WorldWideScience

Sample records for additional protocol ratification

  1. Law project adopted by the Senate and authorizing the ratification of the additional protocol to the agreement between France, the European atomic energy community and the international atomic energy agency relative to the application of warranties in France

    International Nuclear Information System (INIS)

    This project of law concerns an additional protocol to the agreement of warranties signed on September 22, 1998 between France, the European atomic energy community and the IAEA. This agreement concerns the declaration of all information relative to the R and D activities linked with the fuel cycle and involving the cooperation with a foreign country non endowed with nuclear weapons. These information include the trade and processing of nuclear and non-nuclear materials and equipments devoted to nuclear reactors (pressure vessels, fuel loading/unloading systems, control rods, force and zirconium tubes, primary coolant pumps, deuterium and heavy water, nuclear-grade graphite), to fuel reprocessing plants, to isotope separation plants (gaseous diffusion, laser enrichment, plasma separation, electromagnetic enrichment), to heavy water and deuterium production plants, and to uranium conversion plants. (J.S.)

  2. Additional protocol between France, EURATOM and IAEA. 2001-2002 ordinary session. Project of law authorizing the ratification of the additional protocol to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency relative to the application of warranties in France; Protocole additionnel entre la France, Euratom et l'AIEA. Session ordinaire de 2001-2002. Projet de loi autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    This additional protocol to the agreement between France, EURATOM and the IAEA aims at reinforcing the nuclear weapons non-proliferation regime. This protocol widens the field of competences of the IAEA with the supply of new information relative to: the civil nuclear cooperation between France and countries having no nuclear weapons in the domain of fuel cycle; the regular inspection of French nuclear facilities; the trade (import and export) of medium- or high-level radioactive wastes containing plutonium, highly enriched uranium or {sup 233}U, and the trade of some non-nuclear equipments or materials with countries having no nuclear weapons. The protocol defines also some practical dispositions relative to the delays and periodicity of controls, to the transmission of data, to the appointment of IAEA inspectors and their access to the facilities and sites considered. The list of the activities and equipments covered by the protocol are given in appendixes. (J.S.)

  3. Climate change ratification of the Kyoto Protocol : clearing the air on the debate

    International Nuclear Information System (INIS)

    The Kyoto Protocol on Climate Change would commit Canada to limit emissions of greenhouse gases to 6 per cent below 1990 levels by 2008-2012. The Canadian Chamber of Commerce has outlined the following 3 key prerequisites that the federal government should and will have in place before any decision on ratification is made: (1) a detailed plan for achieving the Kyoto reductions, (2) a detailed analysis of environmental and economic impacts associated with Kyoto implementation, and (3) consultations with all stakeholder and the Canadian public once the plan has been released. Currently, Canadian businesses are taking voluntary actions to reduce industrial sector emissions through programs such as the Canadian Industry Program for Energy Conservation. Between 1990 and 1999, industrial sector emissions fell by 6 per cent. However, it was emphasized that despite these efforts, the gap between Canada's Kyoto target and its current greenhouse gas emissions continues to grow because of population and economic growth and rising exports. At the current rate of growth, it is estimated that meeting the Kyoto target could cost the economy up to $30 billion in 2010. The paper also discusses the implementation of key flexibility mechanisms such as carbon sinks, Joint Implementation, the Clean Development Mechanism and credits for export of cleaner energy to the United States, a non-Kyoto country. It is argued that ratification of Kyoto could hurt investments and impact jobs in Canada by making Canadian industries uncompetitive relative to their American counterparts. It is emphasized that full participation by the Canadian public is required in adapting to major lifestyle changes to reduce the use of fossil fuels and other sources of greenhouse gases. In conclusion, the Canadian Chamber of Commerce does not believe that the Kyoto Protocol is the most effective and efficient way of moving forward on the climate change issue and recommends that the federal government develop a made

  4. Model Additional Protocol

    International Nuclear Information System (INIS)

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  5. Ratification of the Kyoto Protocol: a citizen's guide to the Canadian climate change policy process

    International Nuclear Information System (INIS)

    Canada is faced with the important decision of whether it should ratify the Kyoto Protocol. A reference for stakeholders and non-expert interested parties, this document is a guide into the Canadian Climate Change Policy Process. An understanding of climate science is required for climate policy, as is a knowledge of policy options available to overcome the challenges posed by climate change. The situation is further complicated by international and federal-provincial negotiations over the measures that should be implemented, if any. Climate policy affects all aspects of our lives, especially how we produce and use energy. An overview of climate science is provided in the first section, and the relationship between climate and rising temperatures due to greenhouse gas emissions is established. The sources of greenhouse gases in Canada are identified, with a closer look at the current trends. The Kyoto Protocol, if ratified, calls for Canada to reduce its emissions of greenhouse gases to six per cent below 1990 levels. It is noted that to date, Canada's emissions have risen 19.7 per cent above 1990 levels. The process underlying the international negotiations associated with the Kyoto Protocol, and especially Canada's role in it, are discussed. Flexibility mechanisms are strongly supported by Canada, such as credits for sinks, international carbon trading and credits for Clean Energy Exports. By approving such measures, the integrity of the Protocol would be considerably weakened. The domestic policy-making environment is examined, presenting key federal, provincial business and environmental players. In addition, the policy process in Canada is described, as well as the decisions made up to September 2002. Bibliographic and contact information is added in the last section of the document. 89 refs., 7 tabs., 7 figs

  6. Bill project authorizing the ratification of the amendment to the Kyoto protocol of the 11 December 1997 - Nr 1880

    International Nuclear Information System (INIS)

    This bill project first recalls the context of adoption of the amendment (objectives of the Kyoto protocol for the limitation of greenhouse gas emissions, adoption of the amendment in Durban to extend these commitments over a new eight-year long period). It indicates and describes the scope of the amendment according to its two articles and in relationship with the Kyoto protocol. The text of the amendment is provided, and then the text of the French bill project authorizing its ratification. This bill project also recalls the context, indicates the objectives of the amendment, discusses the estimated consequences (notably constraints) of its implementation in terms of reduction of greenhouse gas emissions and, more generally, in the struggle against climate change. These consequences are economic and financial, environmental, legal (and in relationship with the existing legal framework) and administrative. The history of the negotiation process is briefly recalled. It is noticed that five countries have already ratified the amendment at the time of publication of this bill project. Some remarks are made regarding the application of the amendment to the French overseas territories

  7. Additional protocol experience in Romania

    International Nuclear Information System (INIS)

    Full text: National Commission for Nuclear Activities Control (CNCAN) is the national regulatory body with regulation, authorization and control responsibilities. CNCAN has the right and obligation to ensure that safeguards are applied, in accordance with the terms of the safeguards agreement, on all source or special fissionable material in all peaceful nuclear activities within the State, under its jurisdiction or carried out under its control anywhere, for the exclusive purpose of verifying that such material is not diverted to nuclear weapons or other nuclear explosive devices. CNCAN has built a strong primary and secondary legislation in order to have a strong legal framework to fulfill the NPT, Safeguards Agreement and Additional Protocol requirements. In respect of the non-proliferation issues CNCAN has as a major goal to strengthen the effectiveness and to improve the efficiency of the safeguards system. Also closer co-operation between the IAEA and CNCAN as coordinator of the national system of accounting for and control of nuclear material has been developed by organizing international and national seminars on the implementation of safeguards and the additional protocol. After the entry into force of the Additional Protocol, CNCAN prepared appropriate declarations and answers to the relevant IAEA questions in order to obtain a drawn conclusion of the absence of undeclared nuclear material and nuclear activities within Romania territory. The IAEA evaluated in Romania not only the results of its nuclear material related activities under the Safeguards Agreement but also the results of its broader, more qualitative, evaluation and verification activities under the Additional Protocol. CNCAN assured that the IAEA inspectors have complementary access according to the Additional Protocol as requested in accordance with the provisions of the Safeguards Agreement and the Additional Protocol and cooperated in resolving in a timely manner, any questions or

  8. Law project adopted by the Senate and authorizing the ratification of the additional protocol to the agreement between France, the European atomic energy community and the international atomic energy agency relative to the application of warranties in France; Projet de loi adopte par le Senat autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en Franc

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    This project of law concerns an additional protocol to the agreement of warranties signed on September 22, 1998 between France, the European atomic energy community and the IAEA. This agreement concerns the declaration of all information relative to the R and D activities linked with the fuel cycle and involving the cooperation with a foreign country non endowed with nuclear weapons. These information include the trade and processing of nuclear and non-nuclear materials and equipments devoted to nuclear reactors (pressure vessels, fuel loading/unloading systems, control rods, force and zirconium tubes, primary coolant pumps, deuterium and heavy water, nuclear-grade graphite), to fuel reprocessing plants, to isotope separation plants (gaseous diffusion, laser enrichment, plasma separation, electromagnetic enrichment), to heavy water and deuterium production plants, and to uranium conversion plants. (J.S.)

