excessively serious, there are plenty of scientific reasons for all countries to make the necessary efforts to meet the objectives established by the Kyoto Protocol of reducing the six greenhouse gases over the period 2008-2012. Therefore, it seems essential that we understand the nature of the transformation that are occurring in the different systems, what changes they are causing and what costs they incur. Independently of its effectiveness and realism, the Kyoto Protocol is the first regulatory step in the direction of globalization in the environmental field. (Author)

  4. Towards a transferable and cost-effective plant AFLP protocol.

    Directory of Open Access Journals (Sweden)

    Marguerite Blignaut

    Full Text Available Amplified fragment length polymorphism (AFLP is a powerful fingerprinting technique that is widely applied in ecological and population genetic studies. However, its routine use has been limited by high costs associated with the optimization of fluorescently labelled markers, especially for individual study systems. Here we develop a low-cost AFLP protocol that can be easily transferred between distantly related plant taxa. Three fluorescently labelled EcoRI-primers with anchors that target interspecifically conserved genomic regions were used in combination with a single non-labelled primer in our AFLP protocol. The protocol was used to genotype one gymnosperm, two monocot and three eudicot plant genera representing four invasive and four native angiosperm species (Pinus pinaster (Pinaceae, Pennisetum setaceum and Poa annua (Poaceae, Lantana camara (Verbenaceae, Bassia diffusa (Chenopodiaceae, Salvia lanceolata, Salvia africana-lutea, and Salvia africana-caerulea (Lamiaceae. Highly polymorphic and reproducible genotypic fingerprints (between 37-144 polymorphic loci per species tested were obtained for all taxa tested. Our single protocol was easily transferred between distantly related taxa. Measures of expected heterozygosity ranged from 0.139 to 0.196 for P. annua and from 0.168 to 0.272 for L. camara which compared well with previously published reports. In addition to ease of transferability of a single AFLP protocol, our protocol reduces costs associated with commercial kits by almost half. The use of highly conserved but abundant anchor sequences reduces the need for laborious screening for usable primers that result in polymorphic fingerprints, and appears to be the main reason for ease of transferability of our protocol between distantly related taxa.

  5. Towards a transferable and cost-effective plant AFLP protocol.

    Science.gov (United States)

    Blignaut, Marguerite; Ellis, Allan G; Le Roux, Johannes J

    2013-01-01

    Amplified fragment length polymorphism (AFLP) is a powerful fingerprinting technique that is widely applied in ecological and population genetic studies. However, its routine use has been limited by high costs associated with the optimization of fluorescently labelled markers, especially for individual study systems. Here we develop a low-cost AFLP protocol that can be easily transferred between distantly related plant taxa. Three fluorescently labelled EcoRI-primers with anchors that target interspecifically conserved genomic regions were used in combination with a single non-labelled primer in our AFLP protocol. The protocol was used to genotype one gymnosperm, two monocot and three eudicot plant genera representing four invasive and four native angiosperm species (Pinus pinaster (Pinaceae), Pennisetum setaceum and Poa annua (Poaceae), Lantana camara (Verbenaceae), Bassia diffusa (Chenopodiaceae), Salvia lanceolata, Salvia africana-lutea, and Salvia africana-caerulea (Lamiaceae)). Highly polymorphic and reproducible genotypic fingerprints (between 37-144 polymorphic loci per species tested) were obtained for all taxa tested. Our single protocol was easily transferred between distantly related taxa. Measures of expected heterozygosity ranged from 0.139 to 0.196 for P. annua and from 0.168 to 0.272 for L. camara which compared well with previously published reports. In addition to ease of transferability of a single AFLP protocol, our protocol reduces costs associated with commercial kits by almost half. The use of highly conserved but abundant anchor sequences reduces the need for laborious screening for usable primers that result in polymorphic fingerprints, and appears to be the main reason for ease of transferability of our protocol between distantly related taxa.

  6. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    used to give a formal semantics to security protocols which supports proofs of their correctness. More precisely, we give a compositional event-based semantics to an economical, but expressive, language for describing security protocols (SPL); so the events and dependency of a wide range of protocols......Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  7. Hospital Protocol Helps Thwart Serious Infection

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_165911.html Hospital Protocol Helps Thwart Serious Infection Study finds faster ... News) -- A new regulation requires New York state hospitals to follow a protocol to rapidly diagnosis and ...

  8. Automatic analysis of distance bounding protocols

    CERN Document Server

    Malladi, Sreekanth; Kothapalli, Kishore

    2010-01-01

    Distance bounding protocols are used by nodes in wireless networks to calculate upper bounds on their distances to other nodes. However, dishonest nodes in the network can turn the calculations both illegitimate and inaccurate when they participate in protocol executions. It is important to analyze protocols for the possibility of such violations. Past efforts to analyze distance bounding protocols have only been manual. However, automated approaches are important since they are quite likely to find flaws that manual approaches cannot, as witnessed in literature for analysis pertaining to key establishment protocols. In this paper, we use the constraint solver tool to automatically analyze distance bounding protocols. We first formulate a new trace property called Secure Distance Bounding (SDB) that protocol executions must satisfy. We then classify the scenarios in which these protocols can operate considering the (dis)honesty of nodes and location of the attacker in the network. Finally, we extend the const...

  9. DSTC Layering Protocols in Wireless Cooperative Networks

    CERN Document Server

    Elamvazhuthi, P S; Dey, B K

    2008-01-01

    In adhoc wireless relay networks, layers of relays are used to communicate from a source to a destination to achieve better reliability. In this paper, we consider five protocols derived from an earlier proposed protocol, where the relays do a simple processing before transmitting and as a result achieve distributed space-time code. Four of the protocols discussed utilize more complicated relaying schemes than simple layered protocols proposed in earlier literature. We have analyzed the effectiveness of these protocols in various power loss configurations among the paths. Optimum power allocation of the total power among various transmissions have been found by reasonable fine search for all the protocols. Bit error rate plots are compared under optimum power allocation for these protocols. From the simulation results, we draw some guidelines as to which protocol is good for what kind of environment.

  10. The reliable multicast protocol application programming interface

    Science.gov (United States)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  11. TWO PRIVACY-PRESERVING PROTOCOLS FOR POINT-CURVE RELATION

    Institute of Scientific and Technical Information of China (English)

    Liu Liang; Wu Chunying; Li Shundong

    2012-01-01

    Numerous privacy-preserving issues have emerged along with the fast development of Internet,both in theory and in real-life applications.To settle the privacy-preserving problems,secure multi-party computation is essential and critical.In this paper,we have solved two problems regarding to how to determine the position relation between points and curves without revealing any private information.Two protocols have been proposed in order to solve the problems in different conditions.In addition,some building blocks have been developed,such as scalar product protocol,so that we can take advantage of them to settle the privacy-preserving computational geometry problems which are a kind of special secure multi-party computation problems.Moreover,oblivious transfer and power series expansion serve as significant parts in our protocols.Analyses and proofs have also been given to argue our conclusion.

  12. A Signcryption based Light Weight Key Exchange Protocol

    Science.gov (United States)

    Feng, Yong; Wei, Qian; Zhang, Xing

    Traditional cryptography based authenticated Diffie-Hellman key exchange protocols expose the problems of efficiency and privacy since signature-then-encryption is heavy to wireless communication special for flexible dynamic deployment, i.e., wireless mesh networks, wireless sensor networks, mobile ad hoc networks, etc., in computational cost and communicational overhead and traditional digital signature allows anyone to verify its validity using the corresponding public key. In this paper, we propose a signcryption based light weight key exchange protocol named SLWKE which can provide resistance to traditional attacks, i.e., eavesdropping, deducing, replaying, interleaving, forging and repudiating, and unknown key-share attack and save computational cost by three modular calculations, i.e., one modular inversion, one modular addition and one modular multiplicative, included in a signature s and communicational overhead by secure length of IqI in comparison to signcryption based direct key exchange using a time-stamp protocol termed Dkeuts.

  13. Micro-ANP Network Protocol Architecture and Simulation Implementation

    Directory of Open Access Journals (Sweden)

    DU Xiujuan

    2013-04-01

    Full Text Available Due to the unique characteristics of underwater sensor network (UWSN, conventional network protocols for terrestrial WSN are unable to satisfy the performance of UWSN. In addition, the limits of energy, CPU and memory of UWSN nodes demand the protocol stack running on them should be simple and efficient. The paper proposed a Micro-ANP protocol architecture model for UWSN, which are three layered including application layer, network-transport layer and physical layer, optimized packet size using three objective functions: packet throughput, energy consumption and resource consumption under Micro-ANP architecture by means of MATLAB, designed and implemented UWSN simulation platform based on Micro-ANP and QualNet software, lay a solid foundation for further research on underwater sensor network.

  14. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  15. New Models for Protocol Security

    Science.gov (United States)

    2015-06-18

    protocols and primitives (e.g., Schnorrs identification scheme, commitment schemes secure against selective openings, Chaum Blind Signatures , etc...Theory 156: 246-268 (2015) 5 3. Samantha Leung, Edward Lui, Rafael Pass: Voting with Coarse Beliefs. ITCS 2015: 61 4. Jing Chen, Silvio Micali, Rafael...Schneider: Multi-Verifier Signatures . J. Cryptology 25(2): 310-348 (2012) 7 37. Rafael Pass, Muthuramakrishnan Venkitasubramaniam: A Parallel Repetition

  16. Heuristic Methods for Security Protocols

    Directory of Open Access Journals (Sweden)

    Qurat ul Ain Nizamani

    2009-10-01

    Full Text Available Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  17. Heuristic Methods for Security Protocols

    OpenAIRE

    Qurat ul Ain Nizamani; Emilio Tuosto

    2009-01-01

    Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  18. Security Verification of Secure MANET Routing Protocols

    Science.gov (United States)

    2012-03-22

    the destination. The route discovery phase is complete upon receipt of the RREP at the requesting node. The DYMO protocol is a simpler version of AODV ...described in this appendix. The protocols are Secure AODV (SAODV), Secure Efficient Distance Vector (SEAD), and Secure Link State Routing Protocol (SLSP...SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ENG/12-03 DEPARTMENT OF THE AIR FORCE AIR

  19. ACSEPP On-Line Electronic Payment Protocol

    Institute of Scientific and Technical Information of China (English)

    WANG Shao-bin; ZHU Xian; HONG Fan

    2004-01-01

    With analyzing the existing on-line electronic payment protocols, this paper presents a new on-line electronic payment protocol named ACSEPP: Anonymous, Convenient and Secure Electronic Payment Protocol.Its aim is to design a practical electronic payment protocol which is both secure and convenient.Without using PKI_CA frame, it realized the anonymity of consumer and merchant, the convenient of handling, the low cost of maintenance and the security.

  20. A father protocol for quantum broadcast channels

    CERN Document Server

    Dupuis, F; Dupuis, Fr\\'ed\\'eric; Hayden, Patrick

    2006-01-01

    We present a new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communication. Regularized versions of all three rate regions are provably optimal.

  1. Model checking the HAVi leader election protocol

    OpenAIRE

    Romijn, J.M.T.

    1999-01-01

    The HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the tools Spin and Xtl (from the Caesar/Aldebaran package). It turns out that the protocol does not meet some safety properties and that there are situations in which the protocol may never converge to designate a l...

  2. PEMBIAYAAN RESTRUKTURISASI INDUSTRI BUS PERKOTAAN SESUAI DENGAN KERANGKA KERJA PROTOKOL KYOTO (Funding for Industrial Restructuring Urban Bus Industry following Kyoto Protocol

    Directory of Open Access Journals (Sweden)

    Danang Parikesit

    2002-07-01

    Full Text Available ABSTRAK Sektor transportasi, khususnya sektor angkutan umum telah lama disadari sebagai kontributor utama emisi gas rumah kaca (Green House Gases Emissions. Investasi pada angkutan umum perkotaan sangat dibutuhkan walaupun pembiayaan yang konvensional sering sulit dilakukan karena tingginya tingkat investasi dan prioritas pemerintah saat ini. Angkutan perkotaan juga dilihat sebagai daerah kekuasaan sektor swasta yang membuat pemerintah sulit untuk mengeluarkan uang publik. Ratifikasi Kyoto Protocol telah memberi jalan untuk mengembangkan alternatif pembiayaan untuk pembangunan yang berkelanjutan. Clean Development Mechanism pada Kyoto Protocol telah membuka kesempatan bagi otoritas angkutan umum perkotaan dengan menggunakan prinsip carbon trading. Sumber daya untuk menerapkan proyek angkutan umum perkotaan dengan CDM sangat esensial. Pekerjaan di masa datang harus diarahkan untuk mempelajari metodologi dalam mengkombinasi soft measures dan melaksanakan proyek secara optimal. Pembiayaan dengan sistem CDM ini telah dimulai di Yogyakarta dengan judul The Green House Gases Emission Reduction Program for Urban Buses in Yogyakarta atau Program Penurunan Emisi Gas Rumah Kaca untuk Bus Perkotaan di Yogyakarta. Sebuah aliansi dengan nama YUPTA (Yogyakarta Urban Public Transport Alliance telah dibentuk yang terdiri dari 3 lembaga yaitu Dinas Perhubungan Propinsi DIY, Pusat Studi Transportasi dan Logistik (PUSTRAL UGM dan Koperasi Pengusaha Angkutan Kota Yogyakarta (KOPATA.   ABSTRACT Transportation sector, especially public transportation, has been known as the main contributor to the green house hases emission. Investment to urban public transportation is needed but conventional funding is often difficult to be obtained because of the high investment level and the present government priority. Urban transportation is also seen as a private sector domain making the government difficult to use public fund. Kyoto protocol ratification has opened the way to

  3. 3DMRP: 3-Directional Zone-Disjoint Multipath Routing Protocol

    Science.gov (United States)

    Shin, Dongseung; Kim, Dongkyun

    In static wireless ad hoc networks such as wireless mesh networks and wireless sensor networks, multipath routing techniques are very useful for improving end-to-end delay, throughput, and load balancing, as compared to single-path routing techniques. When determining multiple paths, however, multipath routing protocols should address the well-known route coupling problem that results from a geographic proximity of adjacent routes and that hampers performance gain. Although a lot of multipath routing protocols have been proposed, most of them focused on obtaining node or link-disjoint multipaths. In order to address the route coupling problem, some multipath routing protocols utilizing zone-disjointness property were proposed. However, they suffer from an overhead of control traffic or require additional equipment such as directional antenna. This paper therefore proposes a novel multipath routing protocol, based on geographical information with low overhead, called 3-directional zone-disjoint multipath routing protocol (3DMRP). 3DMRP searches up to three zone-disjoint paths by using two techniques: 1) greedy forwarding, and 2) RREP-overhearing. One primary and two secondary paths are obtained via greedy forwarding in order to reduce control overhead, and these secondary paths are found by avoiding the RREP overhearing zone created during the primary path acquisition. In particular, two versions of 3DMRP are introduced in order to avoid the RREQ-overhearing zone. Through ns-2 simulations, 3DMRP is evaluated to verify that it achieves performance improvements in terms of throughput and control overhead.

  4. Mean Response Time Approximation for HTTP Transactions over Transport Protocols

    Directory of Open Access Journals (Sweden)

    Y. J. Lee

    2014-12-01

    Full Text Available This paper addresses mean response time that end-users experience when using the Internet. HTTP (Hyper Text Transfer Protocol is a widely used transfer protocol to retrieve web objects in the Internet. Generally, HTTP uses TCP (Transmission Control Protocol in a transport layer. But it is known that HTTP interacts with TCP inefficiently. As an example of such inefficiencies, HTTP does not require TCP to deliver the rigid order, which may cause head-of-line blocking. As another transport layer protocol, SCTP (Stream Control Transmission Protocol has attractive features such as multi-streaming and multi-homing unlike TCP. Within an SCTP association, multi-streaming allows for independent delivery among streams, thus can avoid the head-of-line blocking. In addition, SCTP provides very large number of streams; therefore, it can transfer multiple objects more efficiently than the typical HTTP/1.1 over TCP which limits the number of pipelines. Mean response time is one of the main measures that end users using Internet concern. This paper presents the simple analytical model and algorithm to find the mean response time for HTTP over SCTP including the previous HTTP over TCP. Some computational experiences show that the proposed model and algorithm are well approximated to the real environment. Also, it is shown that mean response time for HTTP over SCTP can be less than that for HTTP over TCP.

  5. New dimensions in SNMP Protocol in Romania

    Directory of Open Access Journals (Sweden)

    Alice Nastovici

    2009-06-01

    Full Text Available In this year 2009, after e-finance shock made in each banks who worked with Simple NetworkManagement Protocol (SNMP default community string and vulnerability:- If you do not absolutely require SNMP, disable it- If you must use SNMP, use the same policy for community names as used for passwords.Make sure that they are difficult to guess or crack and that they are chanced periodically- Validate and check community names using SNMPwalk. Additional information can be foundat http://www.2nd.com/functionSNMPwalk.php- Filter SNMP (port 161/udp at the border-router or firewall unless it is absolutely necessary topool or manage devices from outside of the local network, where possible read-only

  6. A simulation of the FASTBUS protocols

    CERN Document Server

    Booth, A W

    1981-01-01

    FASTBUS is a standard bus system being developed for high speed data acquisition and processing in the next generation of large scale physics experiments. Prototypes are being built according to a draft specification. The FASTBUS protocols have been simulated using a powerful software tool which is a computer description language. This Instruction Set Processor Specification language, ISPS, has been used in the design and development of several microprocessor systems. Its applications are diverse, including automated design and the generation of machine relative software, as well as simulation. The results of the FASTBUS simulation are presented, with an overview of the ISPS hardware description language. An additional facility is discussed, which supplements the simulation by providing a visual presentation of the FASTBUS signals, that is, a timing-graph generator.

  7. Cognitive Radio MAC Protocol for WLAN

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    To solve the performance degradation issue in current WLAN caused by the crowded unlicensed spectrum, we propose a cognitive radio (CR) media access protocol, C-CSMA/CA. The basic idea is that with cognitive radio techniques the WLAN devices can not only access the legacy WLAN unlicensed spectrum...... hole; moreover, it designs dual inband sensing scheme to detect primary user appearance. Additionally, C-CSMA/CA has the advantage to effectively solve the cognitive radio self-coexistence issues in the overlapping CR BSSs scenario. It also realizes station-based dynamic resource selection...... and utilization. It is compatible with any legacy WLAN (BSS) system. We develop and implement the simulation of C-CSMA/CA by OPNET. The simulation results show that C-CSMA/CA highly enhances throughput and reduces the queuing delay and media access delay....

  8. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know th...

  9. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol is formali...

  10. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  11. Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach

    Directory of Open Access Journals (Sweden)

    Meenakshi Sharma

    2012-10-01

    Full Text Available This paper gives a brief description about some routing protocols like EEE LEACH, LEACH and DirectTransmission protocol (DTx in Wireless Sensor Network (WSN and a comparison study of theseprotocols based on some performance matrices. Addition to this an attempt is done to calculate theirtransmission time and throughput. To calculate these, MATLAB environment is used. Finally, on the basisof the obtained results from the simulation, the above mentioned three protocols are compared. Thecomparison results show that, the EEE LEACH routing protocol has a greater transmission time thanLEACH and DTx protocol and with smaller throughput

  12. Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach

    Directory of Open Access Journals (Sweden)

    Meenakshi Sharma

    2012-12-01

    Full Text Available This paper gives a brief description about some routing protocols like EEE LEACH, LEACH and DirectTransmission protocol (DTx in Wireless Sensor Network (WSN and a comparison study of theseprotocols based on some performance matrices. Addition to this an attempt is done to calculate theirtransmission time and throughput. To calculate these, MATLAB environment is used. Finally, on the basisof the obtained results from the simulation, the above mentioned three protocols are compared. Thecomparison results show that, the EEE LEACH routing protocol has a greater transmission time thanLEACH and DTx protocol and with smaller throughput.

  13. Low-cost, low-input RNA-seq protocols perform nearly as well as high-input protocols

    Directory of Open Access Journals (Sweden)

    Peter A. Combs

    2015-03-01

    Full Text Available Recently, a number of protocols extending RNA-sequencing to the single-cell regime have been published. However, we were concerned that the additional steps to deal with such minute quantities of input sample would introduce serious biases that would make analysis of the data using existing approaches invalid. In this study, we performed a critical evaluation of several of these low-volume RNA-seq protocols, and found that they performed slightly less well in per-gene linearity of response, but with at least two orders of magnitude less sample required. We also explored a simple modification to one of these protocols that, for many samples, reduced the cost of library preparation to approximately $20/sample.

  14. Sarks as additional fermions

    Science.gov (United States)

    Agrawal, Jyoti; Frampton, Paul H.; Jack Ng, Y.; Nishino, Hitoshi; Yasuda, Osamu

    1991-03-01

    An extension of the standard model is proposed. The gauge group is SU(2) X ⊗ SU(3) C ⊗ SU(2) S ⊗ U(1) Q, where all gauge symmetries are unbroken. The colour and electric charge are combined with SU(2) S which becomes strongly coupled at approximately 500 GeV and binds preons to form fermionic and vector bound states. The usual quarks and leptons are singlets under SU(2) X but additional fermions, called sarks. transform under it and the electroweak group. The present model explains why no more than three light quark-lepton families can exist. Neutral sark baryons, called narks, are candidates for the cosmological dark matter having the characteristics designed for WIMPS. Further phenomenological implications of sarks are analyzed i including electron-positron annihilation. Z 0 decay, flavor-changing neutral currents. baryon-number non-conservation, sarkonium and the neutron electric dipole moment.

  15. Perspectives on Additive Manufacturing

    Science.gov (United States)

    Bourell, David L.

    2016-07-01

    Additive manufacturing (AM) has skyrocketed in visibility commercially and in the public sector. This article describes the development of this field from early layered manufacturing approaches of photosculpture, topography, and material deposition. Certain precursors to modern AM processes are also briefly described. The growth of the field over the last 30 years is presented. Included is the standard delineation of AM technologies into seven broad categories. The economics of AM part generation is considered, and the impacts of the economics on application sectors are described. On the basis of current trends, the future outlook will include a convergence of AM fabricators, mass-produced AM fabricators, enabling of topology optimization designs, and specialization in the AM legal arena. Long-term developments with huge impact are organ printing and volume-based printing.

  16. Sequence Patterns of Identity Authentication Protocols

    Institute of Scientific and Technical Information of China (English)

    Tao Hongcai; He Dake

    2006-01-01

    From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication,and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then , according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.

  17. Analysing ZigBee Key Establishment Protocols

    CERN Document Server

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  18. Protocol independent transmission method in software defined optical network

    Science.gov (United States)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  19. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    of formal protocol verification. Verification, however, is usually carried out on an abstract model not at all related with a protocol’s implementation. Experience shows that security breaches introduced in implementations of successfully verified models are rather common. The χ-Spaces framework...... is an implementation of SPL (Security Protocol Language), a formal model for studying security protocols. In this paper we discuss the use of χ-Spaces as a tool for developing robust security protocol implementations. To make the case, we take a family of key-translation protocols due to Woo and Lam and show how χ......It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  20. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  1. Authenticating Tripartite Key Agreement Protocol with Pairings

    Institute of Scientific and Technical Information of China (English)

    Sheng-Li Liu; Fang-Guo Zhang; Ke-Fei Chen

    2004-01-01

    In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.

  2. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...... called SPS (Security Protocol Specification) language, that enables users, without requiring deep expertise in formal models from them, to specify a wide range of real-world protocols in a simple and intuitive way. Thus, SPS allows users to verify their protocols using different tools, and generate...

  3. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order......We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... to ensure the finiteness of the protocol state-spaces while still being able to verify interesting protocol properties. The translations for different kinds of communication media have been implemented and successfully tested, among others, on agreement protocols from WS-Business Activity....

  4. A Secure Short Message Communication Protocol

    Institute of Scientific and Technical Information of China (English)

    Chao-Wen Chang; Heng Pan; Hong-Yong Jia

    2008-01-01

    According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway are realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application.

  5. INEEL AIR MODELING PROTOCOL ext

    Energy Technology Data Exchange (ETDEWEB)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  6. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  7. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Directory of Open Access Journals (Sweden)

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  8. A structured data transfer protocol

    Science.gov (United States)

    Barrett, P.; Rots, A.

    1992-01-01

    The transfer of data between different computers and programs can be a major obstacle during data analysis. We present a new data transfer protocol which is based on a simple structure containing a value, an error, and a unit. Each of these members can be arrays or another structure. The ability to nest structures allows for the concept of objects. When using an object-oriented language such as C++, reference can be made to the object name instead of each element explicitly. Prototype code has been written which implements the basic design with enhancements planned for the future.

  9. Experimental quantum multiparty communication protocols

    Science.gov (United States)

    Smania, Massimiliano; Elhassan, Ashraf M.; Tavakoli, Armin; Bourennane, Mohamed

    2016-06-01

    Quantum information science breaks limitations of conventional information transfer, cryptography and computation by using quantum superpositions or entanglement as resources for information processing. Here we report on the experimental realisation of three-party quantum communication protocols using single three-level quantum system (qutrit) communication: secret-sharing, detectable Byzantine agreement and communication complexity reduction for a three-valued function. We have implemented these three schemes using the same optical fibre interferometric setup. Our realisation is easily scalable without compromising on detection efficiency or generating extremely complex many-particle entangled states.

  10. New Models for Population Protocols

    CERN Document Server

    Michail, Othon

    2010-01-01

    Wireless sensor networks are about to be part of everyday life. Homes and workplaces capable of self-controlling and adapting air-conditioning for different temperature and humidity levels, sleepless forests ready to detect and react in case of a fire, vehicles able to avoid sudden obstacles or possibly able to self-organize routes to avoid congestion, and so on, will probably be commonplace in the very near future. Mobility plays a central role in such systems and so does passive mobility, that is, mobility of the network stemming from the environment itself. The population protocol model was

  11. Research on Container Behaviors Protocol

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With the development of middleware technology, there are some new features to be adopted on demand in middleware platform based on container component. Aiming at the adaptation of middleware platform, from the nature of component container, this paper begins with behaviors features of EJB (Enterprise Java Bean) container, extracts general behaviors protocol of container, and defines its formal behaviors specification. In the end, the interactive relationship of components is described by WRIGHT language, and the configuration of whole system is shown. The method proposed in this paper mines the hidden features of framework of component container, and applies to refactor middleware platform in reflection and aspect-oriented programming technology.

  12. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  13. Evaluation and Application of the Strand-Specific Protocol for Next-Generation Sequencing

    Directory of Open Access Journals (Sweden)

    Kuo-Wang Tsai

    2015-01-01

    Full Text Available Next-generation sequencing (NGS has become a powerful sequencing tool, applied in a wide range of biological studies. However, the traditional sample preparation protocol for NGS is non-strand-specific (NSS, leading to biased estimates of expression for transcripts overlapped at the antisense strand. Strand-specific (SS protocols have recently been developed. In this study, we prepared the same RNA sample by using the SS and NSS protocols, followed by sequencing with Illumina HiSeq platform. Using real-time quantitative PCR as a standard, we first proved that the SS protocol more precisely estimates gene expressions compared with the NSS protocol, particularly for those overlapped at the antisense strand. In addition, we also showed that the sequence reads from the SS protocol are comparable with those from conventional NSS protocols in many aspects. Finally, we also mapped a fraction of sequence reads back to the antisense strand of the known genes, originally without annotated genes located. Using sequence assembly and PCR validation, we succeeded in identifying and characterizing the novel antisense genes. Our results show that the SS protocol performs more accurately than the traditional NSS protocol and can be applied in future studies.

  14. 15 CFR 781.1 - Definitions of terms used in the Additional Protocol Regulations (APR).

    Science.gov (United States)

    2010-01-01

    ... APR. Host Team Leader. The representative from the Department of Commerce who leads the Host Team... protect activities of direct national security significance to the United States, including information... application would result in access by the IAEA to activities of direct national security significance to...

  15. PRECISE - pregabalin in addition to usual care for sciatica: study protocol for a randomised controlled trial

    OpenAIRE

    Mathieson, Stephanie; Maher, Christopher G; McLachlan, Andrew J; Latimer, Jane; Koes, Bart W; Hancock, Mark J.; Harris, Ian; Day, Richard O; Pik, Justin; Jan, Stephen; Billot, Laurent; Lin, Chung-Wei Christine

    2013-01-01

    Background Sciatica is a type of neuropathic pain that is characterised by pain radiating into the leg. It is often accompanied by low back pain and neurological deficits in the lower limb. While this condition may cause significant suffering for the individual, the lack of evidence supporting effective treatments for sciatica makes clinical management difficult. Our objectives are to determine the efficacy of pregabalin on reducing leg pain intensity and its cost-effectiveness in patients wi...

  16. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  17. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2015-02-24

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  18. nPAKE+:A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords

    Institute of Scientific and Technical Information of China (English)

    Zhi-guo Wan; Robert H. Deng; Feng Bao; Bart Preneel; Ming Gu

    2009-01-01

    Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a tree-based group PAKE protocol -- nPAKE+ protocol under the setting where each party shares an independent password with a trusted server. The nPAKE+ protocol is a novel combination of the hierarchical key tree structure and the password-based Diffie-Hellman exchange, and hence it achieves substantial gain in computation efficiency. In particular, the computation cost for each client in our protocol is only O(log n). Additionally, the hierarchical feature of nPAKE+ enables every subgroup to obtain its own subgroup key in the end. We also prove the security of our protocol under the random oracle model and the ideal cipher model.

  19. Climate change scenarios and technology transfer protocols

    Energy Technology Data Exchange (ETDEWEB)

    Kypreos, Socrates; Turton, Hal [Energy Economics Group, Paul Scherrer Institute, Villigen PSI, CH-5232 (Switzerland)

    2011-02-15

    We apply a specific version of MERGE-ETL, an integrated assessment model, to study global climate policies supported by Technology Transfer Protocols (TTPs). We model a specific formulation of such a TTP where donor countries finance via carbon tax revenues, the diffusion of carbon-free technologies in developing countries (DCs) and quantify its benefits. Industrialized countries profit from increased technology exports, global diffusion of advanced technology (leading to additional technology learning and cost reductions) and reduced climate damages through the likelihood of greater global participation in a new international agreement. DCs experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and expected secondary benefits of carbon abatement (such as reduced local and regional air pollution). The analysis identifies potential candidate technologies that could be supported under a TTP, and the impact of a TTP on economic development (including the flow of transfer subsidies) and global emissions. Although a TTP may encourage additional participation, such a proposal is only likely to be successful if an increased willingness to pay to avoid climate damages is accepted, first by the present and future generations of the industrialized world and later on, when sufficient economic growth is accumulated, by today's developing countries. (author)

  20. Symmetric cryptographic protocols for extended millionaires' problem

    Institute of Scientific and Technical Information of China (English)

    LI ShunDong; WANG DaoShun; DAI YiQi

    2009-01-01

    Yao's millionaires' problem is a fundamental problem in secure multiparty computation, and its solutions have become building blocks of many secure multiparty computation solutions. Unfortunately,most protocols for millionaires' problem are constructed based on public cryptography, and thus are inefficient. Furthermore, all protocols are designed to solve the basic millionaires' problem, that is,to privately determine which of two natural numbers is greater. If the numbers are real, existing solutions do not directly work. These features limit the extensive application of the existing protocols. This study introduces and refines the first symmetric cryptographic protocol for the basic millionaires' problem, and then extends the symmetric cryptographic protocol to privately determining which of two real numbers is greater, which are called the extended millionaires' problem, and proposes corresponding Constructed based on symmetric cryptography, these protocols are very efficient.

  1. Merging Multiparty Protocols in Multiparty Choreographies

    Directory of Open Access Journals (Sweden)

    Fabrizio Montesi

    2013-02-01

    Full Text Available Choreography-based programming is a powerful paradigm for defining communication-based systems from a global viewpoint. A choreography can be checked against multiparty protocol specifications, given as behavioural types, that may be instantiated indefinitely at runtime. Each protocol instance is started with a synchronisation among the involved peers. We analyse a simple transformation from a choreography with a possibly unbounded number of protocol instantiations to a choreography instantiating a single protocol, which is the merge of the original ones. This gives an effective methodology for obtaining new protocols by composing existing ones. Moreover, by removing all synchronisations required for starting protocol instances, our transformation reduces the number of communications and resources needed to execute a choreography.

  2. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  3. Developing practice protocols for advanced practice nursing.

    Science.gov (United States)

    Paul, S

    1999-08-01

    In most states, the role of an advanced practice nurse is dependent on practice protocols that provide an organized method for analyzing and managing a disease or major symptom. They are also used to control the process of medical care and to specify steps in the delivery of that care. Creating appropriate practice protocols is one of the most important precursors to implementing the advanced practice role, because they virtually drive the clinician's ability to treat or manage clinical situations or disease states. This article outlines the steps involved in developing practice protocols and discusses the content that should be included in a protocol, providing an example of narrative and algorithm format protocols. Pros and cons, as well as legal issues related to practice protocols, are also presented.

  4. VANET Routing Protocols: Pros and Cons

    CERN Document Server

    Paul, Bijan; Bikas, Md Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol has taken significant attention. So, it is very necessary to identify the pros and cons of routing protocols which can be used for further improvement or development of any new routing protocol. This paper presents the pros and cons of VANET routing protocols for inter vehicle communication.

  5. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  6. Additive Classical Capacity of Quantum Channels Assisted by Noisy Entanglement

    Science.gov (United States)

    Zhuang, Quntao; Zhu, Elton Yechao; Shor, Peter W.

    2017-05-01

    We give a capacity formula for the classical information transmission over a noisy quantum channel, with separable encoding by the sender and limited resources provided by the receiver's preshared ancilla. Instead of a pure state, we consider the signal-ancilla pair in a mixed state, purified by a "witness." Thus, the signal-witness correlation limits the resource available from the signal-ancilla correlation. Our formula characterizes the utility of different forms of resources, including noisy or limited entanglement assistance, for classical communication. With separable encoding, the sender's signals across multiple channel uses are still allowed to be entangled, yet our capacity formula is additive. In particular, for generalized covariant channels, our capacity formula has a simple closed form. Moreover, our additive capacity formula upper bounds the general coherent attack's information gain in various two-way quantum key distribution protocols. For Gaussian protocols, the additivity of the formula indicates that the collective Gaussian attack is the most powerful.