  9. Workshop to promote the ratification of the protocol on heavy metals across the entire UN ECE region

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-12-15

    Within the workshop of the German Federal Environment Agency (Dessau-Rosslau, Federal Republic of Germany) at 14th to 16th May, 2008 in Yerevan (Armenia), the following lectures were held: (1) The convention and its protocols - framework and requirements (Tea Aulavuo); (2) Development of the heavy metals protocol up to now (D. Jost); (3) Experiences in transposing the obligations of the HM protocol into national law (Ivan Angelov); (4) Evaluation of concentrations of air pollutants and depositions of HM over the EECCA region (Ilia Ilyin); (5) The effectiveness of the HM protocol - emission reductions and costs (TNO-study) (M. van het Bolscher); (6) Technologies and techniques and their emission reduction potential and costs (Andre Peeters Weem); (7) Synergies of reduction of HM and particulate matter (Katja Kraus); (8) Critical loads / critical levels and effects of HM - integrated assessment (Jean-Paul Hettelingh); (9) Additional technical measures / options and their reduction potential (M. van het Bolscher); (10) Overview of the situation in the EECCA region - evaluation of a questionnaire of the Secretariat of the LRTAP Convention and ideas on revising the protocol and its annexes (Johan Sliggers); (11) Future aims of the TF (Katja Kraus).

  10. Protocol for ADDITION-PRO

    DEFF Research Database (Denmark)

    Johansen, Nanna Borup; Hansen, Anne-Louise Smidt; Jensen, Troels M;

    2012-01-01

    disease and microvascular diabetic complications. We also require a better understanding of the mechanisms that underlie and drive early changes in cardiometabolic physiology. The ADDITION-PRO study was designed to address these issues among individuals at different levels of diabetes risk recruited from...... and metabolic risk factors; (iii) objective measurement of physical activity behaviour; and (iv) long-term follow-up of hard clinical outcomes including mortality and cardiovascular disease. Results will inform policy recommendations concerning cardiovascular risk reduction and treatment among individuals...

  11. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  12. Kyoto's enemy : the american oil industry's influence in the signing and non-ratification of the Kyoto protocol

    OpenAIRE

    2006-01-01

    Executive Summary This study is an empirical and theoretical analysis of the influence obtained by the American oil industry in the United States decision to first sign and then not ratify the Kyoto Protocol. The purpose of the study is to explore and measure the influence the industry managed to obtain and then compare the period before the signing to the period between the signing and the decision to not ratify Kyoto. By employing theoretical framework, the empirical data collected wi...

  13. The challenges of additional protocol implementation

    International Nuclear Information System (INIS)

    The IAEA Board of Governors approved the Model Protocol Additional to Safeguards Agreements, INFCIRC/540, (referred to as the Additional Protocol) in May 1997. The Additional Protocol provides for new mechanisms that include expanded information on State's nuclear activities to be declared to the IAEA and increased physical access to locations for IAEA inspectors. Given the expanded capability under the additional protocol for the Agency to draw conclusions regarding the absence of undeclared nuclear material and activities, Safeguards Department staff have had to broaden their outlook with respect to all safeguards activities being conducted. Beyond verification of nuclear material, inspectors are being called upon to conduct a wider range of activities, with more emphasis on observation of indicators of a State's nuclear-related activities and consideration of the consistency of the other information with a State's declarations. This includes consideration of how the evaluation of all information available to the Agency affects the planning and prioritizing of future safeguards activities, for example in resolving questions or inconsistencies in the declared information or selecting locations for conducting complementary access. The implementation of strengthened safeguards and the additional protocol has led to a need to institutionally change the roles of many staff members in the various Safeguards Divisions and increase the interaction between the Divisions to most effectively draw State-level conclusions regarding the absence of undeclared nuclear material and activities. This paper focuses on the significant changes in the roles of safeguards inspectors, in particular facility officers and country officers, in the implementation of strengthened safeguards. It outlines the nature of the changes, and some of the challenges being faced in order to adapt to these roles, including changes in the nature of interaction between the Operations and Support Divisions

  14. Report realized on behalf of the Foreign Affairs Commission, of Defense and Armed Forces on the law project allowing the additional protocol ratification to the agreement between France, European Community of the atomic energy and the International Atomic Energy Agency relative to the guaranties application in France; Rapport fait au nom de la commission des affaires etrangeres, de la defense et des forces armees sur le projet de loi autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    In a first part the author presents the International Atomic Energy Agency and its missions in the nuclear non proliferation policy especially in the agreements with the states of the TNP (Treaty of Nuclear non Proliferation). the today position of France is then analyzed towards the IAEA and the novations added by the additional protocol. (A.L.B.)

  15. Report realized on the behalf of the Foreign Affairs Commission on the law project, adopted by the Senate, authorizing the added protocol ratification to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency relative to the guaranties application in France; Rapport fait au nom de la Commission des Affaires Etrangeres sur le projet de Loi, adopte par le Senat, autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-02-01

    This document presents the analyse of the law project, adopted by the Senate, authorizing the added protocol ratification to the agreement between France, the Atomic Energy European Community and the International Atomic Energy Agency relative to the guaranties application in France. It deals with the nuclear proliferation fight in France and the the program of enhancement of guaranties in the framework of the IAEA. (A.L.B.)

  16. IAEA to implement Safeguards Additional Protocols in the EU

    International Nuclear Information System (INIS)

    Full text: IAEA Director General Mohamed ElBaradei welcomed the entry into force today of the Additional Protocols for 15 States of the European Union - France, the United Kingdom and the 13 non-nuclear weapon States of the EU - and the European Atomic Energy Community (EURATOM). The Protocols, which provide the Agency with better tools to verify compliance with nuclear non-proliferation commitments, entered into force when the European Commission informed the Agency that EURATOM's own requirements for entry into force had been met. The 15 States had provided similar notifications over the past years since signing the Protocols in 1998. The simultaneous entry into force of Additional Protocols for the 15 EU States is 'a very positive development and a milestone in our efforts to strengthen the verification regime', said Dr. ElBaradei. 'In my view, the Additional Protocol should become the standard for verification under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).' He added that the Agency had been preparing for the entry into force of the EU protocols and was confident that, in co-operation with the 15 States and EURATOM, it would be able to ensure effective and efficient implementation in the EU States. The Model Additional Protocol was developed following the discovery of Iraq's clandestine nuclear weapons programme to ensure that the IAEA is given the information and access it needs for timely discovery of any similar activities in States that have pledged not to use nuclear material and activities for weapons purposes. In the past year, Additional Protocols entered into force for 22 countries, and the Agency will now implement Additional Protocols in 58 States, which includes the 15 EU States. The 10 countries joining the EU on 1 May 2004 - seven of which already have brought into force Additional Protocols to their respective safeguards agreements - are expected to gradually accede to the Safeguards Agreement and Additional Protocol covering

  17. Feature ratification procedures in some CIS countries

    Directory of Open Access Journals (Sweden)

    Eldar R. Hisamov

    2011-04-01

    Full Text Available This article attempts a comparative analysis of legislative procedures for the ratification of international treaties in various countries of the Commonwealth of Independent States (CIS.

  18. Report on July 2015 Additional Protocol Coordinators Best Practices Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Gitau, Ernest T.N. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Burbank, Roberta L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Finch, Valerie A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-07-31

    After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old), identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.

  19. The Role of Additional Pulses in Electropermeabilization Protocols

    Science.gov (United States)

    Suárez, Cecilia; Soba, Alejandro; Maglietti, Felipe; Olaiz, Nahuel; Marshall, Guillermo

    2014-01-01

    Electropermeabilization (EP) based protocols such as those applied in medicine, food processing or environmental management, are well established and widely used. The applied voltage, as well as tissue electric conductivity, are of utmost importance for assessing final electropermeabilized area and thus EP effectiveness. Experimental results from literature report that, under certain EP protocols, consecutive pulses increase tissue electric conductivity and even the permeabilization amount. Here we introduce a theoretical model that takes into account this effect in the application of an EP-based protocol, and its validation with experimental measurements. The theoretical model describes the electric field distribution by a nonlinear Laplace equation with a variable conductivity coefficient depending on the electric field, the temperature and the quantity of pulses, and the Penne's Bioheat equation for temperature variations. In the experiments, a vegetable tissue model (potato slice) is used for measuring electric currents and tissue electropermeabilized area in different EP protocols. Experimental measurements show that, during sequential pulses and keeping constant the applied voltage, the electric current density and the blackened (electropermeabilized) area increase. This behavior can only be attributed to a rise in the electric conductivity due to a higher number of pulses. Accordingly, we present a theoretical modeling of an EP protocol that predicts correctly the increment in the electric current density observed experimentally during the addition of pulses. The model also demonstrates that the electric current increase is due to a rise in the electric conductivity, in turn induced by temperature and pulse number, with no significant changes in the electric field distribution. The EP model introduced, based on a novel formulation of the electric conductivity, leads to a more realistic description of the EP phenomenon, hopefully providing more accurate

  20. International Workshops to Foster Implementation of the IAEA Additional Protocol

    International Nuclear Information System (INIS)

    A countrys adherence to the International Atomic Energy Agencys (IAEA) Additional Protocol is an important statement to the world of that countrys commitment to nuclear nonproliferation. Without the Additional Protocol (AP) it is possible, as demonstrated in Iraq, for a country party to the Non-Proliferation Treaty (NPT) to clandestinely work toward nuclear weapons and be undetected by the IAEA. This is because classical safeguards under the NPT are directed at diversion of nuclear material from declared activities. But a country may instead build undeclared activities to produce weapons-grade nuclear material. The AP is directed at detecting those undeclared activities. As of May 2003, 73 countries had signed the AP, but only 35 have entered into force. To further adherence to the AP, the IAEA has held regional, high-level seminars in Japan, South Africa, Kazakhstan, Peru, Romania, and Malaysia to explain AP provisions. To supplement these policy-level seminars, the U.S. Department of Energy (DOE) has undertaken to develop a set of modules of technical competencies required to implement the AP. The intent is to work closely with the IAEA by providing these technical competencies to countries as well as to complement the IAEAs regional seminars and other outreach efforts. This paper briefly describes the technical competency modules.

  1. Implementation of INFCIRC/193 and its additional protocol in the Slovak Republic

    International Nuclear Information System (INIS)

    requirements resulting from the Protocol. To enable the ratification of the Protocol Additional, first of all it was necessary to amend the Atomic Law and associated regulations. On 21 June 2004 the president of the Slovak Republic has signed the letter of accession of Slovakia to the safeguards agreement INFCIRC/193 including the relevant Additional Protocol. On 1 December 2005 this agreement entered into force. During the period between 1 May 2004 and 1 December 2005 the Slovak Republic had to report both to the IAEA (according INFCIRC/173) and to the European Commission (according to the Euratom Treaty and Regulation No. 302/2005). Starting from 1 December 2005 the UJD has begun with the implementation of INFCIRC/193 and its Protocol Additional. As an instrument supporting non-proliferation of nuclear weapons a control of export/import of nuclear material, nuclear related and dual-use material, equipment and technologies is being used. The government of the Slovak Republic like many other governments uses for this purpose licensing system. Basic principles for control of export/import of selected goods were defined in the Act No. 26/2002. The act clearly describes requirement of exporters/importers and also responsibility and powers of the regulator which is the Ministry of Economy of SR issuing license. In like manner as for safeguards, after accession to the EU, Regulation 1334/2000 setting up a Community regime for the control of exports of dual-use items and technology entered into force. The role of the UJD in the export/import control system is anchored in the Act No. 541/2004 Coll. The act gives the UJD power to issue permission for export/import of nuclear material, nuclear-related or dual-use material, equipment and technologies a list of which is included in Regulation 1334/2000. In issuing the permission the UJD strictly follows recommendations and requirements of the Regulation 1334/2000 and NSG guidelines published in the IAEA INFCIRC/254 and guidelines of the

  2. The Status of Implementation on Additional Protocol at KAERI

    International Nuclear Information System (INIS)

    Under the Additional Protocol, a State is required to provide the IAEA with further information on nuclear related activities, all buildings on a site, etc. through an expanded declaration and further access rights at a nuclear site and any location included in the expanded declaration. This paper describes the implementation status on the expanded declaration and the complementary access at KAERI under the AP. This paper reviewed the implementation status of the AP at KAERI, and there are some practical issues to prepare the expanded declarations as mentioned above. From the view point of the effective and efficient processing of the expanded declaration, it will be necessary to discuss the criterion for the definition of the nuclear fuel cycle-related R and D to be declared under the AP with IAEA

  3. New START: The Contentious Road to Ratification

    Directory of Open Access Journals (Sweden)

    Elizabeth Zolotukhina

    2011-01-01

    Full Text Available Senate ratification of the New START treaty re-established effective bilateral inspection and monitoring of American and Russian nuclear holdings and has the potential to further enhance U.S.-Russian cooperation on key issues, including containing the Iranian nuclear program, and further reductions in the two countries' arsenals. Although the accord was widely heralded as a foreign policy success of the Obama administration, the contentious Senate ratification may impede future progress on arms control.

  4. Recommended Protocol for Round Robin Studies in Additive Manufacturing

    Science.gov (United States)

    Moylan, Shawn; Brown, Christopher U.; Slotwinski, John

    2016-01-01

    One way to improve confidence and encourage proliferation of additive manufacturing (AM) technologies and parts is by generating more high quality data describing the performance of AM processes and parts. Many in the AM community see round robin studies as a way to generate large data sets while distributing the cost among the participants, thereby reducing the cost to individual users. The National Institute of Standards and Technology (NIST) has conducted and participated in several of these AM round robin studies. While the results of these studies are interesting and informative, many of the lessons learned in conducting these studies concern the logistics and methods of the study and unique issues presented by AM. Existing standards for conducting interlaboratory studies of measurement methods, along with NIST’s experience, form the basis for recommended protocols for conducting AM round robin studies. The role of round robin studies in AM qualification, some of the limitations of round robin studies, and the potential benefit of less formal collaborative experiments where multiple factors, AM machine being only one, are varied simultaneously are also discussed. PMID:27274602

  5. Development of the strengthened safeguards system and the Additional Protocol

    International Nuclear Information System (INIS)

    For the past 30 years, the IAEA's safeguards system has contributed to the international non-proliferation regime by providing, inter alia, assurances regarding the peaceful uses of declared nuclear material. However, the discovery of a clandestine nuclear weapons program in Iraq in 1991 drew world-wide attention to the need to strengthen the system to address the absence of undeclared nuclear material and activities. Efforts to strengthen the IAEA's safeguards system began in 1991 and culminated in 1997 when the IAEA's Board of Governors approved a Model Protocol Additional to IAEA Safeguards Agreements which greatly expands the legal basis and scope of IAEA safeguards. Within this strengthened system it is expected that the IAEA be able to provide assurance not only of the absence of diversion of declared nuclear material but also on the absence of undeclared nuclear material and activities. This is to be done within a safeguards system that uses an optimal combination of all safeguards measures available, thereby achieving maximum effectiveness and efficiency within the available resources. The paper summarizes the evolution of the safeguards system, describes strengthened safeguards, reports on the status of implementing the strengthening measures, and outlines plans for integrating all available safeguards measures. (author)

  6. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  7. CLASS ACTION AGAINST THE NON-IMMEDIACY OF RATIFICATION OF THE 1990 MIGRANT WORKERS CONVENTION

    OpenAIRE

    Wisnu Aryo Dewanto

    2014-01-01

    Ratification of treaties in Indonesia can be regarded as mere political acts, as ratification itself  does not yet rule for its enforcement in Indonesia’s jurisdiction. As stipulated in Article 11 of the 1945Indonesian Constitution, these ratifications are still subject to consent from the Indonesian House of Representatives (DPR) as they are the appointed institution in Indonesia with treaty-making powers. The act of ratification by the Indonesian Government is regarded as a ratification onl...

  8. Iran to sign additional protocol and suspend uranium enrichment and reprocessing

    International Nuclear Information System (INIS)

    Full text: Iran's representative to the IAEA, Ambassador Ali Akbar Salehi, today delivered a letter to IAEA Director General, Mohamed ElBaradei conveying his Government's acceptance of the Additional Protocol. Mr. Salehi also informed the Director General that Iran had decided, as of today, to suspend all uranium enrichment-related and reprocessing activities in Iran - specifically, to suspend all activities on the site of Natanz, not to produce feed material for enrichment processes and not to import enrichment-related items. 'This is a welcome and positive development,' IAEA Director General Mohamed ElBaradei said. The IAEA intends to verify, in the context of the Safeguards Agreement and the Additional Protocol, the implementation by Iran of these decisions. At its meeting on 12 September, the IAEA Board of Governors adopted a resolution calling on Iran to sign, ratify and fully implement the Additional Protocol promptly and unconditionally, and as a confidence building measure to act henceforth in accordance with the Additional Protocol. The Board also called on Iran to suspend all further uranium enrichment and reprocessing activities, pending provision by the Director General of the assurances required by Member States and pending satisfactory application of the provisions of the Additional Protocol. Also today, Mr. ElBaradei has released his report to IAEA Member States on the 'Implementation of the NPT Safeguards Agreement in the Islamic Republic of Iran' for consideration at the 20 November Board of Governors' meeting. Unless the IAEA Board decides otherwise, the document's circulation is restricted and it cannot be released to the press. (IAEA)

  9. Verifying compliance with nuclear non-proliferation undertakings: IAEA safeguards agreements and additional protocols

    International Nuclear Information System (INIS)