  7. A Framework for Group Key Management Protocol Assessment Independent of View Synchrony

    Directory of Open Access Journals (Sweden)

    David Manz

    2010-01-01

    previously inconsistently portrayed. The ability to see this before did not exist because a framework upon which to evaluate the costs did not exist. Now, literature can proceed with clearly defined understandings of what values exist in group key management protocols. Conclusion/Recommendations: Better communication in group key management will be a benefit to the entire field. Now that costs can be analyzed, procedure and security can be improved and protocols can be implemented for wireless ad-hoc networks. In addition, it led two authors of this study to create a new protocol, DTEGK, to maximize the most efficient communication, as view synchrony was hindering the effectiveness of previous protocols. Without the hindrance of view synchrony and a quantitative list of defined communication costs, protocols can also now be extended into the wireless, ad-hoc realm of group key management.

  8. The Braid-Based Bit Commitment Protocol

    Institute of Scientific and Technical Information of China (English)

    WANG Li-cheng; CAO Zhen-fu; CAO Feng; QIAN Hai-feng

    2006-01-01

    With recent advances of quantum computation, new threats have closed in upon to the classical public key cryptosystems. In order to build more secure bit commitment schemes, this paper gave a survey of the new coming braid-based cryptography and then brought forward the first braid-based bit commitment protocol. The security proof manifests that the proposed protocol is computationally binding and information-theoretically hiding.Furthermore, the proposed protocol is also invulnerable to currently known quantum attacks.

  9. An Identity- Based Key- Exchange Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ya-juan; ZHU Yue-fei; HUANG Qiu-sheng

    2005-01-01

    An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure(session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diffie-Hellmen) assumption is correct. Then we apply the signature-based authenticator to our protocol and obtain an identity-Based key-exchange protocol that is SK-secure in the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.

  10. Enterprise Considerations for Ports and Protocols

    Science.gov (United States)

    2016-10-21

    9] Official 1935 TCP Adobe Systems Macromedia Flash Real Time Messaging Protocol (RTMP) “plain” protocol1 Official 2195 TCP Apple Push...temporary ports, primarily by clients when communicating with servers. Dynamic/private ports 1 Adobe proprietary, H. Parmar, M. Thornburgh (eds...Adobe’s Real Time Messaging Protocol, Adobe , December 21, 2012. [10] 2 Apple proprietary. https://en.wikipedia.org/wiki/Apple_Push_Notification_Service

  11. Reasoning about Protocol Change and Knowledge

    Science.gov (United States)

    Wang, Yanjing

    In social interactions, protocols govern our behaviour and assign meaning to actions. In this paper, we investigate the dynamics of protocols and their epistemic effects. We develop two logics, inspired by Propositional Dynamic Logic (PDL) and Public Announcement Logic (PAL), for reasoning about protocol change and knowledge updates. We show that these two logics can be translated back to the standard PDL and PAL respectively.

  12. [The research protocol. Part I].

    Science.gov (United States)

    Miranda-Novales, María Guadalupe; Villasís-Keever, Miguel Ángel

    2015-01-01

    One of the principal aims in research is the publication of the study in scientific journals. This implies two challenges: the first one, the election of an adequate research design, and the second one, the concrete and simple wording of the results for the study to be accepted in the most appropriate journal according to the scope. Despite numerous supporting documents are available for both issues, the publication process is long, tiresome, and can discourage the most enthusiastic researcher. This is the first of a series of articles with the objective to describe the steps from the research question to the publication of the study. First of all, the importance of the research design will be addressed. The structure of the protocol is essential to achieve the objectives, and provides a way to organize the investigation in a logic, comprehensible and efficient manner.

  13. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  14. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    secret sharing in terms of simple algebraic conditions on the integer sharing coefficients, and we propose a black-box secret sharing scheme with minimal expansion factor. Note that, in contrast to the classical field-based secret sharing schemes, a black-box secret sharing scheme allows to share......, MPC can be based on arbitrary finite rings. This is in sharp contrast to the literature where essentially all MPC protocols require a much stronger mathematical structure, namely a field. Apart from its theoretical value, this can lead to efficiency improvements since it allows a greater freedom...... ones. We also construct a noninteractive distributed-verifier proof of circuit satisfiability, which—in principle—allows to prove anything that can be proven without giving away the proof....

  15. [Climate change and Kyoto protocol].

    Science.gov (United States)

    Ergasti, G; Pippia, V; Murzilli, G; De Luca D'Alessandro, E

    2009-01-01

    Due to industrial revolution and the heavy use of fossil fuels, the concentration of greenhouse gases in the atmosphere has increased dramatically during the last hundred years, and this has lead to an increase in mean global temperature. The environmental consequences of this are: the melting of the ice caps, an increase in mean sea-levels, catastrophic events such as floodings, hurricanes and earthquakes, changes to the animal and vegetable kingdoms, a growth in vectors and bacteria in water thus increasing the risk of infectious diseases and damage to agriculture. The toxic effects of the pollution on human health are both acute and chronic. The Kyoto Protocol is an important step in the campaign against climatic changes but it is not sufficient. A possible solution might be for the States which produce the most of pollution to adopt a better political stance for the environment and to use renewable resources for the production of energy.

  16. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  17. E-Cash Payment Protocols

    Directory of Open Access Journals (Sweden)

    Shweta Srivastava

    2012-09-01

    Full Text Available E-cash is a payment system designed and implemented for making purchases over open networks such as the Internet. Need of a payment system which enables the electronic transactions are growing at the same time that the use of Internet is growing in our daily life. Present days electronic payment systems have a major problem, they cannot handle the security and the users anonymity and at the same time these systems are secure on the cost of their users anonymity. This paper shows the payment protocols for digital cash and discusses how a digital cash system can be formed by presenting a few of the present days digital cash systems in details. We also provide a comparison and determine them together to see which one of them fulfils the properties for digital cash and the required security level.

  18. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2013-12-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  19. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Crawford, Aladsair J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gourisetti, Sri Nikhil Gup [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Viswanathan, Vilayanur V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ferreira, Summer [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Schoenwald, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rosewater, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-04-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Based on experiences with the application and use of that document, and to include additional ESS applications and associated duty cycles, test procedures and performance metrics, a first revision of the November 2012 Protocol was issued in June 2014 (PNNL 22010 Rev. 1). As an update of the 2014 revision 1 to the Protocol, this document (the March 2016 revision 2 to the Protocol) is intended to supersede the June 2014 revision 1 to the Protocol and provide a more user-friendly yet more robust and comprehensive basis for measuring and expressing ESS performance.

  20. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  1. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Romberger, J.

    2014-11-01

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  2. Location Based Opportunistic Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jubin Sebastian E

    2012-01-01

    Full Text Available : Most existing ad hoc routing protocols are susceptible to node mobility, especially for large-scale networks. This paper proposes a Location Based Opportunistic Routing Protocol (LOR to addresses the problem of delivering data packets for highly dynamic mobile ad hoc networks in a reliable and timely manner.This protocol takes advantage of the stateless property of geographic routing and the broadcast nature of wireless medium. When a data packet is sent out, some of the neighbor nodes that have overheard the transmission will serve as forwarding candidates, and take turn to forward the packet if it is not relayed by the specific best forwarder within a certain period of time. By utilizing such in-the-air backup, communication is maintained without being interrupted. The additional latency incurred by local route recovery is greatly reduced and the duplicate relaying caused by packet reroute is also decreased. Simulation results on NS2 verified the effectiveness of the proposed protocol with improvement in throughput by 28%.

  3. Simplified 3D protocol capable of generating early cortical neuroepithelium

    Science.gov (United States)

    Holmes, Dwayne B.

    2017-01-01

    ABSTRACT Here, we report a 3D cerebellar differentiation protocol with quick startup method, defined medium and no special materials or handling requirements. Three fibroblast growth factors (FGF2, 4 and 8) were used for cerebellar patterning and smoothened agonist (SAG) for granule cell development. After 35 days, differentiation products exhibited similar structures and neuronal markers reported in prior ‘organoid’ and ‘spheroid’ protocols. This included cells positive for KIRREL2 (a marker of early cerebellar neuroepithelium) and ZIC1 (a marker for granule cells). Follow-up tests indicated that addition of FGFs, if helpful, was not required to generate observed structures and cell types. This suggests that intrinsic production of patterning factors by aggregates themselves may be adequate for region-specific 3D modeling. This protocol may be used as a quick, easy and cost-efficient method for 3D culture, whether to research development of the early cerebellar neuroepithelium, a base to generate mature cortical structures, or to optimize minimal-factor protocols for other brain regions. PMID:28167491

  4. Validity of 3 protocols for verifying VO2 max.

    Science.gov (United States)

    Kirkeberg, J M; Dalleck, L C; Kamphoff, C S; Pettitt, R W

    2011-04-01

    The verification bout has emerged as a technique for confirming 'true' VO2 max; however, validity during a single visit is unknown. We evaluated 3 different GXT durations with severe intensity verification bouts. On 3 separate days, in counterbalanced order, 12 recreational-trained men completed short (9±1 min), middle (11±1 min), and long (13±2 min) duration GXTs followed by exhaustive, sine wave verification bouts during the same visit. Intensities for verification were set at speeds equivalent to 2-stages minus end-GXT speed. No differences (pVO2 max (mL/kg/min) were observed between short (49.1), middle (48.2), and long (48.8) protocols. In addition, no differences in verification bout duration occurred between protocols (3±1 min). Validity of VO2 max was strongest for the middle duration protocol (ICC α=0.97; typical error=1 mL/kg/min; CV=2%). A small, but significantly higher HR (max) (∼1-2 bpm) was observed for the long protocol. Maximum respiratory exchange ratios were inconsistent (ICC α ranged 0.58-0.68). Our findings indicate GXT-verification bout testing during a single visit is a valid means of measuring 'true' VO2 max. The 10 min target for GXT duration was the optimum. © Georg Thieme Verlag KG Stuttgart · New York.

  5. Packet Drop Avoidance for High-speed network transmission protocol

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Guojun

    2004-05-01

    As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in Transmission Control Protocol (TCP) have worked well on low bandwidth delay product networks, but with newer high-bandwidth delay networks they have shown to be inefficient and prone to unstable. This is largely due to increased network bandwidth coupled with changes in internet traffic patterns. These changes come from a variety of new network applications that are being developed to take advantage of the increased network bandwidth. This paper will examine the end-to-end congestion avoidance mechanism and perform a step-by-step analysis of its theory. In addition we will propose an alternative approach developed as part of a new network transmission protocol. Our alternative protocol uses a packet drop avoidance (PDA) mechanism built on top of the maximum burst size (MBS) theory combined with a real-time available bandwidth algorithm.

  6. Wireless sensors networks MAC protocols analysis

    CERN Document Server

    Chaari, Lamia

    2010-01-01

    Wireless sensors networks performance are strictly related to the medium access mechanism. An effective one, require non-conventional paradigms for protocol design due to several constraints. An adequate equilibrium between communication improvement and data processing capabilities must be accomplished. To achieve low power operation, several MAC protocols already proposed for WSN. The aim of this paper is to survey and to analyze the most energy efficient MAC protocol in order to categorize them and to compare their performances. Furthermore we have implemented some of WSN MAC protocol under OMNET++ with the purpose to evaluate their performances.

  7. A formal model of fair exchange protocols

    Institute of Scientific and Technical Information of China (English)

    QING Sihan; LI Gaicheng

    2005-01-01

    Based on the study of existing fair exchange protocols, this paper sets up an accurate formal model by stepwise refinement. In the process of refinement an unreliable channel is employed to simulate an attack behavior. The model provides a novel formal definition of exchanged items, and presents the formal goals for fairness, accountability,etc., reflecting the inherent requirements for fair exchange protocols across-the-board. In order to check, prove, and design fair exchange protocols effectively and efficiently, the model puts forward a novel property of abuse-freeness which applies to all fair exchange protocols, gives a formal definition for trust strand of the third party, and presents general criteria of designing a secure and effective fair exchange protocol. Taking a typical fair exchange protocol as an example, this paper presents the analysis steps of fair exchange protocols appealing to our model. An unknown attack is uncovered. The analysis reveals the process of a complete attack, discovering deeper reasons for causing an attack.Finally, we modify the flawed protocol and the revised protocol ensures the desirable properties.

  8. Status Report on the UNIDROIT Space Protocol

    Science.gov (United States)

    Larsen, Paul B.

    2002-01-01

    In my status report on the UNIDROIT Space Protocol I will describe the history and purpose of the Space Protocol; I will state the Protocol's relationship to the UNIDROIT Convention on International Interests in Mobile Equipment in particular after the 2001 Cape Town Diplomatic Conference on the Convention. I will describe the COPUOS study of possible conflicts with the existing space law treaties and explain UNIDROIT's objective of avoiding conflicts between existing space law and the Space Protocol. Finally I will describe future steps to be taken.

  9. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  10. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process...... but then switches to a denser coding structure towards the end. Our systematic mechanism maintains the sparse structure during the recombination of packets at the intermediate nodes. The performance of our protocol is compared by means of simulations of IEEE reference grids against standard master-slave protocols...

  11. Traffic Performance Analysis of Manet Routing Protocol

    CERN Document Server

    Rajeswari, S; 10.5121/ijdps.2011.2306

    2011-01-01

    The primary objective of this research work is to study and investigate the performance measures of Gossip Routing protocol and Energy Efficient and Reliable Adaptive Gossip routing protocols. We use TCP and CBR based traffic models to analyze the performance of above mentioned protocols based on the parameters of Packet Delivery Ratio, Average End-to-End Delay and Throughput. We will investigate the effect of change in the simulation time and Number of nodes for the MANET routing protocols. For Simulation, we have used ns-2 simulator.

  12. Secure Key Management Protocol in WIMAX

    Directory of Open Access Journals (Sweden)

    Noudjoud Kahya

    2012-12-01

    Full Text Available The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16, is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS to Subscriber Station (SS. In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. Wefound that PKMv2 is vulnerable to replay, DoS, Man-in-the middle attacks. At last we have proposed asecure protocol (SPKM to prevent the authorization protocol from such attacks.

  13. Modularizing and Specifying Protocols among Threads

    Directory of Open Access Journals (Sweden)

    Farhad Arbab

    2013-02-01

    Full Text Available We identify three problems with current techniques for implementing protocols among threads, which complicate and impair the scalability of multicore software development: implementing synchronization, implementing coordination, and modularizing protocols. To mend these deficiencies, we argue for the use of domain-specific languages (DSL based on existing models of concurrency. To demonstrate the feasibility of this proposal, we explain how to use the model of concurrency Reo as a high-level protocol DSL, which offers appropriate abstractions and a natural separation of protocols and computations. We describe a Reo-to-Java compiler and illustrate its use through examples.

  14. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  15. Designing an Exploration Atmosphere Prebreathe Protocol

    Science.gov (United States)

    Conkin, Johnny; Feiveson, A. H.; Gernhardt, M. L.; Norcross, J. R.; Wessel, J. H., III

    2015-01-01

    Extravehicular activities (EVAs) at remote locations must maximize limited resources such as oxygen (O2) and also minimize the risk of decompression sickness (DCS). A proposed remote denitrogenation (prebreathe) protocol requires astronauts to live in a mildly hypoxic atmosphere at 8.2 psia while periodically performing EVAs at 4.3 psia. Empirical data are required to confirm that the protocol meets the current accept requirements: less than or equal to 15% incidence of Type I DCS, less than or equal to 20% incidence of Grade IV venous gas emboli (VGE), both at 95% statistical confidence, with no Type II DCS symptom during the validation trial. METHODS: A repeated measures statistical design is proposed in which groups of 6 subjects with physical characteristics similar to active-duty astronauts would first become equilibrated to an 8.2 psia atmosphere in a hypobaric chamber containing 34% O2 and 66% N2, over 48 h, and then perform 4 simulated EVAs at 4.3 psia over the next 9 days. In the equilibration phase, subjects undergo a 3-h 100% O2 mask prebreathe prior to and during a 5-min ascent to 8.2 psia to prevent significant tissue N2 supersaturation on reaching 8.2 psia. Masks would be removed once 34% O2 is established at 8.2 psia, and subjects would then equilibrate to this atmosphere for 48 h. The hypoxia is equivalent to breathing air at 1,220 meters (4,000 ft) altitude, just as was experienced in the shuttle 10.2 psia - 26.5% O2 staged denitrogenation protocol and the current ISS campout denitrogenation protocol. For simulated EVAs, each subject dons a mask and breathes 85% O2 and 15% N2 during a 3-min depressurization to 6.0 psia, holds for 15 min, and then completes a 3-min depressurization to 4.3 psia. The simulated EVA period starts when 6.0 psia is reached and continues for a total of 240 min (222 min at 4.3 psia). During this time, subjects will follow a prescribed repetitive activity against loads in the upper and lower body with mean metabolic rate

  16. An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

    Directory of Open Access Journals (Sweden)

    S.K. Hafizul Islam

    2017-07-01

    Full Text Available In the literature, many three-party authenticated key exchange (3PAKE protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between the users over any insecure communication networks. In this paper, we identified some deficiencies in Tan’s 3PAKE protocol and then devised an improved 3PAKE protocol without symmetric key en/decryption technique for mobile-commerce environments. The proposed protocol is based on the elliptic curve cryptography and one-way cryptographic hash function. In order to prove security validation of the proposed 3PAKE protocol we have used widely accepted AVISPA software whose results confirm that the proposed protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The proposed protocol is not only secure in the AVISPA software, but it also secure against relevant numerous security attacks such as man-in-the-middle attack, impersonation attack, parallel attack, key-compromise impersonation attack, etc. In addition, our protocol is designed with lower computation cost than other relevant protocols. Therefore, the proposed protocol is more efficient and suitable for practical use than other protocols in mobile-commerce environments.