    This report provides background information on safeguards and explains procedures for States to conclude Additional Protocols to comprehensive Safeguards Agreements with the IAEA. Since the IAEA was founded in 1957, its safeguards system has been an indispensable component of the nuclear non-proliferation regime and has facilitated peaceful nuclear cooperation. In recognition of this, the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) makes it mandatory for all non-nuclear-weapon States (NNWS) party to the Treaty to conclude comprehensive safeguards agreements with the IAEA, and thus allow for the application of safeguards to all their nuclear material. Under Article III of the NPT, all NNWS undertake to accept safeguards, as set forth in agreements to be negotiated and concluded with the IAEA, for the exclusive purpose of verification of the fulfilment of the States' obligations under the NPT. In May 1997, the IAEA Board of Governors approved the Model Additional Protocol to Safeguards Agreements (reproduced in INFCIRC/540(Corr.)) which provided for an additional legal authority. In States that have both a comprehensive safeguards agreement and an additional protocol in force, the IAEA is able to optimize the implementation of all safeguards measures available. In order to simplify certain procedures under comprehensive safeguards agreements for States with little or no nuclear material and no nuclear material in a facility, the IAEA began making available, in 1971, a 'small quantities protocol' (SQP), which held in abeyance the implementation of most of the detailed provisions of comprehensive safeguards agreements for so long as the State concerned satisfied these criteria. The safeguards system aims at detecting and deterring the diversion of nuclear material. Such material includes enriched uranium, plutonium and uranium-233, which could be used directly in nuclear weapons. It also includes natural uranium and depleted uranium, the latter of which is

  10. Law project (no. 1329) adopted by the Senate and authorizing the ratification of the agreement between the French Republic, the European Atomic Energy Community and the International Atomic Energy Agency relative to the enforcement of warranties in the framework of the treaty of nuclear weapons prohibition in South America and the Caribbeans area (two protocols together)

    International Nuclear Information System (INIS)

    The French Senate adopted on January 6, 2004 the project of law which authorizes the ratification of the agreement between France, the European atomic energy community and the IAEA about the enforcement of warranties in the framework of the treaty of interdiction of nuclear weapons in South America and in the Caribbean area signed in Vienna (Austria) on March 21, 2000. The text of this treaty is attached to this law. (J.S.)

  11. Additional factors for the estimation of mean glandular breast dose using the UK mammography dosimetry protocol

    International Nuclear Information System (INIS)

    The UK and European protocols for mammographic dosimetry use conversion factors that relate incident air kerma to the mean glandular dose (MGD) within the breast. The conversion factors currently used were obtained by computer simulation of a model breast with a composition of 50% adipose and 50% glandular tissues by weight (50% glandularity). Relative conversion factors have been calculated which allow the extension of the protocols to breasts of varying glandularity and for a wider range of mammographic x-ray spectra. The data have also been extended to breasts of a compressed thickness of 11 cm. To facilitate the calculation of MGD in patient surveys, typical breast glandularities are tabulated for women in the age ranges 40-49 and 50-64 years, and for breasts in the thickness range 2-11 cm. In addition, tables of equivalent thickness of polymethyl methacrylate have been provided to allow the simulation for dosimetric purposes of typical breasts of various thicknesses. (author)

  12. 25 CFR 81.7 - Adoption, ratification, or revocation by majority vote.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Adoption, ratification, or revocation by majority vote... TRIBAL REORGANIZATION UNDER A FEDERAL STATUTE § 81.7 Adoption, ratification, or revocation by majority... those actually voting are in favor of adoption, ratification, or revocation. The total vote...

  13. 48 CFR 2901.602-3 - Ratification of unauthorized commitments.

    Science.gov (United States)

    2010-10-01

    ... Director, Division of Acquisition Management Services, for submission to the Procurement Review Board... unauthorized commitments. 2901.602-3 Section 2901.602-3 Federal Acquisition Regulations System DEPARTMENT OF... Authority, and Responsibilities 2901.602-3 Ratification of unauthorized commitments. (a) If the HCA...

  14. A geo-portal for data management and integration in the context of the additional protocol

    International Nuclear Information System (INIS)

    Since the entry into force of the Additional Protocol, nuclear safeguards is faced with an abundance of information from different sources which require effective tools for the collection, storage, analysis and retrieval of data. Over the last years, the Joint Research Centre (JRC) has developed a number of tools supporting the preparation, management and verification of AP declarations, which were demonstrating the usefulness of Geographic Information Systems (GIS) for this purpose. Following these experiences, DG-TREN has asked the JRC to develop a Geo-Portal integrating the diverse databases at DG-TREN and providing a single point of access to all safeguards-relevant information. Based on the same platform, NUMAS was developed with the objective of integrating information from various sources in view making available information on Nuclear Fuel Cycle. The article describes the objectives and the features of both systems. (author)

  15. A geo-portal for data management and integration in the context of the additional protocol

    International Nuclear Information System (INIS)

    The Directorate General for Energy and Transport of the European Commission (DG-TREN) is responsible for the implementation of the EURATOM Safeguards system and the Safeguards Agreements and Additional Protocols under the Non Proliferation Treaty. In particular since the entry into force of the Additional Protocol, DG-TREN is faced with an abundance of information from different sources which require effective tools for the collection, storage, analysis and retrieval of data. Over the last years, the Joint Research Centre (JRC) developed a number of tools supporting the preparation, management and verification of AP declarations showing the usefulness of (Geographic Information System (GIS) for this purpose. Following these experiences, DG-TREN asked the JRC to develop a Geo-Portal integrating the diverse databases at DG-TREN and providing a single point of access to all relevant information. The proposed system is sketched and has the following features: - It is a multi-tier system (database, application server, client application) which is compatible with the existing IT architecture at DG-TREN. Particular attention is paid on respecting the strict security requirements associated with the information. - It implements a geo-database containing all locations and geographic features of interest (sites, buildings, mines, R and D activities, etc). Every geographic feature has a link to each existing item of information that is associated with this feature, e.g. a site contains links to all relevant AP declarations, inspector reports, supporting documentation, etc) - An application server transfers the data to the client application using standard web protocols thus providing maximum flexibility for possible extensions and also facilitating deployment and maintenance. The system will be installed within the secure DG-TREN network which protects the information from unauthorised external access. - The GIS client application provides a single point of access to all data

  16. Non-proliferation of nuclear weapons and nuclear security. IAEA safeguards agreements and additional protocols

    International Nuclear Information System (INIS)

    One of the most urgent challenges facing the International Atomic Energy Agency (IAEA) is to strengthen the Agency's safeguards system for verification in order to increase the likelihood of detecting any clandestine nuclear weapons programme in breach of international obligations. The IAEA should be able to provide credible assurance not only about declared nuclear material in a State but also about the absence of undeclared material and activities. Realising the full potential of the strengthened system will require that all States bring into force their relevant safeguards agreements, as well as additional protocols thereto. Today, 45 years after the Agency's foundation, its verification mission is as relevant as ever. This is illustrated by the special challenges encountered with regard to verification in Iraq and North Korea in the past decade. Moreover, the horrifying events of 11 September 2001 demonstrated all too well the urgent need to strengthen worldwide control of nuclear and other radioactive material. The IAEA will continue to assist States in their efforts to counter the spread of nuclear weapons and to prevent, detect and respond to illegal uses of nuclear and radioactive material. Adherence by as many States as possible to the strengthened safeguards system is a crucial component in this endeavour

  17. Kyoto protocol cooperation: does government corruption facilitate environmental lobbying?.

    OpenAIRE

    Fredriksson, Per G.; Neumayer, Eric; Ujhelyi, Gergely

    2007-01-01

    Does environmental lobbying affect the probability of environmental treaty ratification? Does the level of government corruption play a role for the success of such lobbying? In this paper, we propose that a more corruptible government may be more responsive to the demands of the environmental lobby. We use several stratified hazard models and panel data from 170 countries on the timing of Kyoto Protocol ratification to test this hypothesis. We find that increased environmental lobby group ac...

  18. Law project (no. 1329) adopted by the Senate and authorizing the ratification of the agreement between the French Republic, the European Atomic Energy Community and the International Atomic Energy Agency relative to the enforcement of warranties in the framework of the treaty of nuclear weapons prohibition in South America and the Caribbeans area (two protocols together); Projet de loi (no. 1329) adopte par le Senat autorisant la ratification de l'accord entre la Republique francaise, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties dans le cadre du traite visant l'interdiction des armes nucleraires en Amerique latine et dans les Caraibes (ensemble deux protocoles)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-01-01

    The French Senate adopted on January 6, 2004 the project of law which authorizes the ratification of the agreement between France, the European atomic energy community and the IAEA about the enforcement of warranties in the framework of the treaty of interdiction of nuclear weapons in South America and in the Caribbean area signed in Vienna (Austria) on March 21, 2000. The text of this treaty is attached to this law. (J.S.)

  19. 75 FR 4323 - Additional Quantitative Fit-testing Protocols for the Respiratory Protection Standard

    Science.gov (United States)

    2010-01-27

    ... article published in a peer-reviewed industrial-hygiene journal describing the protocol and explaining how...-2007-0007-0001), Mr. Jeff Weed of TSI, Inc., included a copy of a peer-reviewed article from an..., and from 500 to 1000 for full facepieces. Peer-reviewed industrial-hygiene journal article. The...

  20. The Effects of AFGP Addition and Removing Protocol of CPA on Vitrification Cryopreservation of Osteoblasts

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    1 Introduction Vitrification is an effective method for cryopreservation of cells~([1, 2]). However, cells are usually damaged due to the osmotic injury caused by the higher concentrations of cryoprotective agents (CPA) during CPA removing. The ice recrystallization in thawing solution can also hurt cells seriously. Antifreeze glycoprotein (AFGPs) is extremely efficient at inhibiting ice recrystallization~([3]).The effects of Removing protocols and AFGP on cell viability were investigated. 2 Materials and M...

  1. Implementation of the Additional Protocol: Verification activities at uranium mines and mills

    International Nuclear Information System (INIS)

    Full text: The mining and milling of uranium is the first in a long chain of processes required to produce nuclear materials in a form suitable for use in nuclear weapons. Misuse of a declared uranium mining/milling facility, in the form of understatement of production, would be hard to detect with the same high level of confidence as afforded by classical safeguards on other parts of the nuclear fuel cycle. For these reasons, it would not be cost-effective to apply verification techniques based on classical safeguards concepts to a mining/milling facility in order to derive assurance of the absence of misuse. Indeed, these observations have been recognised in the Model Protocol (INFCIRC/540): 'the Agency shall not mechanistically or systematically seek to verify' information provided to it by States (Article 4.a.). Nevertheless, complementary access to uranium mining/milling sites 'on a selective basis in order to assure the absence of undeclared nuclear material and activities' (Article 4.a.(i)) is provided for. On this basis, therefore, this paper will focus predominantly on options other than site access, which are available to the Agency for deriving assurance that declared mining/milling operations are not misused. Such options entail the interpretation and analysis of information provided to the Agency including, for example, from declarations, monitoring import/export data, open source reports, commercial satellite imagery, aerial photographs, and information provided by Member States. Uranium mining techniques are diverse, and the inventories, flows and uranium assays which arise at various points in the process will vary considerably between mines, and over the operating cycle of an individual mine. Thus it is essentially impossible to infer any information, which can be used precisely to confirm, or otherwise, declared production by measuring or estimating any of those parameters at points within the mining/milling process. The task of attempting to

  2. The entry into force of the Additional Protocol in the European Union: The new dimension of safeguards in Europe

    Energy Technology Data Exchange (ETDEWEB)

    Recio, M. [Deputy Direction General for Nuclear Energy, Direction General for Energy Policy and Mines Ministry of Industry, Tourism and Trade, Paseo de la Castellana, 160 Madrid 28046 (Spain)]. E-mail: MRecio@mityc.es; Prieto, N. [Asesoria Juridica, Direccion de Division Administracion, Enresa, c/Emilio Vargas, 7, Madrid 28043 (Spain)]. E-mail: nprs@enresa.es

    2006-07-01

    The Additional Protocol to the Safeguards Agreement with the International Atomic Energy Agency (IAEA) has entered into force on 30 April 2004. This completes the implementation in the EU of what undoubtedly represents the most ambitious project undertaken by the IAEA, designed to reinforce its current safeguards system, a project that the international community considers to be a key component strengthening the fight against one of the most serious threats for world security: nuclear proliferation. (author)

  3. Report made on behalf of the commission of foreign affairs about the law project, adopted by the Senate, authorizing the ratification of the agreement between the French Republic, the European Atomic Energy Community and the International Atomic Energy Agency relative to the enforcement of warranties in the framework of the treaty of nuclear weapons prohibition in South America and the Caribbeans area (two protocols together); Rapport fait au nom de la commission des affaires etrangeres sur le projet de loi, adopte par le senat, autorisant la ratification de l'accord entre la Republique francaise, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties dans le cadre du traite visant l'interdiction des armes nucleaires en Amerique latine et dans les Caraibes (ensemble deux protocoles)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This report comments the reasons of the signature of the agreement between France, EURATOM and the IAEA for the reinforcement of IAEA's non-proliferation controls in the South America and Caribbean areas (law project no. 1329). The ratification of this agreement will have only few concrete consequences but will contribute to the promotion of non-proliferation and to the enforcement of warranties in the framework of the treaty of interdiction of nuclear weapons in South America and in the Caribbean area (signed in Vienna, Austria, on March 21, 2000). The commission of foreign affairs adopted this law project on March 3, 2004. (J.S.)

  4. Protocol Additional to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the application of safeguards in France

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the Application of Safeguards in France is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998. Pursuant to Article 16 of the Additional Protocol, the Protocol entered into force on 30 April 2004, the date on which the Agency received written notification that the European Atomic Energy Community and France had met their respective internal requirements for entry into force

  5. The Kyoto Protocol: Can We Meet?

    OpenAIRE

    Boromisa, Ana-Maria; Tišma, Sanja

    2008-01-01

    Integration into the EU is one of strategic foreign policy goals of Croatia. Before accession, Croatia has to align with the EU policies and legislation. The European Commission in its Croatia 2007 Progress report identified ratification of the Kyoto Protocol as progress regarding environmental chapter of accession negotiations. By ratifying the Kyoto Protocol in May 2007 Croatia pledged to reduce greenhouse gases by 5% in the first commitment period, 2008-2012, from the amount released into ...

  6. Hierarchical Management to be Implemented on Ratification Risk of Certification Institution

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    @@ Recently, the China National Accreditation Service for Conformity Assessment (CNAS) has promulgated Measures for Hierarchical Management of Ratification Risk of Certification Institution (hereinafter referred to as Measures), which was put into execution.

  7. Analysis on the Motivations of RussiaS Ratification of Protocol 14 to the European Convention on Human Rights and Its E%俄罗斯批准《欧洲人权公约第14议定书》的动因及影响分析

    Institute of Scientific and Technical Information of China (English)

    刘丽

    2011-01-01

    On June 1,2010, Protocol no. 14 to the Convention for the Protection of Human Rights and Fundamental Freedoms entered into force. This protocol has been opened to signature since May 13, 2004, and all of the contracting countries to the Council of Europe%2010年6月1日,旨在改革欧洲人权法院、提高法院效率的《欧洲人权公约第14议定书》生效。该议定书生效过程曲折,自2004年5月13日开放签署之后,早在2006年底即获欧洲理事会除俄罗斯以外的所有成员国的批准。因此,俄罗斯是欧洲人权法院这次改革得以实现的关键。笔者简要介绍该议定书的主要内容,并剖析该议定书成败之关键即俄罗斯的反应,在此基础上对改革后的欧洲人权法院及其对俄罗斯的影响加以评析。

  8. Improving a mother to child HIV transmission programme through health system redesign: quality improvement, protocol adjustment and resource addition.

    Directory of Open Access Journals (Sweden)

    Michele S Youngleson

    Full Text Available BACKGROUND: Health systems that deliver prevention of mother to child transmission (PMTCT services in low and middle income countries continue to underperform, resulting in thousands of unnecessary HIV infections of newborns each year. We used a combination of approaches to health systems strengthening to reduce transmission of HIV from mother to infant in a multi-facility public health system in South Africa. METHODOLOGY/PRINCIPAL FINDINGS: All primary care sites and specialized birthing centers in a resource constrained sub-district of Cape Metro District, South Africa, were enrolled in a quality improvement (QI programme. All pregnant women receiving antenatal, intrapartum and postnatal infant care in the sub-district between January 2006 and March 2009 were included in the intervention that had a prototype-innovation phase and a rapid spread phase. System changes were introduced to help frontline healthcare workers to identify and improve performance gaps at each step of the PMTCT pathway. Improvement was facilitated and spread through the use of a Breakthrough Series Collaborative that accelerated learning and the spread of successful changes. Protocol changes and additional resources were introduced by provincial and municipal government. The proportion of HIV-exposed infants testing positive declined from 7.6% to 5%. Key intermediate PMTCT processes improved (antenatal AZT increased from 74% to 86%, PMTCT clients on HAART at the time of labour increased from 10% to 25%, intrapartum AZT increased from 43% to 84%, and postnatal HIV testing from 79% to 95% compared to baseline. CONCLUSIONS/SIGNIFICANCE: System improvement methods, protocol changes and addition/reallocation of resources contributed to improved PMTCT processes and outcomes in a resource constrained setting. The intervention requires a clear design, leadership buy-in, building local capacity to use systems improvement methods, and a reliable data system. A systems improvement

  9. Will markets direct investments under the Kyoto Protocol ?

    OpenAIRE

    Larson, Donald F.; Breustedt, Gunnar

    2007-01-01

    Under the Kyoto Protocol, countries can meet treaty obligations by investing in projects that reduce or sequester greenhouse gases elsewhere. Prior to ratification, treaty participants agreed to launch country-based pilot projects, referred to collectively as Activities Implemented Jointly (AIJ), to test novel aspects of the project-related provisions. Relying on a 10-year history of proje...

  10. [ILO conventions on occupational safety and health with reference to ratification status of Japan].