  17. The Project Based Mechanisms of the Kyoto Protocol. Credible Instruments or Challenges to the Integrity of the Kyoto Protocol?

    Energy Technology Data Exchange (ETDEWEB)

    Takeuchi Waldegren, Linn

    2006-03-15

    The project based mechanisms of the Kyoto Protocol are innovative instruments which allow projects to earn credits for reducing greenhouse gas (GHG) emissions. The credits can in turn be used by countries to reach their emissions targets according to the Kyoto Protocol. The Project based mechanisms are known as the Clean Development Mechanism (CDM) and the Joint Implementation (JI). If the project based mechanisms are to be effective policy instruments they must ensure the integrity of the Kyoto Protocol, and their ability to promote and prove real emission reductions is critical. The environmental credibility of the project based mechanisms will also ensure their ability to promote cost effectiveness. Key concepts in this context are environmental and project additionality, and their role and value for the project based mechanisms are analyzed. Environmental additionality is established by comparing a project's emissions to a baseline. The baseline's credibility is thus vital. The concept of project additionality is somewhat controversial, but is nonetheless of equal importance. The case studies of CDM approved methodologies (AMs) and proposed projects suggest that there are credibility issues that need to be addressed if the project based mechanisms are to promote real emissions reductions.

  18. GENERIC VERIFICATION PROTOCOL: DISTRIBUTED GENERATION AND COMBINED HEAT AND POWER FIELD TESTING PROTOCOL

    Science.gov (United States)

    This report is a generic verification protocol by which EPA’s Environmental Technology Verification program tests newly developed equipment for distributed generation of electric power, usually micro-turbine generators and internal combustion engine generators. The protocol will ...

  19. EXACT2: the semantics of biomedical protocols.

    Science.gov (United States)

    Soldatova, Larisa N; Nadis, Daniel; King, Ross D; Basu, Piyali S; Haddi, Emma; Baumlé, Véronique; Saunders, Nigel J; Marwan, Wolfgang; Rudkin, Brian B

    2014-01-01

    The reliability and reproducibility of experimental procedures is a cornerstone of scientific practice. There is a pressing technological need for the better representation of biomedical protocols to enable other agents (human or machine) to better reproduce results. A framework that ensures that all information required for the replication of experimental protocols is essential to achieve reproducibility. To construct EXACT2 we manually inspected hundreds of published and commercial biomedical protocols from several areas of biomedicine. After establishing a clear pattern for extracting the required information we utilized text-mining tools to translate the protocols into a machine amenable format. We have verified the utility of EXACT2 through the successful processing of previously 'unseen' (not used for the construction of EXACT2)protocols. We have developed the ontology EXACT2 (EXperimental ACTions) that is designed to capture the full semantics of biomedical protocols required for their reproducibility. The paper reports on a fundamentally new version EXACT2 that supports the semantically-defined representation of biomedical protocols. The ability of EXACT2 to capture the semantics of biomedical procedures was verified through a text mining use case. In this EXACT2 is used as a reference model for text mining tools to identify terms pertinent to experimental actions, and their properties, in biomedical protocols expressed in natural language. An EXACT2-based framework for the translation of biomedical protocols to a machine amenable format is proposed. The EXACT2 ontology is sufficient to record, in a machine processable form, the essential information about biomedical protocols. EXACT2 defines explicit semantics of experimental actions, and can be used by various computer applications. It can serve as a reference model for for the translation of biomedical protocols in natural language into a semantically-defined format.

  20. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  1. ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX

    Institute of Scientific and Technical Information of China (English)

    Wang Shaohui; Liu Sujuan

    2013-01-01

    Most of the Radio Frequency IDentification (RFID) authentication protocols,proposed to preserve security and privacy,are analysed to show that they can not provide security against some passive or active attacks.In this paper,the security of two matrix-based protocols,proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al.(RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard,are investigated.Using the linear relationship of multiplication of matrix and vector,we point out that both protocols can not provide scalability,and they are vulnerable to passive impersonation attack.In addition,both protocols are totally insecure if the adversary can compromise one tag to extract the secrets.A modified lightweight matrix-based authentication protocol is presented,which can resist mainly common attacks on an RFID authentication system including eavesdropping,relay attack,desynchronization attack,impersonation attack and tag tracking attack.The new protocol also has the desirable scalability property and can keep secure under compromising attack.

  2. Comment on "flexible protocol for quantum private query based on B92 protocol"

    Science.gov (United States)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  3. A Survey on Distance Vector Routing Protocols

    CERN Document Server

    Tang, Linpeng

    2011-01-01

    In this paper we give a brief introduction to five different distance vector routing protocols (RIP, AODV, EIGRP, RIP-MTI and Babel) and give some of our thoughts on how to solve the count to infinity problem. Our focus is how distance vector routing protocols, based on limited information, can prevent routing loops and the count to infinity problem.

  4. Beveiliging Internet Protocol beter en beter

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    1999-01-01

    Iedereen die gebruik maakt van e-mail, internet, intranet of extranet maakt gebruik van het in de jaren 7O ontworpen IP het Internet Protocol. Dit protocol zorgt ervoor dat toegang tot de diverse internetdiensten mogelijk is. Iedere computer die op internet wordt aangesloten, krijgt een eigen IP-adr

  5. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    Pang, J.

    2002-01-01

    Needham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over insecure open netwo

  6. The Formal Specifications for Protocols of Decoders

    Institute of Scientific and Technical Information of China (English)

    YUAN Meng-ting; WU Guo-qing; SHU Feng-di

    2004-01-01

    This paper presents a formal approach, FSPD (Formal Specifications for Protocols of Decoders), to specify decoder communication protocols. Based on axiomatic, FSPD is a precise language with which programmers could use only one suitable driver to handle various types of decoders. FSPD is helpful for programmers to get high adaptability and reusability of decoder-driver software.

  7. Mobile IPv6 Protocols and Implementation

    CERN Document Server

    Li, Qing; Shima, Keiichi

    2009-01-01

    Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide. This book covers the IPv6 host mobility protocol known as 'mobile IPv6' and begins with a basic description of mobile IPv6 and then details protocol specifications and data structures as well as actual implementation.

  8. Concurrent Validity of a Pragmatic Protocol.

    Science.gov (United States)

    Duncan, Julie Condon; Perozzi, Joseph A.

    1987-01-01

    The scores of 11 non-handicapped kindergarten children on the Pragmatic Protocol (used in assessing language-handicapped children) were correlated with their ratings by five experienced judges on a 7-point equal-appearing interval scale of communicative competence. The concurrent validity of the Protocol and interobserver reliability were…

  9. Secure Geographic Routing Protocols: Issues and Approaches

    CERN Document Server

    sookhak, Mehdi; Haghparast, Mahboobeh; ISnin, Ismail Fauzi

    2011-01-01

    In the years, routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN) and also provide a qualitative comparison of them.

  10. The Russian Federation and the Kyoto Protocol

    NARCIS (Netherlands)

    W.T. Douma (Wybe); D.N. Ratsiborinskaya (Daria)

    2007-01-01

    markdownabstractThis book brings together the results of two conferences: 'The Kyoto Protocol and beyond: A legal perspective', organised by the University of Siena on 10-11 June 2006, and 'Tackling Climate Change: An appraisal of the Kyoto Protocol and options for the future', held at the T.M.C.

  11. Performance of a connectionless protocol over ATM

    NARCIS (Netherlands)

    Heijenk, Geert J.; Moorsel, van Aad P.A.; Niemegeers, Ignas G.

    1992-01-01

    Recent studies show the existence of a demand for a connectionless broadband service. In order to cope with this demand, a connectionless protocol for the B-ISDN needs to be designed. Such a protocol should make use of ATM and the ATM Adaptation Layer. It needs to specify destination and bandwidth o

  12. Summary Report on Rational Cryptographic Protocols

    DEFF Research Database (Denmark)

    Alwen, Joël; Cachin, Christian; Pereira, Olivier

    This report gives an overview of some of the models and techniques in rational cryptography, an emerging research area which in particular uses the methodologies and techniques of game theory to analyze cryptographic protocols and which uses cryptographic protocol theory to implement game theoretic...

  13. Algebraic techniques for low communication secure protocols

    NARCIS (Netherlands)

    Haan, Robbert de

    2009-01-01

    This thesis discusses new results in two areas within cryptography; securely transmitting a message between two parties and securely computing a function on the inputs of multiple parties. For both of these areas we mainly consider perfectly secure protocols, which are protocols that have a zero err

  14. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    Romijn, J.M.T.

    1999-01-01

    The HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the tools Spin a

  15. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...

  16. Welfare monitroing system : assessment protocol for horses

    NARCIS (Netherlands)

    Livestock Research,

    2012-01-01

    This document describes the protocol for horses in more detail. For the development of the protocol the Welfare Quality® framework was used. For each measure there is a description how to assess the measure including the method of classification.

  17. Secure Geographic Routing Protocols: Issues and Approaches

    Directory of Open Access Journals (Sweden)

    Mehdi sookhak

    2011-09-01

    Full Text Available In the years, routing protocols in wireless sensor networks (WSN have been substantially investigated by researches Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN and also provide a qualitative comparison of them.

  18. RANCANG BANGUN PERANGKAT LUNAK BILLING DAN IMPLEMENTASI VOICE OVER INTERNET PROTOCOL

    Directory of Open Access Journals (Sweden)

    Honni

    2013-11-01

    Full Text Available The rapidly evolving communication system enables applications for telephone communication to be carried over the data network known as VoIP (voice over internet protocol. SIP (session initiation protocol as the signaling protocol is text-based VoIP which can be implemented easily in comparison with other signaling protocols. The purpose of this paper is designing and implementing VoIP billing up to the company to provide additional facilities for enterprise customers. The methods start with data collection, analysis, design, development, and implementation. The result achieved is a system of VoIP with SIP and Asterisk software which has functions of PBX to provide additional facilities such as VoIP which is a plus for the company and customers. After implemented, the VoIP system and billing features are found work well.

  19. Two Modifications on IKE Protocol with Pre-shared Key Authentication

    Institute of Scientific and Technical Information of China (English)

    刘东喜; 张连华; 白英彩

    2003-01-01

    This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder generates the computation-intensive Diffie-Hellman public value. The second modification can improve its efficiency when the attack on messages occurs because it can detect the attack quickly by replacing the centralized authentication in origical IKE protocol with immediate authentication. In addition, the two modifications can be integrated into one protocol compactly.

  20. Draft Plan to Develop Non-Intrusive Load Monitoring Test Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Mayhorn, Ebony T. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sullivan, Greg P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Petersen, Joseph M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Baechler, Michael C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-09-29

    This document presents a Draft Plan proposed to develop a common test protocol that can be used to evaluate the performance requirements of Non-Intrusive Load Monitoring. Development on the test protocol will be focused on providing a consistent method that can be used to quantify and compare the performance characteristics of NILM products. Elements of the protocols include specifications for appliances to be used, metrics, instrumentation, and a procedure to simulate appliance behavior during tests. In addition, three priority use cases for NILM will be identified and their performance requirements will specified.

  1. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  2. Similarity based mixed transaction concurrency control protocol

    Institute of Scientific and Technical Information of China (English)

    PAN Yi; LU Yan-sheng

    2005-01-01

    Due to the various performance requirements and data access restrictions of different types of real-time transactions, concurrency control protocols which had been designed for the systems with single type of transactions are not sufficient for mixed real-time database systems (MRTDBS), where different types of real-time transactions coexist in the systems concurrently. In this paper, a new concurrency control protocol MRTT_CC for mixed real-time transactions is proposed. The new strategy integrates with different concurrency control protocols to meet the deadline requirements of different types of real-time transactions. The data similarity concept is also explored in the new protocol to reduce the blocking time of soft real-time transactions, which increases their chances to meet the deadlines. Simulation experiments show that the new protocol has gained good performance.

  3. Cryptanalysis of the arbitrated quantum signature protocols

    CERN Document Server

    Gao, Fei; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-01-01

    As a new model for signing quantum message, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver Bob can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender Alice can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics in future study on AQS protocols.

  4. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  5. Multicast Protocol for Uni-Directional Networks

    Institute of Scientific and Technical Information of China (English)

    黄皓; 陈贵海; 谢立; 孙钟秀

    2000-01-01

    A very inexpensive receive-only satellite receiver can receive high bandwidth traffic from a feeder. Therefore the connection between the feeder and the receiver is uni-directional. The existing routing protocols, such as Link-State and Distance-Vector, are designed on the premise that any links are bidirectional and they cannot handle the uni-directional links. In this paper, a dynamic multicast routing protocol is proposed, which can handle uni-directional networks. This protocol can also adapt to the dynamic change of the topology of the network and has good scalability. A formal description of the protocol by Petri net is given. Liveness,deadlock free and other properties of the protocol are proved.

  6. Security Weaknesses in Arbitrated Quantum Signature Protocols

    Science.gov (United States)

    Liu, Feng; Zhang, Kejia; Cao, Tianqing

    2014-01-01

    Arbitrated quantum signature (AQS) is a cryptographic scenario in which the sender (signer), Alice, generates the signature of a message and then a receiver (verifier), Bob, can verify the signature with the help of a trusted arbitrator, Trent. In this paper, we point out there exist some security weaknesses in two AQS protocols. Our analysis shows Alice can successfully disavow any of her signatures by a simple attack in the first protocol. Furthermore, we study the security weaknesses of the second protocol from the aspects of forgery and disavowal. Some potential improvements of this kind of protocols are given. We also design a new method to authenticate a signature or a message, which makes AQS protocols immune to Alice's disavowal attack and Bob's forgery attack effectively.

  7. Cryptanalysis of the arbitrated quantum signature protocols

    Science.gov (United States)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-08-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  8. A Rational Approach to Cryptographic Protocols

    CERN Document Server

    Caballero-Gil, P; Bruno-Castañeda, C; 10.1016/j.mcm.2006.12.013

    2010-01-01

    This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model the latters as the formers. One of the main advantages of analysing a cryptographic protocol in the game-theory setting is the possibility of describing improved and stronger cryptographic solutions because possible adversarial behaviours may be taken into account directly. With those tools, protocols can be studied in a malicious model in order to find equilibrium conditions that make possible to protect honest parties against all possible strategies of adversaries.

  9. Quantum Communication Complexity of Quantum Authentication Protocols

    CERN Document Server

    Guedes, Elloá B

    2011-01-01

    In order to perform Quantum Cryptography procedures it is often essencial to ensure that the parties of the communication are authentic. Such task is accomplished by quantum authentication protocols which are distributed algorithms based on the intrinsic properties of Quantum Mechanics. The choice of an authentication protocol must consider that quantum states are very delicate and that the channel is subject to eavesdropping. However, even in face of the various existing definitions of quantum authentication protocols in the literature, little is known about them in this perspective, and this lack of knowledge may unfavor comparisons and wise choices. In the attempt to overcome this limitation, in the present work we aim at showing an approach to evaluate quantum authentication protocols based on the determination of their quantum communication complexity. Based on our investigation, no similar methods to analyze quantum authentication protocols were found in the literature. Pursuing this further, our approa...

  10. UNFINISHED BUSINESS: The Economics of The Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    JA Edmonds; CN MacCracken; RD Sands; SH Kim

    2000-07-06

    The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per

  11. Treatment protocols for cervical cancer

    Directory of Open Access Journals (Sweden)

    Vujkov Tamara

    2002-01-01

    Full Text Available Introduction Cervical cancer is the second most common cancer in women worldwide and the second cause of cancer death among women. About 95% (90% in developed countries of invasive carcinomas are of sqamous types, and 5% (10% in developed countries are adenocarcinomas. FIGO classification of cervical carcinomas, based on clinical staging and prognostic factor dictate therapeutic procedures and help in designing treatment protocols. Therapeutic modalities Surgical therapy includes conization, radical hysterectomy with pelvic lymphadenectomy and palliative operation urinary diversion and colostomy. Radiotherapy, brachytherapy and teletherapy are most recently combined with chemotherapy as concurrent chemoradiation. Discussion and conclusion No change in therapeutic modalities will ever decrease mortality rate of cervical carcinoma as much as education, prevention and early screening. The 5-year survival for locally advanced disease has not improved during the last 40 years as a result of failure to deliver therapy to the paraaortic region. Paraaortic lymph nodes should be evaluated before therapy planning by different imaging procedures, or more exactly by surgical staging: laparoscopy or laparotomy. Radical operations of cervical carcinoma should be performed by experienced surgeons, educated for this type of operation, with sufficient number of cases.

  12. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  13. Protocol for a systematic review of N-of-1 trial protocol guidelines and protocol reporting guidelines.

    Science.gov (United States)

    Porcino, Antony J; Punja, Salima; Chan, An-Wen; Kravitz, Richard; Orkin, Aaron; Ravaud, Philippe; Schmid, Christopher H; Vohra, Sunita

    2017-07-06

    N-of-1 trials are multiple cross-over trials done in individual participants, generating individual treatment effect information. While reporting guidelines for the CONSORT Extension for N-of-1 trials (CENT) and the Standard Protocol Items: Recommendations for Interventional Trials (SPIRIT) already exist, there is no standardized recommendation for the reporting of N-of-1 trial protocols. The objective of this study is to evaluate current literature on N-of-1 design and reporting to identify key elements of rigorous N-of-1 protocol design. We will conduct a systematic search for all N-of-1 trial guidelines and protocol-reporting guidelines published in peer-reviewed literature. We will search Medline, Embase, PsycINFO, CINAHL, the Cochrane Methodology Register, CENTRAL, and the NHS Economic Evaluation Database. Eligible articles will contain explicit guidance on N-of-1 protocol construction or reporting. Two reviewers will independently screen all titles and abstracts and then undertake full-text reviews of potential articles to determine eligibility. One reviewer will perform data extraction of selected articles, checked by the second reviewer. Data analysis will ascertain common features of N-of-1 trial protocols and compare them to the SPIRIT and CENT items. This systematic review assesses recommendations on the design and reporting of N-of-1 trial protocols. These findings will inform an international Delphi development process for an N-of-1 trial protocol reporting guideline. The development of this guideline is critical for improving the quality of N-of-1 protocols, leading to improvements in the quality of published N-of-1 trial research.

  14. Some Protocols For Optical-Fiber Digital Communications

    Science.gov (United States)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  15. A Nonlinear Consensus Protocol of Multiagent Systems Considering Measuring Errors

    Directory of Open Access Journals (Sweden)

    Xiaochu Wang

    2013-01-01

    Full Text Available In order to avoid a potential waste of energy during consensus controls in the case where there exist measurement uncertainties, a nonlinear protocol is proposed for multiagent systems under a fixed connected undirected communication topology and extended to both the cases with full and partial access a reference. Distributed estimators are utilized to help all agents agree on the understandings of the reference, even though there may be some agents which cannot access to the reference directly. An additional condition is also considered, where self-known configuration offsets are desired. Theoretical analyses of stability are given. Finally, simulations are performed, and results show that the proposed protocols can lead agents to achieve loose consensus and work effectively with less energy cost to keep the formation, which have illustrated the theoretical results.

  16. Establishing protocols for tick containment at Biosafety Level 4.

    Science.gov (United States)

    Thangamani, Saravanan; Bente, Dennis

    2014-07-01

    Tick-borne diseases continue to emerge and have a great impact on public health and agriculture. In addition, many of the agents of tick-borne diseases, which are classified as Biosafety Level 4 (BSL-4) viruses, have the potential to be used as biothreat agents. In spite of the known importance of these pathogens, there is an acute shortage of facilities and trained personnel to study the pathogenesis of tick-borne diseases and to assess vaccine as well as other therapeutic interventions against tick-borne diseases as they are transmitted in nature. We, at the Galveston National Laboratory, have developed facilities and protocols to safely work with BSL4 virus-infected ticks. This capability adds tremendous value to the Nation's training and research endeavors. In this report we describe the procedures and protocols to establish tick work in a BSL4 laboratory.

  17. Access Protocol For An Industrial Optical Fibre LAN

    Science.gov (United States)

    Senior, John M.; Walker, William M.; Ryley, Alan

    1987-09-01

    A structure for OSI levels 1 and 2 of a local area network suitable for use in a variety of industrial environments is reported. It is intended that the LAN will utilise optical fibre technology at the physical level and a hybrid of dynamically optimisable token passing and CSMA/CD techniques at the data link (IEEE 802 medium access control - logical link control) level. An intelligent token passing algorithm is employed which dynamically allocates tokens according to the known upper limits on the requirements of each device. In addition a system of stochastic tokens is used to increase efficiency when the stochastic traffic is significant. The protocol also allows user-defined priority systems to be employed and is suitable for distributed or centralised implementation. The results of computer simulated performance characteristics for the protocol using a star-ring topology are reported which demonstrate its ability to perform efficiently with the device and traffic loads anticipated within an industrial environment.

  18. An Eco-friendly, Scaled-down Gram Stain Protocol

    Directory of Open Access Journals (Sweden)

    Ruth A. Gyure

    2010-04-01

    Full Text Available Currently, flushing large volumes of Gram stain reagents into sanitary sewage systems is no longer acceptable. These chemical wastes are highly regulated and must be collected, labeled, and disposed of in a responsible manner, usually by paying a commercial service to remove them to an authorized off-site facility. Such services are costly and, as expected, costs are proportional to volume of collected waste. This “old” method of Gram staining, even if effluent is collected, generates a high volume of liquid waste which is unnecessarily diluted with additional large volumes of water from the rinsing steps. The purpose of using this scaled-down and eco-friendly protocol is to dramatically reduce the amount of liquid waste produced without sacrificing quality of results. This protocol is flexible, practical, and easy to implement. It does not require students to work at a bench sink, reduces user cost, and lowers environmental impact overall.

  19. Transfer learning improves supervised image segmentation across imaging protocols

    DEFF Research Database (Denmark)

    van Opbroek, Annegreet; Ikram, M. Arfan; Vernooij, Meike W.;

    2015-01-01

    well, often require a large amount of labeled training data that is exactly representative of the target data. We therefore propose to use transfer learning for image segmentation. Transfer-learning techniques can cope with differences in distributions between training and target data, and therefore......The variation between images obtained with different scanners or different imaging protocols presents a major challenge in automatic segmentation of biomedical images. This variation especially hampers the application of otherwise successful supervised-learning techniques which, in order to perform...... may improve performance over supervised learning for segmentation across scanners and scan protocols. We present four transfer classifiers that can train a classification scheme with only a small amount of representative training data, in addition to a larger amount of other training data...

  20. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  1. Regenerative endodontic therapy: a data analysis of clinical protocols.

    Science.gov (United States)

    Kontakiotis, Evangelos G; Filippatos, Christos G; Tzanetakis, Giorgos N; Agrafioti, Anastasia

    2015-02-01

    The aim of the present study was to systematically analyze the protocols that have been used in regenerative endodontic therapy and to detect any variations in clinical procedures. An electronic search was executed in PubMed using appropriate Medical Subject Heading terms covering the period from January 1993 to May 2014. Additional publications from hand searching and the reference section of each relevant article enriched the article list. The relevance of each article was initially evaluated by scanning all titles and corresponding abstracts. The definite inclusion of each article in the study was determined by using specific criteria applied independently by 3 reviewers. Sixty relevant publications were finally included. The canal walls were not mechanically instrumented in 68% of the clinical articles. Sodium hypochlorite was included in 97% of the clinical studies either as the only irrigant or in combination with other irrigants. Antibiotic combination paste was used as the intracanal medicament in 80% of the clinical articles. Sodium hypochlorite, chlorhexidine, and EDTA were used in the final irrigation protocol in 75%, 4%, and 13% of the clinical studies, respectively. Neither the creation of a blood clot nor the use of platelet-rich plasma/platelet-rich fibrin was described in 13% of the clinical articles. Mineral trioxide aggregate was used as an intracanal coronal barrier in 85% of the relevant clinical studies. The variability of the clinical protocols applied during regenerative enododontic procedures is considerably high. A thorough analysis of regenerative protocols may constitute an additional source to provide useful clinical considerations for REPs. Copyright © 2015 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  2. Protocolized hyperventilation enhances electroconvulsive therapy.

    Science.gov (United States)

    de Arriba-Arnau, Aida; Dalmau, Antonia; Soria, Virginia; Salvat-Pujol, Neus; Ribes, Carmina; Sánchez-Allueva, Ana; Menchón, José Manuel; Urretavizcaya, Mikel

    2017-08-01

    Hyperventilation is recommended in electroconvulsive therapy (ECT) to enhance seizures and to increase patients' safety. However, more evidence is needed regarding its effects and the optimum method of application. This prospective study involving 21 subjects compared two procedures, protocolized hyperventilation (PHV) and hyperventilation as usual (HVau), applied to the same patient in two consecutive sessions. Transcutaneous partial pressure of carbon dioxide (TcPCO2) was measured throughout all sessions. Ventilation parameters, hemodynamic measures, seizure characteristics, and side effects were also explored. PHV resulted in lower TcPCO2 after hyperventilation (p=.008) and over the whole session (p=.035). The lowest TcPCO2 was achieved after voluntary hyperventilation. Changes in TcPCO2 from baseline showed differences between HVau and PHV at each session time-point (all p<.05). Between- and within-subjects factors were statistically significant in a general linear model. Seizure duration was greater in PHV sessions (p=.028), without differences in other seizure quality parameters or adverse effects. Correlations were found between hypocapnia induction and seizure quality indexes. Secondary outcomes could be underpowered. PHV produces hypocapnia before the stimulus, modifies patients' TcPCO2 values throughout the ECT session and lengthens seizure duration. Voluntary hyperventilation is the most important part of the PHV procedure with respect to achieving hypocapnia. A specific ventilation approach, CO2 quantification and monitoring may be advisable in ECT. PHV is easy to apply in daily clinical practice and does not imply added costs. Ventilation management has promising effects in terms of optimizing ECT technique. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Efficient Privacy Preserving Protocols for Similarity Join

    Directory of Open Access Journals (Sweden)

    Bilal Hawashin

    2012-04-01

    Full Text Available During the similarity join process, one or more sources may not allow sharing its data with other sources. In this case, a privacy preserving similarity join is required. We showed in our previous work [4] that using long attributes, such as paper abstracts, movie summaries, product descriptions, and user feedbacks, could improve the similarity join accuracy using supervised learning. However, the existing secure protocols for similarity join methods can not be used to join sources using these long attributes. Moreover, the majority of the existing privacy‐preserving protocols do not consider the semantic similarities during the similarity join process. In this paper, we introduce a secure efficient protocol to semantically join sources when the join attributes are long attributes. We provide two secure protocols for both scenarios when a training set exists and when there is no available training set. Furthermore, we introduced the multi‐label supervised secure protocol and the expandable supervised secure protocol. Results show that our protocols can efficiently join sources using the long attributes by considering the semantic relationships among the long string values. Therefore, it improves the overall secure similarity join performance.

  4. A fully efficient secure quantum cryptography protocol

    CERN Document Server

    Xiang Bin Wang

    2001-01-01

    Since Bennett and Brassard suggested their quantum key distribution protocol(BB84 protocol) in 1984, the subject has been extensively studied both theoretically and experimentally. The protocol allows two remote parties Alice and Bob to create and share a secret key using a quantum channel and public authenticated communications. The quantum key created in this way is in principle secure because eavesdroppers have no way to tap the quantum channel without disturb it. In the protocol, two level quantum bits are measured in two basis, $X$ and $Z$ randomly by Bob. So at least half of the measurement results will be discarded because Bob has a half probability taking the measurement in a wrong basis. On the other hand, the security is not the maximum in BB84 protocol. To increase the security, one may straightforwardly increase the number of basis used in the protocol. For example, six state protocol was proposed recently for two level system. However, in this way, it seems to be the case that the higher the secu...

  5. Snakebite management in Iran: Devising a protocol

    Directory of Open Access Journals (Sweden)

    Seyed Mostafa Monzavi

    2014-01-01

    Full Text Available Background: Snakebite in Iran has been a health concern. However, management of snakebite is not standardized and varies from center to center. This study is aimed at devising an evidence-based comprehensive protocol for snakebite management in Iran, to reduce unnecessary variations in practice. Materials and Methods: A narrative search in electronic databases was performed. Fifty peer-reviewed articles, guidelines, and textbooks were reviewed and practical details were extracted. Our currently used protocol in the Mashhad Toxicology Center was supplemented with this information. Consequently an improved wide-range protocol was developed. The protocol was then discussed and amended within a focus group comprised of medical toxicologists and internal medicine specialists. The amended version was finally discussed with expert physicians specialized in different areas of medicine, to be optimized by supplementing other specific considerations. Results: During a one-year process, the protocol was finalized. The final version of the protocol, which was designed in six steps, comprised of three components: A schematic algorithm, a severity grading scale, and instructions for supportive and adjunctive treatments. The algorithm pertains to both Viperidae and Elapidae snakebite envenomations and consists of a planned course of action and dosing of antivenom, based on the severity of the envenomation. Conclusion: Snakebite envenomation is a clinical toxicologic emergency, which needs to be treated in a timely and organized manner. Hence, a multi-aspect protocol was designed to improve the clinical outcomes, reduce unnecessary administration of antivenom, and help physicians make more proper clinical judgments.

  6. Computational design of enhanced learning protocols.

    Science.gov (United States)

    Zhang, Yili; Liu, Rong-Yu; Heberton, George A; Smolen, Paul; Baxter, Douglas A; Cleary, Leonard J; Byrne, John H

    2011-12-25

    Learning and memory are influenced by the temporal pattern of training stimuli. However, the mechanisms that determine the effectiveness of a particular training protocol are not well understood. We tested the hypothesis that the efficacy of a protocol is determined in part by interactions among biochemical cascades that underlie learning and memory. Previous findings suggest that the protein kinase A (PKA) and extracellular signal-regulated kinase (ERK) cascades are necessary to induce long-term synaptic facilitation (LTF) in Aplysia, a neuronal correlate of memory. We developed a computational model of the PKA and ERK cascades and used it to identify a training protocol that maximized PKA and ERK interactions. In vitro studies confirmed that the protocol enhanced LTF. Moreover, the protocol enhanced the levels of phosphorylation of the transcription factor CREB1. Behavioral training confirmed that long-term memory also was enhanced by the protocol. These results illustrate the feasibility of using computational models to design training protocols that improve memory.

  7. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  8. COOPERATIVE ARQ PROTOCOL FOR CORRELATED WIRELESS CHANNELS

    Institute of Scientific and Technical Information of China (English)

    Yu Guanding; Zhang Zhaoyang; Qiu Peiliang

    2006-01-01

    A novel Automatic repeat ReQuest (ARQ) protocol called cooperative ARQ is presented in this letter, where a relay terminal is requested to retransmit an erroneously received packet, instead of the source terminal. The data link layer Packet Error Rate (PER) performance of cooperative ARQ is derived in correlated wireless channel. The results show that even though the relay-destination channel is worse than the sourcedestination channel, the new protocol outperforms the traditional one as long as the average SNR of the relaydestination channel is better than a certain threshold. It is also demonstrated that a second order diversity gain can be achieved with the cooperative ARQ protocol.

  9. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  10. Analysis of Enhanced Associativity Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Said A. Shaar

    2006-01-01

    Full Text Available This study introduces an analysis to the performance of the Enhanced Associativity Based Routing protocol (EABR based on two factors; Operation complexity (OC and Communication Complexity (CC. OC can be defined as the number of steps required in performing a protocol operation, while CC can be defined as the number of messages exchanged in performing a protocol operation[1]. The values represent the worst-case analysis. The EABR has been analyzed based on CC and OC and the results have been compared with another routing technique called ABR. The results have shown that EABR can perform better than ABR in many circumstances during the route reconstruction.

  11. ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    Amit Rana

    2012-09-01

    Full Text Available The Internet Engineering Task Force (IETF has proposednew protocols for highly secured wireless networking. Thepurpose of this paper is to implement one such proposedsecurity protocol - PEAP (Protected ExtensibleAuthentication Protocol [1]. PEAP was jointly developedby Microsoft, Cisco and RSA security. The protocolimplementation is done on the server end of a Client/Servernetwork model on a RADIUS server (RemoteAuthentication Dial-in User Service. The proposedprotocol - PEAP provides for Client identity protection andkey generation thus preventing unauthorized user accessand protecting or encrypting the data against maliciousactivities.

  12. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  13. Será que as laranjas e a cana-de-açúcar da Flórida azedam o livre comércio? uma análise de ratificação de nível II da política comercial dos Estados Unidos com o Brasil Do Florida oranges and sugarcane sour free trade? a level II ratification analysis of United States trade policy with Brasil

    Directory of Open Access Journals (Sweden)

    Mark Langevin

    2006-06-01

    Full Text Available O estado da Flórida e seus produtores de laranja e de cana-de-açúcar colocam-se no centro do palco das relações econômicas entre os Estados Unidos e o Brasil e do drama da Área de Livre Comércio das Américas (ALCA. Poderosos e persistentes, esses modestos interesses econômicos têm sua importância política amplificada pelo papel de pivô da Flórida nas recentes eleições presidenciais dos Estados Unidos. Aumentado pelo papel de pivô do estado no Colégio Eleitoral, os interesses dos setores de laranja e de cana-de-açúcar têm efetivamente restringido a autonomia do Executivo dos EUA. Este trabalho emprega a teoria de ratificação de acordos internacionais de Putnam e examina as contribuições de campanha dessas indústrias para explorar os desafios de ratificação de Nível II associado à influência política das principais forças protecionistas da Flórida. Este exame demonstra como os interesses faccionais e as instituições políticas podem se cruzar para ampliar a importância de indústrias com interesses estreitos e prescritos territorialmente, sob condições de alta incerteza eleitoral. Por fim, o artigo explora as implicações desses interesses inegociáveis sobre as relações EUA-Brasil e a política comercial brasileira.The state of Florida and its orange and sugarcane producers stand at the center-stage of United States - Brazil economic relations and the Free Trade in the Americas (FTAA drama. Powerful and persistent, the political importance of these modest economic interests is amplified by Florida's pivotal role in United States' presidential elections of late. Magnified by the the state's pivotal role in the Electoral College, Florida orange and sugarcane interests have effectively restricted the autonomy of the U.S. Executive. This paper employs Putnam's(1988 international agreement ratification theory and examines these industries campaign contributions to explore the Level II ratification challenges

  14. The Additive Hazard Mixing Models

    Institute of Scientific and Technical Information of China (English)

    Ping LI; Xiao-liang LING

    2012-01-01

    This paper is concerned with the aging and dependence properties in the additive hazard mixing models including some stochastic comparisons.Further,some useful bounds of reliability functions in additive hazard mixing models are obtained.