    Science.gov (United States)

    Takahashi, K; Okubo, T

    1995-07-01

    This paper grouped together recent ILO conventions relevant to occupational safety and health (OSH) in order to clarify their characteristics and form an overview. There are 13 such conventions adopted by ILO during the period 1960-1993. Each of these conventions have distinct goals to cover respective areas of OSH, which was contrasted with each other. Conventions are subject to ratification, thus the ratification status of Japan was statistically compared to that of ILO and OECD member states. As at June 1993, Japan ratified three of such conventions, which was slightly higher than the average number ratified by all ILO member states and ranked 11th among 24 OECD member states. The relative ratification status of Japan on ILO Conventions fared better with those relevant to OSH than others. ILO Conventions are inter-related by reference and note, thus ratification of basic conventions such as C. 155 (Occupational Safety and Health Convention) and C. 148 (Working Environment Convention), neither of which is ratified by Japan, should be prioritized to further promote ratification status in the OSH area.

  11. 87. Austrian ratification of the Convention on Assistance in the Case of a Nuclear Accident or Radiological Emergency

    International Nuclear Information System (INIS)

    This is the notification of the Austrian ratification of the Convention, resulting in the entry into force of the Convention for Austria on 22 December 1989. The ratification included a declaration concerning Article 10 paragraph 5(b). The text of the Convention is reproduced in English, French and German. (NEA)

  12. Impératifs et limites de la croissance

    Directory of Open Access Journals (Sweden)

    Rolf Steppacher

    2006-07-01

    Full Text Available La théorie de la croissance domine l’actualité. Pourtant, il devient chaque jour plus évident que la poursuite de ce programme mondial n’est pas indéfiniment réalisable, compte tenu des limites imposées par les écosystèmes. Plus surprenant encore, l’impératif de croissance est parvenu à se dissimuler sous le masque de la durabilité. Devenu « durable » ou « soutenable », le développement s’accommode plutôt bien du capitalisme, sans questionner pour autant le cœur du paradoxe contemporain : comment parler de durabilité sans remettre en cause en même temps le système économique ? Comment maintenir une croissance illimitée – elle-même alimentée par une industrie publicitaire créatrice de désirs illimités – sans remettre parallèlement en question l’utilisation que nous faisons des ressources non renouvelables ? Plus que jamais et à l’heure où le développement durable s’impose comme le nouveau messianisme technologique, il devient vital de s’interroger sur le fonctionnement nécessairement problématique des économies modernes et de leurs choix énergétiques. Aller au-delà du consensus politique actuel fondé sur la tyrannie de la croissance, ne pas succomber à l’incantation technocratique, penser l’action, l’innovation et les transformations économiques génératrices du bien-être, concevoir que toute société porte en elle un projet qui ne se réduit pas à une capacité gestionnaire, rechercher les sources de la richesse et les raisons de sa fin possible. Voilà quelques-unes des ambitions de Rolf Steppacher, économiste à l’institut universitaire d’études du développement (IUED à Genève et observateur critique de l’évolution du développement durable et de son pendant, la décroissance. Il nous livre ici quelques clés d’interprétation. Entretien réalisé par Olivier Walther.

  13. The Kyoto protocol : Russian opportunities: OIES paper: RIIA Briefing Note

    OpenAIRE

    Müller, Benito

    2004-01-01

    Much, possibly too much, of the most recent debate on Russian ratification of the Kyoto Protocol has centred around the issue whether the Kyoto emission limit would hinder Russian economic growth, particularly in the context of the ambitious decadal Russian growth targets. The aim of this paper is to return the focus of the debate to the opportunities which the Kyoto Protocol could afford the Russian economy and which would be lost if Russia fails to grasp them by bringing the ...

  14. Carrying out"Administrative Ratification Law"%行政许可法:推进产业发展的法制化

    Institute of Scientific and Technical Information of China (English)

    夏竞辉

    2004-01-01

    It is said that "Administrative Ratification Law" is put into practice from 1st July this year. Then the State Council and MII both issue related schemes in order to promote the implementation of "Administration Ratification Law". The enforcement of the "Administrative Ratification Law" will have a great and deep influence on the transfer of the governmental functions, reform of administrative methods and advancement of legal administration. The comparative centralization of administrative ratification right and the unified handling of administrative ratification reflected in the law can be said a summary and extension of the latest years, successful experience and is also a legal confirmation of this kind of practice.

  15. Model protocol additional to the agreement(s) between state(s) and the International Atomic Energy Agency for the application of safeguards

    International Nuclear Information System (INIS)

    This document is a model Additional Protocol designed for States having a Safeguards Agreement with the Agency, in order to strengthen the effectiveness and improve the efficiency of the safeguard system as a contribution to global nuclear non-proliferation objectives

  16. A field exercise course to train IAEA Safeguards inspectors in implementing the additional protocol and performing complementary access activities

    International Nuclear Information System (INIS)

    The International Atomic Energy Agency (IAEA) Department of Safeguards has the task of implementing the Additional Protocol (AP) in the Member States that have signed agreements bringing that treaty into force. The IAEA inspector under the traditional INFCIRC/153 safeguards has been an accountant focused on the declared nuclear material stores of a Member State. The INFCIRC/540 Strengthened Safeguards System (SSS) provides the Agency and its inspectors with the right to investigate a Member State's nuclear programme to see if all declared activities are in order and no undeclared activities exist. This broadening of the scope of the inspector's responsibilities has changed the training of the inspectors to orient them to being an investigator compared to an accountant. The Safeguards training department has created a curriculum of courses that provides the background to train the inspectorate into this new inspection regime. The United States Support Program (USSP) has contributed to this curriculum by putting together a course at Brookhaven National Laboratory (BNL) in Additional Protocol Complementary Access (APCA) to give the IAEA the opportunity to provide inspectors a necessary field exercise in a realistic environment at a research site. Brookhaven National Laboratory contains three shutdown nuclear research reactors, operating particle accelerators, hot cells, radioactive waste storage, laser laboratories, and magnet production facilities on a large site very similar to numerous research facilities around the world situated in non-nuclear weapon states (NNWS). The USSP Team created an Article 2 declaration containing annotated maps of the site, descriptions of the buildings on site, satellite and aerial photographs of the area, and a declaration of research activities on the site. The declaration is as realistic to actual BNL research except that proprietary and security concerns of the BNL site have been taken into account. The USSP Team felt the best

  17. What the Kyoto Protocol means for Russians

    International Nuclear Information System (INIS)

    The only impediment to the Kyoto protocol entering into force now is the Russians. The only global agreement to save climate, which has been ratified by 110 countries, is still in limbo. This article presents an up-to-the-minute analysis of the reasons. The history of progress up to and back from ratification is summarised, including the latest facts from early June 2003. The views of all relevant ministries, business, Parliament and the general public are briefly presented, as are the intentions and/or plans. It is clear that there is progress toward ratification, but serious opposition still exists. The selfish interests of agencies, clumsy bureaucracy and misunderstandings should and can be overcome

  18. Remote Sensing and the Kyoto Protocol: A Workshop Summary

    Science.gov (United States)

    Rosenqvist, Ake; Imhoff, Marc; Milne, Anthony; Dobson, Craig

    2000-01-01

    The Kyoto Protocol to the United Nations Framework Convention on Climate Change contains quantified, legally binding commitments to limit or reduce greenhouse gas emissions to 1990 levels and allows carbon emissions to be balanced by carbon sinks represented by vegetation. The issue of using vegetation cover as an emission offset raises a debate about the adequacy of current remote sensing systems and data archives to both assess carbon stocks/sinks at 1990 levels, and monitor the current and future global status of those stocks. These concerns and the potential ratification of the Protocol among participating countries is stimulating policy debates and underscoring a need for the exchange of information between the international legal community and the remote sensing community. On October 20-22 1999, two working groups of the International Society for Photogrammetry and Remote Sensing (ISPRS) joined with the University of Michigan (Michigan, USA) to convene discussions on how remote sensing technology could contribute to the information requirements raised by implementation of, and compliance with, the Kyoto Protocol. The meeting originated as a joint effort between the Global Monitoring Working Group and the Radar Applications Working Group in Commission VII of the ISPRS, co-sponsored by the University of Michigan. Tile meeting was attended by representatives from national government agencies and international organizations and academic institutions. Some of the key themes addressed were: (1) legal aspects of transnational remote sensing in the context of the Kyoto Protocol; (2) a review of the current and future and remote sensing technologies that could be applied to the Kyoto Protocol; (3) identification of areas where additional research is needed in order to advance and align remote sensing technology with the requirements and expectations of the Protocol; and 94) the bureaucratic and research management approaches needed to align the remote sensing

  19. Guidelines and format for preparation and submission of declarations pursuant to Articles 2 and 3 of the Model Protocol Additional to Safeguards Agreements

    International Nuclear Information System (INIS)