  15. ADDITIVES USED TO OBTAIN FOOD

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2012-01-01

    Full Text Available Use of food additives in food is determined by the growth of contemporary food needs of the world population. Additives used in food, both natural and artificial ones, contribute to: improving the organoleptic characteristics and to preserve the food longer, but we must not forget that all these additives should not be found naturally in food products. Some of these additives are not harmful and human pests in small quantities, but others may have harmful effects on health.

  16. The impacts of electricity dispatch protocols on the emission reductions due to wind power and carbon tax.

    Science.gov (United States)

    Yu, Yang; Rajagopal, Ram

    2015-02-17

    Two dispatch protocols have been adopted by electricity markets to deal with the uncertainty of wind power but the effects of the selection between the dispatch protocols have not been comprehensively analyzed. We establish a framework to compare the impacts of adopting different dispatch protocols on the efficacy of using wind power and implementing a carbon tax to reduce emissions. We suggest that a market has high potential to achieve greater emission reduction by adopting the stochastic dispatch protocol instead of the static protocol when the wind energy in the market is highly uncertain or the market has enough adjustable generators, such as gas-fired combustion generators. Furthermore, the carbon-tax policy is more cost-efficient for reducing CO2 emission when the market operates according to the stochastic protocol rather than the static protocol. An empirical study, which is calibrated according to the data from the Electric Reliability Council of Texas market, confirms that using wind energy in the Texas market results in a 12% CO2 emission reduction when the market uses the stochastic dispatch protocol instead of the 8% emission reduction associated with the static protocol. In addition, if a 6$/ton carbon tax is implemented in the Texas market operated according to the stochastic protocol, the CO2 emission is similar to the emission level from the same market with a 16$/ton carbon tax operated according to the static protocol. Correspondingly, the 16$/ton carbon tax associated with the static protocol costs 42.6% more than the 6$/ton carbon tax associated with the stochastic protocol.

  17. Detergent Additive for Lubricating Oils,

    Science.gov (United States)

    The Russian patent pertains to a method of producing additives for lubricating oils . A method is known for producing an antiwear additive for... lubricating oils by processing phenols with phosphorus oxychloride, phosphoric acid esters are obtained. In order to give the additive detergent properties

  18. Comparison of a kayaking ergometer protocol with an arm crank protocol for evaluating peak oxygen consumption.

    Science.gov (United States)

    Forbes, Scott C; Chilibeck, Philip D

    2007-11-01

    The purpose of this study was to compare a kayak ergometer protocol with an arm crank protocol for determining peak oxygen consumption (V(.-)O2). On separate days in random order, 10 men and 5 women (16-24 years old) with kayaking experience completed the kayak ergometer protocol and a standardized arm crank protocol. The kayak protocol began at 70 strokes per minute and increased by 10 strokes per minute every 2 minutes until volitional fatigue. The arm crank protocol consisted of a crank rate of 70 revolutions per minute, initial loading of 35 W and subsequent increases of 35 W every 2 minutes until volitional fatigue. The results showed a significant difference (p kayak ergometer and the arm crank protocols for relative peak V(.-)O2 (47.5 +/- 3.9 ml x kg(-1) x min(-1) vs. 44.2 +/- 6.2 ml x kg(-1) x min(-1)) and absolute peak V(.-)O2 (3.38 L x min(-1) +/- 0.53 vs. 3.14 +/- 0.64 L x min(-1)). The correlation between kayak and arm crank protocol was 0.79 and 0.90, for relative and absolute V(.-)O2 peak, respectively (both p kayak ergometer may be due to the greater muscle mass involved compared to the arm crank ergometer. The kayak ergometer protocol may therefore be more specific to the sport of kayaking than an arm crank protocol.

  19. An improved protocol for isolation and culture of mesenchymal stem cells from mouse bone marrow

    Directory of Open Access Journals (Sweden)

    Shuo Huang

    2015-01-01

    Full Text Available Mesenchymal stem cells (MSCs from bone marrow are main cell source for tissue repair and engineering, and vehicles of cell-based gene therapy. Unlike other species, mouse bone marrow derived MSCs (BM-MSCs are difficult to harvest and grow due to the low MSCs yield. We report here a standardised, reliable, and easy-to-perform protocol for isolation and culture of mouse BM-MSCs. There are five main features of this protocol. (1 After flushing bone marrow out of the marrow cavity, we cultured the cells with fat mass without filtering and washing them. Our method is simply keeping the MSCs in their initial niche with minimal disturbance. (2 Our culture medium is not supplemented with any additional growth factor. (3 Our method does not need to separate cells using flow cytometry or immunomagnetic sorting techniques. (4 Our method has been carefully tested in several mouse strains and the results are reproducible. (5 We have optimised this protocol, and list detailed potential problems and trouble-shooting tricks. Using our protocol, the isolated mouse BM-MSCs were strongly positive for CD44 and CD90, negative CD45 and CD31, and exhibited tri-lineage differentiation potentials. Compared with the commonly used protocol, our protocol had higher success rate of establishing the mouse BM-MSCs in culture. Our protocol may be a simple, reliable, and alternative method for culturing MSCs from mouse bone marrow tissues.

  20. Protocol converter for serial communication between digital rectifier controllers and a power plant SCADA system

    Directory of Open Access Journals (Sweden)

    Vukić Vladimir Đ.

    2016-01-01

    Full Text Available The paper describes the protocol converter INT-485-MBRTU, developed for serial communication between the thyristor rectifier (based on the proprietary protocol "INT-CPD-05", according to standard RS-485 and the SCADA system (based on protocol "Modbus RTU", of the same standard in the thermal power plant "Nikola Tesla B1". Elementary data on industrial communication protocols and communication gateways were provided. The basic technical characteristics of the "Omron" programmable logic controller CJ series were described, as well as the developed device INT-485-MBRTU. Protocol converters with two versions of communication software were tested, differing only in one control word, intended for a forced successive change of communication sequences, in opposite to automatic sequence relieve. The device iNT-485-MBRTU, with the program for forced successive change of communication sequences, demonstrated the reliability of data transfer of 100 %, in a sample of approximately 480 messages. For nearly the same sample, the same protocol converter, with a version of the program without any type of message identifiers, transferred less than 60 % of the foreseen data. During multiple sixty-hour tests, the reliability of data transfer of at least 99.9979% was recorded, in 100% of the analysed cases, and for a sample of nearly 96,000 pairs of the send and receive messages. We analysed the results and estimated the additional possibilities for application of the INT-485-MBRTU protocol converter.

  1. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Nenad Kojić

    2012-06-01

    Full Text Available The networking infrastructure of wireless mesh networks (WMNs is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs. This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission. The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.

  2. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  3. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    Science.gov (United States)

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  4. A neural networks-based hybrid routing protocol for wireless mesh networks.

    Science.gov (United States)

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.

  5. Dynamic vs. fixed bag filling: impact on cardiac output rebreathing protocol.

    Science.gov (United States)

    Zavorsky, Gerald S; Beck, Kenneth C; Cass, Lauren M; Artal, Raul; Wagner, Peter D

    2010-04-15

    The purpose of this study was to compare the repeatability (2.77 multiplied by the within-subject SD)between two different rebreathing protocols on cardiac output ( ˙Q ), pulmonary diffusing capacity for carbon monoxide (DLCO) and nitric oxide (DLNO), and pulmonary capillary blood volume (Vc). This study compared two bag volume protocols [Fixed Bag Volume (FBV) = bag volume fixed at 60% of forced vital capacity; Dynamic Bag Volume (DBV) = bag volume matched to tidal volume at each stage of exercise].Ten females (age = 27±8 yrs; ˙VO2, (peak)=2.5±0.6 L/min had measurements at rest (12%), 52%, 88%, and 100% of ˙VO2, (peak) on two study days. Neither the slope nor intercept of ˙Q vs. ˙VO2 were different between either bag volume protocols. The slope of DLCO vs. ˙Q was the same but the intercept was higher for the FBV protocol. The bag volume affected the slope and the intercept between DLNO vs. ˙Q (p DLNO (p ≤ 0.06). Measurement error was lower for Vc when using the FBV protocol (p = 0.02). Also, the pattern of bag volume used during rebreathing maneuvers affected the relation between DLNO vs. ˙Q more than it affected DLCO vs. ˙Q , or Vc vs. ˙Q. Additionally, the FBV protocol provided less measurement error for Vc compared to the DBV protocol [corrected].

  6. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  7. Hybrid protocol of remote implementations of quantum operations

    Science.gov (United States)

    Zhao, Ning Bo; Wang, An Min

    2007-12-01

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum-state teleportation (BQST) [Huelga , Phys. Rev. A 63, 042303 (2001)] and the Wang protocol [Wang, Phys. Rev. A 74, 032317 (2006)]. The protocol is available for remote implementations of quantum operations in the restricted sets specified in the paper. We also give a proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to the BQST and Wang protocols.

  8. What parental characteristics can predict child maltreatment at the Emergency Department? Considering expansion of the Hague Protocol

    NARCIS (Netherlands)

    Diderich, H.M.; Dechesne, M.; Fekkes, M.; Verkerk, P.H.; Buitendijk, S.E.; Oudesluys-Murphy, A.M.

    2015-01-01

    The Hague Protocol considers three parental characteristics of Emergency Department adult patients to identify child abuse: (a) domestic violence, (b) intoxication, and (c) suicide attempt or auto mutilation. This study investigated whether additional parental characteristics could be included to im

  9. What parental characteristics can predict child maltreatment at the Emergency Department? Considering expansion of the Hague Protocol

    NARCIS (Netherlands)

    Diderich, H.M.; Dechesne, M.; Fekkes, M.; Verkerk, P.H.; Buitendijk, S.E.; Oudesluys-Murphy, A.M.

    2015-01-01

    The Hague Protocol considers three parental characteristics of Emergency Department adult patients to identify child abuse: (a) domestic violence, (b) intoxication, and (c) suicide attempt or auto mutilation. This study investigated whether additional parental characteristics could be included to im

  10. National Wildlife Refuge System Survey Protocol Template

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This template was developed for drafting National Wildlife Refuge System (NWRS) Survey Protocols. The template is arranged in the same order as the eight basic...

  11. ARC Code TI: Geometry Manipulation Protocol (GMP)

    Data.gov (United States)

    National Aeronautics and Space Administration — The Geometry Manipulation Protocol (GMP) is a library which serializes datatypes between XML and ANSI C data structures to support CFD applications. This library...

  12. Reparable Key Distribution Protocols for Internet Environments

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    It has claimed that any practical way to achieve perfect reparability for key distribution protocol (KDP) could only be futile. Fortunately, this paper presents reparable KDPs for internet environments with the use of the concept of timestamps.

  13. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  14. Protocol to Exploit Waiting Resources for UASNs.

    Science.gov (United States)

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-03-08

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  15. Multicast Routing Protocols in Adhoc Mobile networks

    Directory of Open Access Journals (Sweden)

    S.Nagaprasad,

    2010-11-01

    Full Text Available The majority of applications are in areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions where participants share information dynamically using their mobile devices. Well established routing protocols do exist to offer efficient multicasting service in conventional wired networks. These protocols, having been designed for fixed networks, may fails to keep up with node movements and frequent topology changes in a MANET. Therefore, adapting existing wired multicast protocols as such to a MANET, which completely lacks infrastructure, appear less promising. Providing efficient multicasting over MANET faces many challenges, includes scalability,quality of service, reliable service, security, Address configuration, Applications for multicast over MANET. The existing multicast routing protocol do not addresses these issues effectively over Mobile Adhoc Networks (MANET.

  16. Rethinking low extra delay background transport protocols

    CERN Document Server

    Carofiglio, Giovanna; Rossi, Dario; Testa, Claudio; Valenti, Silvio

    2010-01-01

    BitTorrent has recently introduced LEDBAT, a novel application-layer congestion control protocol for data exchange. The protocol design starts from the assumption that network bottlenecks are at the access of the network, and that thus user traffic competes creating self-inducing congestion. To relieve from this phenomenon, LEDBAT is designed to quickly infer that self-induced congestion is approaching (by detecting relative changes of the one-way delay in the transmission path), and to react by reducing the sending rate prior that congestion occurs. Prior work has however shown LEDBAT to be affected by a latecomer advantage, where newly arriving connections can starve already existing flows. In this work, we propose modifications to the congestion window update mechanism of the LEDBAT protocol that aim at solving this issue, guaranteeing thus intra-protocol fairness and efficiency. Closed-form expressions for the stationary throughput and queue occupancy are provided via a fluid model, whose accuracy is conf...

  17. Identity-based authentication protocol for grid

    Institute of Scientific and Technical Information of China (English)

    Li Hon; Sun Shixin; Yang Homiao

    2008-01-01

    Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol(SAP).The authentication process is very complicated,and therefore,the grid user is in a heavily loaded point both in computation and in communication.Based on identity-based architecture for grid(IBAG)and corre-sponding encryption and signature schemes,an identity-based authentication protocol for grid is proposed.Being certificate-free,the authentication protocol aligns well with the demands of grid computing.Through simulation testing,it is seen that the authentication protocol is more lightweight and efficient than SAP,especially the more lightweight user side.This contributes to the larger grid scalability.

  18. How to write a research protocol

    African Journals Online (AJOL)

    A well-written protocol ensures timely approval and smooth running of the research process, facilitates subsequent writing of the research report, and permits completion within the allotted time. ..... Cape Town:Juta and Company; 2011. 4.

  19. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  20. Standardized North American Marsh Bird Monitoring Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document describes monitoring protocols for marshbirds in North America. Monitoring parameters, field procedures, survey methods, timing of surveys, recording...

  1. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  2. How To Develop Survey Protocols: A Handbook

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This handbook provides a standard and guidance for developing and reviewing survey protocols used in the National Wildlife Refuge System. In the handbook, survey...

  3. Comparison of on Demand Routing Protocols

    Directory of Open Access Journals (Sweden)

    Bharat Bhushan

    2013-02-01

    Full Text Available A routing protocol is used to facilitate communication in ad hoc network. The primary goal of such a routing protocol is to provide an efficient and reliable path between a pair of nodes. The routing protocols for ad hoc network can be categorized into three categories: table driven, on demand and hybrid routing. The table driven and hybrid routing strategies require periodic exchange of hello messages between nodes of the ad hoc network and thus have high processing and bandwidth requirements. On the other hand on demand routing strategy creates routes when required and hence is very much suitable for ad hoc network. This paper therefore examines the performance of three on demand routing protocols at application layer using QualNet-5.01 simulator.

  4. Probabilistic Model--Checking of Quantum Protocols

    CERN Document Server

    Gay, S; Papanikolaou, N; Gay, Simon; Nagarajan, Rajagopal; Papanikolaou, Nikolaos

    2005-01-01

    We establish fundamental and general techniques for formal verification of quantum protocols. Quantum protocols are novel communication schemes involving the use of quantum-mechanical phenomena for representation, storage and transmission of data. As opposed to quantum computers, quantum communication systems can and have been implemented using present-day technology; therefore, the ability to model and analyse such systems rigorously is of primary importance. While current analyses of quantum protocols use a traditional mathematical approach and require considerable understanding of the underlying physics, we argue that automated verification techniques provide an elegant alternative. We demonstrate these techniques through the use of PRISM, a probabilistic model-checking tool. Our approach is conceptually simpler than existing proofs, and allows us to disambiguate protocol definitions and assess their properties. It also facilitates detailed analyses of actual implemented systems. We illustrate our techniqu...

  5. Hardening Stratum, the Bitcoin Pool Mining Protocol

    National Research Council Canada - National Science Library

    Ruben Recabarren; Bogdan Carbunar

    2017-01-01

    .... In this paper we exploit Stratum’s lack of encryption to develop passive and active attacks on Bitcoin’s mining protocol, with important implications on the privacy, security and even safety of mining equipment owners...

  6. Field validation of protocols developed to evaluate in-line mastitis detection systems.

    Science.gov (United States)

    Kamphuis, C; Dela Rue, B T; Eastwood, C R

    2016-02-01

    This paper reports on a field validation of previously developed protocols for evaluating the performance of in-line mastitis-detection systems. The protocols outlined 2 requirements of these systems: (1) to detect cows with clinical mastitis (CM) promptly and accurately to enable timely and appropriate treatment and (2) to identify cows with high somatic cell count (SCC) to manage bulk milk SCC levels. Gold standard measures, evaluation tests, performance measures, and performance targets were proposed. The current study validated the protocols on commercial dairy farms with automated in-line mastitis-detection systems using both electrical conductivity (EC) and SCC sensor systems that both monitor at whole-udder level. The protocol for requirement 1 was applied on 3 commercial farms. For requirement 2, the protocol was applied on 6 farms; 3 of them had low bulk milk SCC (128×10(3) cells/mL) and were the same farms as used for field evaluation of requirement 1. Three farms with high bulk milk SCC (270×10(3) cells/mL) were additionally enrolled. The field evaluation methodology and results were presented at a workshop including representation from 7 international suppliers of in-line mastitis-detection systems. Feedback was sought on the acceptance of standardized performance evaluation protocols and recommended refinements to the protocols. Although the methodology for requirement 1 was relatively labor intensive and required organizational skills over an extended period, no major issues were encountered during the field validation of both protocols. The validation, thus, proved the protocols to be practical. Also, no changes to the data collection process were recommended by the technology supplier representatives. However, 4 recommendations were made to refine the protocols: inclusion of an additional analysis that ignores small (low-density) clot observations in the definition of CM, extension of the time window from 4 to 5 milkings for timely alerts for CM

  7. Adaptive Baud Protocol For Wireless Communication

    OpenAIRE

    Eskafi, F. H.; Nassiri-toussi, K.; G. Liu

    1998-01-01

    In this paper, the authors propose an algorithm that increases and decreases the transmission speed according to a user-specified function. The design objective is to regulate baud as efficiently as possible and ensure that in each transmission interval, transmitter and receiver bauds are equal for some period of time during data transmission. An equivalent discrete-time version of the protocol is verified by using the COSPAN software. Application for this adaptive baud protocol for wireless ...

  8. Automatic Generation of Network Protocol Gateways

    Science.gov (United States)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia L.; Muller, Gilles

    The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them. Gateway construction, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers.

  9. A Framework for the Development of Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2003-01-01

    We present the χ-Spaces framework, a tool designed to support every step of a security protocol’s life cycle. Its Integrated Development Environment (IDE) eases the task of protocol design, debugging and simulation.......We present the χ-Spaces framework, a tool designed to support every step of a security protocol’s life cycle. Its Integrated Development Environment (IDE) eases the task of protocol design, debugging and simulation....

  10. Equilibria of Generalized Cut and Choose Protocols

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis; Kurokawa, David

    Classic cake cutting protocols — which fairly allocate a divisible good among agents with heterogeneous preferences — are susceptible to manipulation. Do their strategic outcomes still guarantee fairness? To answer this question we adopt a novel algo rithmic approach, proposing a concrete computa...... the stronger fairness notion of envy-freeness. Finally, we show that under an obliviousness restriction, which still allows the computation of approximately envy-free allocations, GCC protocols are guaranteed to have exact subgame perfect Nash equilibria...

  11. OAuth protocol for CERN Web Applications

    OpenAIRE

    Kleszcz, Emil; Rodriguez Fernandez, Luis; Marescaux, Nicolas Bernard

    2016-01-01

    Project Specification The CERN Authentication service has recently increased his offer of SSO protocols/frameworks with OAuth2 standard. The purpose of the work is to explain the need for an authorization standard and explain how does OAuth2 protocol addresses our requirements. OAuth is an open standard for authorization which provides a secure access to server resources that belongs to a user. As a wide known and relatively new standard (2012) is used by big players in the industry a...

  12. Dose protocols of acetylcholine test in Chinese

    Institute of Scientific and Technical Information of China (English)

    向定成; 龚志华; 何建新; 洪长江; 邱建; 马骏

    2004-01-01

    @@ Acetylcholine test has been widely used clinically in several countries as a practical test provoking coronary artery spasm.1-3 Although it has also been launched recently in a few hospitals in China, the dose protocol for acetylcholine test used in these hospitals were from abroad.4,5 This study was aimed at developing a dose protocol for acetylcholine test suitable for Chinese people.

  13. Quantum Key Distribution Protocol with User Authentication

    CERN Document Server

    Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

    2005-01-01

    We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

  14. Protocol for communications in potentially noisy environments

    Energy Technology Data Exchange (ETDEWEB)

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  15. Trust Authentication Protocol on the Web

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

  16. Secure Fingerprint Alignment and Matching Protocols

    OpenAIRE

    Bayatbabolghani, Fattaneh; Blanton, Marina; Aliasgari, Mehrdad; Goodrich, Michael

    2017-01-01

    We present three secure privacy-preserving protocols for fingerprint alignment and matching, based on what are considered to be the most precise and efficient fingerprint recognition algorithms-those based on the geometric matching of "landmarks" known as minutia points. Our protocols allow two or more honest-but-curious parties to compare their respective privately-held fingerprints in a secure way such that they each learn nothing more than a highly-accurate score of how well the fingerprin...

  17. Mutual Authentication Protocols for RFID Systems

    Institute of Scientific and Technical Information of China (English)

    Ashrar A. Omer; Johnson P. Thomas; Ling Zhu

    2008-01-01

    With the availability of low-cost radio frequency identification (RFID) tags, security becomes an increasing concern.However, such tags do not permit complex eryptographic functions due to their computational, communications, and storage limitations.In this paper, we investigate the security issues and requirements of RFID systems, and propose ultra-light weight and light weight protocols for low-cost RFID tags. The proposed protocols has been applied to a supply chain management system.

  18. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  19. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  20. Security Analysis of Broadcaster Group Key Exchange Protocols

    Institute of Scientific and Technical Information of China (English)

    LI Li; ZHANG Huanguo

    2006-01-01

    Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.

  1. EAR Protocol-Towards Fair Optimistic Non-Repudiation Exchange

    Institute of Scientific and Technical Information of China (English)

    WANG Hai-yan; WANG Ru-chuan

    2005-01-01

    Fairness is of crucial importance for the exchange protocols via Internet. Non-repudiation therefore becomes one of the vital premises, which are essential in the exchange of sensitive and important messages. This paper is to propose a new exchange protocol, termed "EAR" Exchange Protocol as it consists of three sub-protocols: Exchange sub-protocol, Abort sub-protocol and Recovery sub-protocol. It is to be argued that the incorporation of these three sub-protocols may effectively enables EAR to assure non-repudiation, strong fairness, timeliness, confidentiality and the minimized involvement of the Trusted Third Party (TTP).

  2. Improvement of an electrical activation protocol for porcine oocytes.

    Science.gov (United States)

    Zhu, Jie; Telfer, Evelyn E; Fletcher, Judy; Springbett, Anthea; Dobrinsky, John R; De Sousa, Paul A; Wilmut, Ian

    2002-03-01

    Factors influencing pig oocyte activation by electrical stimulation were evaluated by their effect on the development of parthenogenetic embryos to the blastocyst stage to establish an effective activation protocol for pig nuclear transfer. This evaluation included 1) a comparison of the effect of epidermal growth factor and amino acids in maturation medium, 2) an investigation of interactions among oocyte age, applied voltage field strength, electrical pulse number, and pulse duration, and 3) a karyotype analysis of the parthenogenetic blastocysts yielded by an optimized protocol based on an in vitro system of oocyte maturation and embryo culture. In the first study, addition of amino acids in maturation medium was beneficial for the developmental competence of activated oocytes. In the second study, the developmental response of activated oocytes was dependent on interactions between oocyte age at activation and applied voltage field strength, voltage field strength and pulse number, and pulse number and duration. The formation of parthenogenetic blastocysts was optimal when activation was at 44 h of maturation using three 80-microsec consecutive pulses of 1.0 kV/cm DC. Approximately 84% of parthenogenetic blastocysts yielded by this protocol were diploid, implying a potential for further in vivo development.

  3. Implementation and Analysis of Real-Time Streaming Protocols.

    Science.gov (United States)

    Santos-González, Iván; Rivero-García, Alexandra; Molina-Gil, Jezabel; Caballero-Gil, Pino

    2017-04-12

    Communication media have become the primary way of interaction thanks to the discovery and innovation of many new technologies. One of the most widely used communication systems today is video streaming, which is constantly evolving. Such communications are a good alternative to face-to-face meetings, and are therefore very useful for coping with many problems caused by distance. However, they suffer from different issues such as bandwidth limitation, network congestion, energy efficiency, cost, reliability and connectivity. Hence, the quality of service and the quality of experience are considered the two most important issues for this type of communication. This work presents a complete comparative study of two of the most used protocols of video streaming, Real Time Streaming Protocol (RTSP) and the Web Real-Time Communication (WebRTC). In addition, this paper proposes two new mobile applications that implement those protocols in Android whose objective is to know how they are influenced by the aspects that most affect the streaming quality of service, which are the connection establishment time and the stream reception time. The new video streaming applications are also compared with the most popular video streaming applications for Android, and the experimental results of the analysis show that the developed WebRTC implementation improves the performance of the most popular video streaming applications with respect to the stream packet delay.

  4. Biopipe: a flexible framework for protocol-based bioinformatics analysis.

    Science.gov (United States)

    Hoon, Shawn; Ratnapu, Kiran Kumar; Chia, Jer-Ming; Kumarasamy, Balamurugan; Juguang, Xiao; Clamp, Michele; Stabenau, Arne; Potter, Simon; Clarke, Laura; Stupka, Elia

    2003-08-01

    We identify several challenges facing bioinformatics analysis today. Firstly, to fulfill the promise of comparative studies, bioinformatics analysis will need to accommodate different sources of data residing in a federation of databases that, in turn, come in different formats and modes of accessibility. Secondly, the tsunami of data to be handled will require robust systems that enable bioinformatics analysis to be carried out in a parallel fashion. Thirdly, the ever-evolving state of bioinformatics presents new algorithms and paradigms in conducting analysis. This means that any bioinformatics framework must be flexible and generic enough to accommodate such changes. In addition, we identify the need for introducing an explicit protocol-based approach to bioinformatics analysis that will lend rigorousness to the analysis. This makes it easier for experimentation and replication of results by external parties. Biopipe is designed in an effort to meet these goals. It aims to allow researchers to focus on protocol design. At the same time, it is designed to work over a compute farm and thus provides high-throughput performance. A common exchange format that encapsulates the entire protocol in terms of the analysis modules, parameters, and data versions has been developed to provide a powerful way in which to distribute and reproduce results. This will enable researchers to discuss and interpret the data better as the once implicit assumptions are now explicitly defined within the Biopipe framework.

  5. Network-topology-adaptive quantum conference protocols

    Institute of Scientific and Technical Information of China (English)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication,quantum multiparty conference has made multiparty secret communication possible.Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology.However,the topology of the quantum network significantly affects the communication efficiency,e.g.,parallel transmission in a channel with limited bandwidth.We have proposed two distinctive protocols,which work in two basic network topologies with efficiency higher than the existing ones.We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping.Another protocol,based on quantum multicasting with quantum data compression,which can improve the efficiency of the network,works in the star-like network.The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption.In general,the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols.

  6. Verifier-based Password Authenticated 3P-EKE Protocol using PCLA keys

    Directory of Open Access Journals (Sweden)

    Archana Raghuvamshi

    2016-06-01

    Full Text Available This paper endeavors to present a novel framework for the generic structure of a verifier-based password authenticated Three-Party Encrypted Key Exchange (3P-EKE protocol which yields more efficient protocol than the ones knew before. A previous framework presented by Archana and Premchand is more secured against all types of attacks like password guessing, replay, pre-play, man-in-the-middle attack etc. But unfortunately, this protocol does not solve the problem of a server compromise. These proofs help as inspiration to search for another framework. The framework we offer produces more efficient 3P-EKE protocol, and, in addition, delivers perceptive clarification about the existing attacks that do not solve in the previous framework. Moreover, it allows direct change from a class of verge private-key encryption to a hybrid (symmetric & Asymmetric one without significant overhead.

  7. Decryptable to Your Eyes: Visualization of Security Protocols at the User Interface

    CERN Document Server

    Nyang, DaeHun; Kwon, Taekyoung; Kang, Brent; Stavrou, Angelos

    2011-01-01

    The design of authentication protocols, for online banking services in particular and any service that is of sensitive nature in general, is quite challenging. Indeed, enforcing security guarantees has overhead thus imposing additional computation and design considerations that do not always meet usability and user requirements. On the other hand, relaxing assumptions and rigorous security design to improve the user experience can lead to security breaches that can harm the users' trust in the system. In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of the authentication process. To that end, we propose a family of visualized authentication protocols, a visualized transaction verification, and a "decryptable to your eyes only" protocol. Through rigorous analysis, we verify that our protocols are immune to many of the challenging authentication attacks applicable in the literature. Furthermore, using an extensive case study on a prototype o...

  8. An Energy-Aware Geographical Forwarding Protocol Utilizing Adaptive Sleeping in Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper proposes a novel energy-aware geographical forwarding protocol utilizing adaptive sleeping, in which each node selects its relay based on a new criterion that is based on its residual energy reserves and its geographical location to guarantee energy efficiency. In addition, this paper presents an adaptive sleep mechanism fully integrated into the new relay criterion, in which each node sleeps for a variable duration based on its residual energy reserves. Simulation results show that the proposed protocol significantly reduces the energy consumption of the network and improves its balance, especially when on heavy traffic load in dense networks. Our protocol is 20 times better in balancing the energy consumption compared with geographical random forwarding protocol.

  9. RMAC: A Reliable MAC Protocol Supporting Multicast for Wireless Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    Wei-Sheng Si; Cheng-Zhi Li

    2005-01-01

    This paper presents a new reliable MAC protocol called "RMAC" supporting reliable multicast for wireless ad hoc networks. By utilizing the busy tones to realize the multicast reliability, RMAC has three novelties: (1) it uses a variablelength control frame to stipulate an order for the receivers to respond, thus solving the feedback collision problem; (2) it extends the usage of busy tone for preventing data frame collisions into the multicast scenario; and (3) it introduces a new usage of busy tone for acknowledging data frames positively. In addition, RMAC is generalized into a comprehensive MAC protocol that provides both reliable and unreliable services for all the three modes of communications: unicast, multicast,and broadcast, making it capable of supporting various upper-layer protocols. The evaluation shows that RMAC achieves high reliability with very limited overhead. RMAC is also compared with other reliable MAC protocols, showing that RMAC not only provides higher reliability but also involves lower cost.

  10. A Novel Mutual RFID Authentication Protocol with Low Complexity and High Security

    Directory of Open Access Journals (Sweden)

    Samad Rostampour

    2014-02-01

    Full Text Available Radio Frequency Identification (RFID is a method for automated identifying objects. One of the problems of this technology is its security. RFID tags include resource limitation; therefore, the system designers cannot implement complex circuits to enhance their security. Usually the symmetric and asymmetric encryption methods increase resources and cost. Because it is believed to increasing security is inconsistent with the simplicity, the researchers mostly use one-way encryption methods. In this paper, we propose a mutual authentication protocol based on public key cryptography. The used encryption method includes high security and low complexity. This protocol performs in few steps and is suitable for portable devices with power limitation. In terms of security, the proposed protocol is robust against known attacks. In addition, we prove the protocol is secure by an analytical method.

  11. Protocol for the application of cooperative MIMO based on clustering in sparse wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    WANG Qing-hua; QU Yu-gui; LIN Zhi-ting; BAI Rong-gang; ZHAO Bao-hua; PAN Quan-ke

    2007-01-01

    Wireless sensor networks (WSN) using cooperative multiple-input multiple-output (MIMO) communication are effective tools to collect data in several environments. However, how to apply cooperative MIMO in WSN remains a critical challenge, especially in sparse WSN. In this article, a novel clustering scheme is proposed for the application of cooperative MIMO in sparse WSN by extending the traditional low-energy adaptive clustering hierarchy (LEACH) protocol. This clustering scheme solves the problem that the cluster heads (CH) cannot find enough secondary cluster heads (SCH), which are used to cooperate and inform multiple-antenna transmitters with CHs. On the basis of this protocol, the overall energy consumption of the networks model is developed, and the optimal number of CHs is obtained. The simulation results show that this protocol is feasible for the sparse WSN. The simulation results also illustrate that this protocol provides significant energy efficiencies, even after allowing for additional overheads.

  12. Management of Multiple Mobility Protocols and Tools in Dynamically Configurable Networks

    CERN Document Server

    Eisl, Jochen; Jokikyyny, Tony; Boreli, Roksana; Perera, Eranga; Pentikousis, Kostas

    2011-01-01

    Solutions for mobility management in wireless networks have been investigated and proposed in various research projects and standardization bodies. With the continuing deployment of different access networks, the wider range of applications tailored for a mobile environment, and a larger diversity of wireless end systems, it emerged that a single mobility protocol (such as Mobile IP) is not sufficient to handle the different requirements adequately. Thus a solution is needed to manage multiple mobility protocols in end systems and network nodes, to detect and select the required protocols, versions and optional features, and enable control on running daemons. For this purpose a mobility toolbox has been developed as part of the EU funded Ambient Networks project. This paper describes this modular management approach and illustrates the additional benefits a mobility protocol can gain by using state transfer as an example.

  13. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees

    OpenAIRE

    Li, Rebecca H.; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann

    2016-01-01

    A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency...

  14. Internetworking with Internet Protocol (IP) and Transmission Control Protocol (TCP) within the Military

    OpenAIRE

    Eikenberg, Bruce R.