    The information to be provided to the International Atomic Energy Agency (hereinafter referred to as 'the Agency') by States under an additional protocol (INFCIRC/540) is identified in Article 2. The timing with which the information is to be provided is specified in Article 3. It was widely recognized during the negotiation of the additional protocol that States and the Agency would need explanation and guidance, regarding the information to be declared, beyond that possible to incorporate in the language of the protocol itself. The Board of Governors, meeting in special session on 15 May 1997 to approve the additional protocol, was assured that such guidance would be quickly available to States. The initial Additional Protocol Reporting Guidelines, drawing from Programme 93+2 documentation and the negotiating record of Committee 24, were published in August 1997. A simplified set of Guidelines was subsequently produced for States whose safeguards agreement includes a small quantities protocol. The Guidelines serve two purposes. First, they provide specificity as to what information is required and at what level of detail. Second, the Guidelines provide a consistent reporting format. The Guidelines have been supplemented with Agency developed software, the PROTOCOL REPORTER, which simplifies the process through which States can prepare and submit their declarations electronically. There is no legal requirement that States follow the Guidelines in preparing and submitting their Article 2 declarations. However, if States submit declarations prepared according to these Guidelines, it will reduce greatly the Agency's workload in processing, reviewing and storing the information provided. With minor exceptions, all States that have submitted declarations prior to 2004 have followed the Guidelines. The process of improving the Guidelines, based on the cumulative experience of States and the Agency, began in mid-2002. The process involved the development of a detailed

  20. Protocol additional to the agreement between Australia and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Agreement (INFCIRC/217) concluded between Australia and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons. Conclusion of the Additional Protocol was authorized by the Board of Governors on 23 September 1997 and signed in Vienna on the same date. The Additional Protocol entered into force on 12 December 1997

  1. Brazil and the strengthening of safeguard system of the International Atomic Energy Agency: from the four-part agreement to the additional protocol

    International Nuclear Information System (INIS)

    The main objective of this paper is to analyse the evolution of IAEA verification system, that constitutes one of the main fundaments of the Non-proliferation nuclear weapons regimen, and to point out elements that contribute to inform the Brazilian position related to the Model Protocol additional to agreements for safeguard application: instrument that comprehend the most recent multilateral efforts of the nuclear verification

  2. The Fiscal Pact and the Problem of its Ratification - Selected Aspects

    Directory of Open Access Journals (Sweden)

    Andrzej Borodo

    2013-12-01

    Full Text Available The treaty on Stability, Coordination and Governance in the Economic and Monetary Union dated 2 March 2012 (called the fiscal act is the law rela-ting to the economic and budgetary matters of the Member States of the European Union, mainly to the deficit and public debt. The treaty in focus encroaches on the budgetary powers of the Parliament and the government. On February 2012, the Parliament passed the act of law entitling the President of the Republic of Poland to ratify the treaty. The procedure for the ratification of the treaty appears to be questionable. A question arises whether the content of the treaty justifies the adoption of the law authorizing the ratification by ordinary or qualified majority (in accordance with Article 89, paragraph 1 of the Constitution, or paragraph 1 and 2 of Article 90 of the Constitution.

  3. L’impératif en français parlé

    Directory of Open Access Journals (Sweden)

    Nguyen Minh Chinh

    2016-01-01

    Full Text Available Dans la grammaire française, l’impératif est considéré comme le moyen typique pour exprimer l’injonction. Il peut être utilisé pour tout but injonctif, du plus léger (prière, sollicitation au plus péremptoire (ordre, commandement. Cependant, l’impératif n’exprime pas toujours la valeur injonctive proprement dite, les locuteurs peuvent l’utiliser pour d’autres buts tels que l’expression de la condition ou de l’interrogation, etc. Partant de l’idée qu’à l’oral chaque genre a son vocabulaire de construction, ses formes d’organisation, ses contenus attendus, ses modes productifs, la caractérisation des genres est un préalable à la constitution de corpus utilisables pour des tâches de l’étude. Je présenterai dans cet article l’analyse des caractéristiques pragmatiques des énoncés impératifs et de leur répartition en m’appuyant sur l’analyse des occurrences retirées de 5 situations différentes.

  4. The Kyoto Protocol: one more stage in the climate change negotiations

    International Nuclear Information System (INIS)

    This article notices on the internal difficulties that will be generated around the ratification of the Kyoto Protocol in developed countries as United States, Canada and Japan, given the position of industries like the vehicles and the energetic, that try to dilate the commitments assumed in December of 1997. It is emphasized in the North American case, taking into account their contribution in the global greenhouse gases emissions and the importance of their participation in an international agreement on the topic of the climate change, assuming a critical position about the Senate's decision of conditioning the agreement's ratification to the assumption of commitments of developing countries

  5. Protocol additional to the agreement between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement' concluded between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 September 2000. It was signed in Vienna on 30 March 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Bangladesh and the Agency, i.e. on 30 March 2001

  6. Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 20 September 2005. It was signed on 21 July 2006 in Gaborone, Botswana, and on 24 August 2006 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 August 2006, upon signature by the representatives of Botswana and the Agency

  7. Protocol Additional to the agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 1 March 2005. It was signed on 19 July 2005 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 July 2005, upon signature by the representatives of Afghanistan and the Agency

  8. Protocol Additional to the agreement between Ukraine and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 January 2006, the date on which the Agency received from Ukraine written notification that Ukraine's constitutional requirements for entry into force had been met

  9. Protocol Additional to the agreement between the Republic of Madagascar and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Madagascar and the Agency, i.e., on 18 September 2003

  10. Protocol between the government of the Republic of Latvia and the International Atomic Energy Agency additional to the agreement for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Latvia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 December 2000. It was signed in Vienna on 12 July 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Latvia and the Agency, i.e. on 12 July 2001

  11. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met

  12. Protocol Additional to the agreement between the Republic of Malta and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Malta and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 28 November 2002. It was signed on 24 April 2003 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 12 July 2005, the date on which the Agency received from Malta written notification that Malta's statutory and constitutional requirements for entry into force had been met

  13. Study to the effectiveness of the UNECE Persistent Organic Pollutants (POP). Protocol and cost of additional measures. Phase II: Estimated emission reduction and cost of options for a possible revision of the POP Protocol

    NARCIS (Netherlands)

    Denier van der Gon, H.A.C.; Visschedijk, A.J.H.; Bolscher, M. van het

    2006-01-01

    The rationale is that during the review of the POP Protocol there will be a need for an assessment of the potential for further emission reduction and costs of a possible revision of the Protocol. The sources of POPs listed in the Protocol that are to be addressed revision of the POP Protocol have b

  14. Will The Kyoto Protocol Affect Growth in Russia?

    OpenAIRE

    Lecocq, Franck; Shalizi, Zmarak

    2004-01-01

    In light of the recent argument that rapid economic growth in Russia over the next decade, might result in emissions higher than the Kyoto target, thereby putting much-needed growth at risk, the authors revisit the discussion on the costs and benefits of ratification of the Kyoto Protocol by Russia. They conclude that even under a very high economic growth assumption, and even under very c...

  15. Addition of novobiocin in pre-enrichment step can improve Salmonella culture protocol of modified semisolid Rappaport-Vassiliadis

    DEFF Research Database (Denmark)

    Jensen, Annette Nygaard; Sørensen, Gitte; Baggesen, Dorte Lau;

    2003-01-01

    -enrichment of 32 presumably naturally contaminated swine fecal samples were assessed for BPW with and without addition of Novobiocin (22 mug/ml). In another experiment, a total of 400 swine fecal samples were screened for the presence of Salmonella spp., in order to compare the performance of the nonselective pre...... be caused by a reduction in the number of competitive microorganisms....

  16. REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS, INFCIRC/540 (Corrected) VOLUME II/III IAEA COMMITTEE 24, Major Issues Underlying the Model Additional Protocol (1996-1997).

    Energy Technology Data Exchange (ETDEWEB)

    Rosenthal, M.D.; Saum-Manning, L.; Houck, F.

    2010-01-01

    Volume I of this Review traces the origins of the Model Additional Protocol. It covers the period from 1991, when events in Iraq triggered an intensive review of the safeguards system, until 1996, when the IAEA Board of Governors established Committee 24 to negotiate a new protocol to safeguards agreement. The period from 1991-1996 set the stage for this negotiation and shaped its outcome in important ways. During this 5-year period, many proposals for strengthening safeguards were suggested and reviewed. Some proposals were dropped, for example, the suggestion by the IAEA Secretariat to verify certain imports, and others were refined. A rough consensus was established about the directions in which the international community wanted to go, and this was reflected in the draft of an additional protocol that was submitted to the IAEA Board of Governors on May 6, 1996 in document GOV/2863, Strengthening the Effectiveness and Improving the Efficiency of the Safeguards System - Proposals For Implementation Under Complementary Legal Authority, A Report by the Director General. This document ended with a recommendation that, 'the Board, through an appropriate mechanism, finalize the required legal instrument taking as a basis the draft protocol proposed by the Secretariat and the explanation of the measures contained in this document.'