    1990-01-01

    Approved for public release; distribution is unlimited. The backbone of the internetworking technology widely used by the military, as well as many civilian installations, is commonly referred to as TCP/IP. Transmission Control Protocol (TCP) and Internet Protocol (IP) are the two standard communication protocols from which TCP/IP receives its name. By utilizing TCP/IP, the majority of technical issues of interconnecting various computer technologies have become transparent to the user. Th...

  15. An assessment of the economic impacts of the Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-05-01

    In December 2001, the government of Alberta reviewed the costs of implementing the Kyoto Protocol which sets out a specific target for greenhouse gas reduction. It was determined that there is a wide range of estimated costs of implementing the Protocol. One of the reasons why the costs vary is that it is not fully known how Canada's competitiveness will be affected by the US withdrawal from the agreement. It was cautioned that the risk of creating different rules and different costs for competitors in the broad North American market would result in decreased competitiveness, loss of investment and loss of trade. If the Kyoto Protocol is ratified, Canada would become the only partner in within NAFTA that is subject to an emissions target. Canada's commitment to a Kyoto target would also jeopardize a continental energy policy. Other reasons for the varying costs include that the size of the challenge is a moving target, the price range for offsets on international markets will directly impact Canada's cost of compliance, and there is a need for jurisdictions to commit to a process to jointly determine a national climate change plan with clear rules that will limit costs, liability and competitiveness risks. The risk to the Alberta and Canadian economies are that current optimistic assumptions will not be fulfilled and that the reduction burden is greater than forecasted, therefore reduction prices will also be greater than expected. In addition, policy uncertainty would impose costs that would discourage investment. The measures that must be taken to improve confidence in understanding the risks to the Canadian economy include a further analysis of the costs based on very specific policy options, informed consultation with stakeholders, and both federal and provincial agreements on specific policies to reduce uncertainty and manage the risks associated with the Kyoto Protocol. 1 tab., 8 figs.

  16. 48 CFR 3404.170 - Ratification of unauthorized contract awards.

    Science.gov (United States)

    2010-10-01

    ... contracting authority, or by contracting officers acting in excess of the limits of their delegated authority... the HCA, or higher level official of the Department, who could have granted authority to enter into the commitment at the time it was made and still has the power to do so. ...

  17. Amendment of APPRE for Ratification of the International Conventions

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Ho Sik; Kwak, Sung Woo; Chang, Sung Soon; Seo, Hyung Min; Lee, Jeong Hoon; Lee, Jeong Ho [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2010-10-15

    Both the international community and the IAEA have been making efforts to strengthen the global regime on nuclear security. As a result of these efforts, two conventions regarding nuclear security were issued by the UN and IAEA. The International Convention for the Suppression of Acts of Nuclear Terrorism (NTC) and the Amendment to Convention of Physical Protection of Nuclear Material (CPPNMNF). The NTC entered into force in 2007, but the CPPNMNF still has not yet been enacted. In the work plan released after the 2010 Nuclear Security Summit (which was held in Washington D.C) these conventions were mentioned as important tools against nuclear terrorism. The purpose of these conventions was to prevent malicious acts against radioactive materials and nuclear facilities. The article also specifies strong penal provisions. Many countries which had ratified these conventions had to revise or change their domestic acts or laws in order conform to these new international regimes. The ROK signed these two conventions in 2005: however, it has not ratified them yet. The government has a plan to ratify them before the 2012 Nuclear Security Summit, which will be held in the ROK. Each article in the conventions should be reviewed thoroughly in terms of their effects on the domestic legal and institutional systems. The penal provisions regulating the conventions should especially be carefully scrutinized since their effects are considerable. In this paper, we compared the penal provisions in the conventions with the ROK's laws and selected the provisions that are not specified in the ROK's legal system. The proposed articles for amendment to the APPRE are also suggested

  18. 48 CFR 1501.602-3 - Ratification of unauthorized commitments.

    Science.gov (United States)

    2010-10-01

    ... to present its claim to the General Accounting Office in accordance with the instructions contained... commitments, whether oral or written and without regard to dollar value. Examples of unauthorized...

  19. 48 CFR 2401.602-3 - Ratification of unauthorized commitments.

    Science.gov (United States)

    2010-10-01

    ... HOUSING AND URBAN DEVELOPMENT GENERAL FEDERAL ACQUISITION REGULATION SYSTEM Career Development... commitment (see FAR 1.602-3(c)(5)) shall not be required when the value of the payment is equal to, or less...

  20. L’impératif sacrificiel et ses masques

    OpenAIRE

    Scubla, Lucien

    2007-01-01

    À propos de : Hyam Maccoby, L’exécuteur sacré. Le sacrifice humain et le legs de la culpabilité. Traduit de l’anglais par Elsa Rooke. Paris, Les Éditions du Cerf, 1999, 255 p., bibl., index, ill. (« Passages »).

  1. 48 CFR 2801.602-3 - Ratification of unauthorized commitments.

    Science.gov (United States)

    2010-10-01

    ... JUSTICE General DEPARTMENT OF JUSTICE ACQUISITION REGULATIONS SYSTEM Career Development, Contracting... the authority to ratify unauthorized commitments to the chief of the contracting office, except...

  2. Research of Video Steganalysis Algorithm Based on H265 Protocol

    Directory of Open Access Journals (Sweden)

    Wu Kaicheng

    2015-01-01

    This paper researches LSB matching VSA based on H265 protocol with the research background of 26 original Video sequences, it firstly extracts classification features out from training samples as input of SVM, and trains in SVM to obtain high-quality category classification model, and then tests whether there is suspicious information in the video sample. The experimental results show that VSA algorithm based on LSB matching can be more practical to obtain all frame embedded secret information and carrier and video of local frame embedded. In addition, VSA adopts the method of frame by frame with a strong robustness in resisting attack in the corresponding time domain.

  3. Epidemic Protocols for Pervasive Computing Systems - Moving Focus from Architecture to Protocol

    DEFF Research Database (Denmark)

    Mogensen, Martin

    2009-01-01

    Pervasive computing systems are inherently running on unstable networks and devices, subject to constant topology changes, network failures, and high churn. For this reason, pervasive computing infrastructures need to handle these issues as part of their design. This is, however, not feasible...... epidemic protocols as distribution mechanism for pervasive systems. The nature of epidemic protocols make them easy to implement, easy to deploy, and resilient to failures. By using epidemic protocols, it is possible to mitigate a wide range of the potential issues on the protocol layer. The result...... is lower complexity of building pervasive systems and higher robustness....

  4. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  5. Protocol Independent Multicast Based States Allocation

    Directory of Open Access Journals (Sweden)

    G Hemalatha

    2012-02-01

    Full Text Available In this paper the Protocol Independent Multicast (PIM protocol is being used. The PIM protocol avoids the packet drop and diverting problem. The PIM protocol is not dependent on any specific unicast routing protocol. It is IP routing independent protocol. The PIM uses the unicast and multicast information to create a distribution tree along the reverse path from the receivers towards the source. The PIM protocol consists of three modes such as sparse mode, dense mode and bidirectional mode. The sparse mode is used to sends the file from router to a receiver. The dense mode is used to sends the file from router to multiple receivers. The bidirectional mode is used to sends the message from router to sender and then continue the other process depending on the sender requirements. The client sends the file from sender to destination via the router. First the sender selects the file name and receiver name for transmission. Then the state is assigned automatically depend upon the user selection. The state can be defined by the number of destination selected to transmit the file from the source. If the sender selects single destination, it will assign “Without forwarding state router” for transmission. Otherwise it will assign “Forwarding state router” for transmission. If the receiver is not available, the router sends a message to sender such that “the requested receiver is not available”. Then the client will decide the file is transfer or not, it will reply with transfer the file, then the file will be transferred until the file will be discarded at client side. If the sender tries the same process after two times, the router will display the warning message as “the requested receiver is not available, this file will be discarded at client side”. Then it continues the other process.

  6. Additive interaction in survival analysis

    DEFF Research Database (Denmark)

    Rod, Naja Hulvej; Lange, Theis; Andersen, Ingelise

    2012-01-01

    It is a widely held belief in public health and clinical decision-making that interventions or preventive strategies should be aimed at patients or population subgroups where most cases could potentially be prevented. To identify such subgroups, deviation from additivity of absolute effects...... implementation guide of the additive hazards model is provided in the appendix....

  7. Additive Effects on Asymmetric Catalysis.

    Science.gov (United States)

    Hong, Liang; Sun, Wangsheng; Yang, Dongxu; Li, Guofeng; Wang, Rui

    2016-03-23

    This review highlights a number of additives that can be used to make asymmetric reactions perfect. Without changing other reaction conditions, simply adding additives can lead to improved asymmetric catalysis, such as reduced reaction time, improved yield, or/and increased selectivity.

  8. Density measures and additive property

    OpenAIRE

    Kunisada, Ryoichi

    2015-01-01

    We deal with finitely additive measures defined on all subsets of natural numbers which extend the asymptotic density (density measures). We consider a class of density measures which are constructed from free ultrafilters on natural numbers and study a certain additivity property of such density measures.

  9. Enantioselective Michael Addition of Water

    NARCIS (Netherlands)

    Chen, B.S.; Resch, V.; Otten, L.G.; Hanefeld, U.

    2014-01-01

    The enantioselective Michael addition using water as both nucleophile and solvent has to date proved beyond the ability of synthetic chemists. Herein, the direct, enantioselective Michael addition of water in water to prepare important β-hydroxy carbonyl compounds using whole cells of Rhodococcus st

  10. Density measures and additive property

    OpenAIRE

    Kunisada, Ryoichi

    2015-01-01

    We deal with finitely additive measures defined on all subsets of natural numbers which extend the asymptotic density (density measures). We consider a class of density measures which are constructed from free ultrafilters on natural numbers and study a certain additivity property of such density measures.

  11. Color Addition and Subtraction Apps

    Science.gov (United States)

    Ruiz, Frances; Ruiz, Michael J.

    2015-01-01

    Color addition and subtraction apps in HTML5 have been developed for students as an online hands-on experience so that they can more easily master principles introduced through traditional classroom demonstrations. The evolution of the additive RGB color model is traced through the early IBM color adapters so that students can proceed step by step…

  12. Color Addition and Subtraction Apps

    Science.gov (United States)

    Ruiz, Frances; Ruiz, Michael J.

    2015-01-01

    Color addition and subtraction apps in HTML5 have been developed for students as an online hands-on experience so that they can more easily master principles introduced through traditional classroom demonstrations. The evolution of the additive RGB color model is traced through the early IBM color adapters so that students can proceed step by step…

  13. Calcium addition in straw gasification

    DEFF Research Database (Denmark)

    Risnes, H.; Fjellerup, Jan Søren; Henriksen, Ulrik Birk

    2003-01-01

    The present work focuses on the influence of calcium addition in gasification. The inorganic¿organic element interaction as well as the detailed inorganic¿inorganic elements interaction has been studied. The effect of calcium addition as calcium sugar/molasses solutions to straw significantly...

  14. An Atom Counting QSPR Protocol

    CERN Document Server

    Giri, S; Chattaraj, P K; Roy, D R; Subramanian, V

    2006-01-01

    A deceptively simple descriptor, viz. the number of carbon / non-hydrogenic atoms present in a molecule, is proposed for the development of useful quantitative-structure-property-relationship (QSPR) models. It is tested in models pertaining to the estimation of boiling point of alcohols, enthalpy of vaporization of polychlorinated biphenyls (PCBs), n-octanol / water partition coefficient of PCBs and chloroanisoles, pKa values of carboxylic acids, phenols and alcohols etc. Very high values of various regression coefficients (R2, R2CV, R2Ad) suggest the significance of this descriptor which further improves in the resulting two-parameter QSPR models with electrophilicity or its local variant as an additional descriptor.

  15. Animation of Natural Language Specifications of Authentication Protocols

    Directory of Open Access Journals (Sweden)

    Mabroka A. Mayouf

    2008-01-01

    Full Text Available Problem Statement: A few visualization tools have been created for protocol design and analysis. Although these tools provide an environment for designing security protocols, each one has its own protocol definition language (its also called informal specification language. The problem is that the user should understand the language which related to the used tool in order to define an exist protocol or design a new one. For specification, a language needs to be intuitive as well as easily usable and understandable by the security protocol engineer. It must be able to precisely and unambiguously specify the behavior of security protocol. Approach: In this study, we propose an approach for protocol specification based on the Natural language definitions of protocol semantics. By using programmatic semantics together with animations, representational flexibility of different protocol demonstration is retained for as long as it is needed. Result: This study provides an environment that can be used by protocols designers to develop and investigate different scenarios of security protocols especially authentication protocols. Natural Language Protocol Specifications (NLPS approach is used to define the protocol. The environment accepts the natural language text of protocol specifications and converts it to animations of protocol behavior. Conclusions/Recommendations: NLPS environment can really help protocol designer to consider and investigate the behavior of security protocols. It can also be used for teaching-learning security protocol concepts. In further, we will consider the possibility of analyzing security protocols using our NLPS environment and animation techniques in order to improve the correctness; that is determining whether or not the intended security properties of a protocol do hold.

  16. Eccentricity in Zone Routing Protocol for MANET

    Directory of Open Access Journals (Sweden)

    Mrs Komal Nair

    2012-06-01

    Full Text Available A Mobile Ad-Hoc Network (MANET is a decentralized network of autonomous mobile nodes, able to communicate with each other over wireless links. Due to the mobility of the nodes, the topology ofthe network changes spontaneously, therefore use of conventional routing tables maintained at fixed points (routers is not suggested. Such a network may operate in a standalone fashion. There are variousrouting protocols available for MANETs. The most popular ones are DSR, DSDV and ZRP .The zone routing protocol (ZRP is a hybrid routing protocol that proactively maintains routes within a localregion of the network. ZRP can be configured for a particular network through adjustment of a single parameter, the routing zone radius. In this paper, we address the issue of configuring the ZRP to providethe best performance for a particular network at any time with the concept of eccentricity. The results illustrate the important characteristics of different protocols based on their performance and thus suggest some improvements in the respective protocol. The tools used for the simulation are NS2 which is the main simulator, NAM (Network Animator and Tracegraph which is used for preparing the graphs from the trace files.

  17. The Interplanetary Overlay Networking Protocol Accelerator

    Science.gov (United States)

    Pang, Jackson; Torgerson, Jordan L.; Clare, Loren P.

    2008-01-01

    A document describes the Interplanetary Overlay Networking Protocol Accelerator (IONAC) an electronic apparatus, now under development, for relaying data at high rates in spacecraft and interplanetary radio-communication systems utilizing a delay-tolerant networking protocol. The protocol includes provisions for transmission and reception of data in bundles (essentially, messages), transfer of custody of a bundle to a recipient relay station at each step of a relay, and return receipts. Because of limitations on energy resources available for such relays, data rates attainable in a conventional software implementation of the protocol are lower than those needed, at any given reasonable energy-consumption rate. Therefore, a main goal in developing the IONAC is to reduce the energy consumption by an order of magnitude and the data-throughput capability by two orders of magnitude. The IONAC prototype is a field-programmable gate array that serves as a reconfigurable hybrid (hardware/ firmware) system for implementation of the protocol. The prototype can decode 108,000 bundles per second and encode 100,000 bundles per second. It includes a bundle-cache static randomaccess memory that enables maintenance of a throughput of 2.7Gb/s, and an Ethernet convergence layer that supports a duplex throughput of 1Gb/s.

  18. Supporting Adaptation of Wireless Communication Protocols

    Directory of Open Access Journals (Sweden)

    LACHHMAN DAS DHOMEJA

    2016-10-01

    Full Text Available Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity, Bluetooth, IrDA (Infrared, etc. In order for pervasive devices to interact with each other, they need to have matching (alike communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth from what the server has (e.g. WiFi, connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange, L2CAP (Logical Link Control and Adaptation Protocol, RFCOM (Radio Frequency Communication and WiFi protocol and can run on (J2MW (Java 2 Micro Edition enabled mobile phones which support both Bluetooth and WiFi capabilities

  19. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  20. Performance Evaluation of Routing Protocols in MANET

    Directory of Open Access Journals (Sweden)

    Smitha Sunny

    2015-01-01

    Full Text Available Mobile Ad-Hoc Network (MANET is an autonomous system that is composed of the mobile nodes which communicates through wireless links without any preexisting infrastructure. MANET is a collection of mobile nodes which can self-organize freely and dynamically into arbitrary and temporary network topologies. Mobile nodes in ad-hoc networks function as a router and can dynamically establish routes among themselves by means of a routing protocol. Routing protocols in mobile ad-hoc network helps node to send and receive packets. Therefore, selection of an appropriate routing protocol is an integral part of establishing a MANET. A suitable and effective routing mechanism helps to extend the successful deployment of mobile ad-hoc networks. An attempt has been made to compare the performance between on-demand reactive routing protocols namely AODV, DSR and proactive routing protocol namely DSDV for Constant Bit Rate (CBR traffic by varying network scope i.e. number of participating nodes as well as by varying the speed. The parameters used for evaluation are Packet delivery ratio (PDR, Normalized routing overhead, Average end to end delay (Delay, Throughput and Average Energy consumption. The simulations are carried out using Network Simulator NS2:34.