  17. Bill project authorizing the ratification of the statutes of the International Renewable Energy Agency (IRENA)

    International Nuclear Information System (INIS)

    After a presentation text describing the content of each of the 20 articles of the statutes of the International Renewable Energy Agency (IRENA), this document contains the full text of these statutes. A third text is the bill project authorizing the ratification of these statutes, and described the economic, financial, social, environmental, administrative or juridical consequences of the implementation of the agreement or convention associated with the creation of the agency. The text also recalls the negotiation process, and indicates the place given to the French language

  18. Law project for the application of additional protocol to the agreement between France and the atomic energy european community and the international atomic energy agency relative to the application of guaranties in France, signed at Vienna the 22 september 1998

    International Nuclear Information System (INIS)

    This law project aims to allow the application of the additional protocol. This protocol plans the transmission, by France, to IAEA of defined information. These information concern materials and nuclear activities non declared by States not owning the nuclear weapon. (A.L.B.)

  19. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Entry into Force

    International Nuclear Information System (INIS)

    Pursuant to Article 17 of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Additional Protocol), the Additional Protocol, which had been applied provisionally from 17 February 2010, entered into force on 10 October 2012, the date upon which the Agency received written notification from Iraq that Iraq's statutory and/or constitutional requirements for entry into force had been met

  20. Making a Historical Survey of a State's Nuclear Ambitions. Impact of Historical Developments of a State's National Nuclear Non-Proliferation Policy on Additional Protocol Implementation

    International Nuclear Information System (INIS)

    In 1998, SKI initiated a project to conduct a historical survey of the Swedish nuclear weapons research for the period 1945-1972. IAEA became interested and accepted it in 2000 as a support program task to increase transparency and to support the implementation of the Additional Protocol in Sweden. The main purpose of the Additional Protocol is to make the IAEA control system more efficient with regard to nuclear material, facilities and research. Other countries have now shown interest to follow the Swedish example and to make their own reviews of their past nuclear energy and nuclear weapons research. The most important aim is to produce basic information for IAEA on the nuclear activities of the past and to refine and strengthen the instruments of the Safeguard System within the Additional Protocol. The first objective of this report is to present a short summary of the Swedish historical survey, as well as similar projects in other countries dealing with nuclear-related and nuclear weapons research reviews. These tasks are dealt with in chapter 2. Secondly, the objective is to present a general model of how a national base survey can be designed. The model is based on the Swedish experiences and it has been designed to also serve as a guideline for other countries to strengthen their safeguards systems within the framework of the Additional Protocol. Since other States declared that they would make similar historical surveys, the SKI decided to work out a model that could be used by other countries intending to conduct such studies. Estonia, Latvia and Lithuania are participating in a co-operation project to carry out such nationally base surveys under the auspices of the Swedish Nuclear Power Inspectorate. Finland is also conducting such a survey, but it is done independently, albeit in close exchange of views between SKI and its Finnish counterpart, STUK. This is described in chapter 3. The third objective is to develop a pedagogic methodology for teaching

  1. Protocol Additional to the Agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 12 June 1998

  2. Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 9 March 2004. It was signed on 10 March 2004 in Vienna

  3. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010

  4. Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 September 1997. It was signed in Vienna on 30 September 1997

  5. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 9 October 2008 in Vienna

  6. Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 22 April 2010 in Berlin, Germany, and on 26 April 2010 in Vienna, Austria

  7. Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non- Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna

  8. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria

  9. Protocol Additional to the Agreement between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/524) concluded between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 30 September 1999, and entered into force on the same date

  10. Protocol additional to the agreement between the Holy See and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/187) concluded between the Holy See and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, and signed in Vienna on 24 September 1998, when it entered into force

  11. Protocol Additional to the Agreement between the Republic of Uzbekistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/508) concluded between the Republic of Uzbekistan and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 22 September 1998, and applied provisionally as from the date of signature

  12. Protocol additional to the agreement between the Hashemite Kingdom of Jordan and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/258) concluded between the Hashemite Kingdom of Jordan and the IAEA for the application of safeguards in connection with the Treaty for the Non-proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 18 March 1998 and it entered into force on 28 july 1998

  13. Protocol Additional to the agreement between New Zealand and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/185) concluded between New Zealand and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and it entered into force on the same date

  14. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria

  15. Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed on 5 May 2007 in Lilongwe, Malawi, and on 26 July 2007 in Vienna, Austria

  16. Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003

  17. Protocol additional to the agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/226) concluded between the Government of the Republic of Ghana and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 11 June 1998, and signed in Vienna on 12 June 1998. Pending entry into force, the Protocol is being applied provisionally as from the date of signature, i.e. 12 June 1998

  18. Protocol additional to the agreement between the Republic of Tajikistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement concluded between the Republic of Tajikistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 12 June 2002. It was signed on 2 July 2003 in Vienna and on 7 July 2003 in Tashkent. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 14 December 2004, the date on which the Agency received from the Republic of Tajikistan written notification that the Republic of Tajikistan's statutory and/or constitutional requirements for entry into force had been met

  19. Protocol Additional to the Agreement Between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2009. It was signed in Vienna on 8 April 2009. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 December 2010, the date on which the Agency received from the United Arab Emirates written notification that the United Arab Emirates' statutory and constitutional requirements for entry into force had been met

  20. Protocol Additional to the agreement between the Swiss Confederation and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Swiss Confederation and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 16 June 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 February 2005, the date upon which the Agency received from the Swiss Confederation written notification that the Swiss Confederation's statutory and/or constitutional requirements for entry into force had been met

  1. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met

  2. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (Spanish Edition)

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met.

  3. Protocol additional to the agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 23 September 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 7 February 2005, the date on which the Agency received from the United Republic of Tanzania written notification that the United Republic of Tanzania's statutory and/or constitutional requirements for entry into force had been met

  4. Protocol Additional to the agreement between the Republic of Seychelles and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Seychelles and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 18 March 2003. It was signed on 29 March 2004 in Windhoek and on 7 April 2004 in Vienna. Pursuant to Article 17 of the Protocol Additional, the Protocol entered into force on 13 October 2004, the date on which the Agency received from the Republic of Seychelles written notification that the Republic of Seychelles's statutory and/or constitutional requirements for entry into force had been met

  5. The ratification status of ILO conventions related to occupational safety and health and its relationship with reported occupational fatality rates.

    Science.gov (United States)

    Wilson, Donald J; Takahashi, Ken; Sakuragi, Sonoko; Yoshino, Masako; Hoshuyama, Tsutomu; Imai, Teppei; Takala, Jukka

    2007-01-01

    The aim of this study was to assess the relationship between the ratification status of occupational safety and health (OSH)-related ILO conventions and reported occupational fatality rates of ILO member countries, while controlling for possible confounding factors. ILO member states were divided into 4 levels of income status, based on the gross national income per capita. Seventeen conventions designated as OSH-related were examined. Reported country occupational fatality rates were compared according to the ratification status of these 17 conventions and multiple regression analyses were conducted to assess the relationship between the fatality rates, ratification status, income level and length of ILO membership. Fatality rates were inversely and significantly related to income levels. In general, non-ratifying countries had higher work-related fatality rates than ratifying countries. A statistical model for identifying predictors of fatal injury rates showed that a larger number of conventions ratified was significantly associated with lower fatality rates. The fact that non-ratifying countries generally have higher fatality rates than ratifying ones supports the notion that all countries should promote ratification of ILO conventions aimed at improving OSH conditions.

  6. Patient rights in EU Member States after the ratification of the Convention on Human Rights and Biomedicine.

    Science.gov (United States)

    Nys, Herman; Stultiëns, Loes; Borry, Pascal; Goffin, Tom; Dierickx, Kris

    2007-10-01

    The European Convention on Human Rights and Biomedicine was adopted by the Committee of Ministers of the Council of Europe on 19 November 1996 and opened for signature in Oviedo, Spain, on 4 April 1997. As of the moment of writing 11 Member States of the EU have ratified the Convention: Cyprus, Czech Republic, Denmark, Estonia, Greece, Hungary, Lithuania, Portugal, Slovakia, Slovenia and Spain. The overall purpose of this article is to analyze whether these ratifying EU Member States have fulfilled their obligation provided for in article 1 of Section 2 of the Convention ("each Party shall take in its internal law the necessary measures to give effect to the provisions of this Convention"). We further explored the legal consequences of ratification of the Convention. We analysed for each ratifying Member State whether and how the ratification of the Convention has influenced patient rights legislation and policies. Finally, we concluded by dividing the 11 Member States into 4 categories depending upon the already existing patient rights legislation at the moment of ratification and the constitutional provisions related to the ratification of an international treaty in general in a given Member State.

  7. Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics

    International Nuclear Information System (INIS)

    The text of the Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics is reproduced in this document for the information of all Members. The Board of Governors approved the Protocol on 21 March 2000. It was signed on 22 March 2000 in Vienna. Pursuant to Article 11 of the Additional Protocol, the Protocol entered into force on 16 October 2007, the date on which the Agency received from the Russian Federation written notification that the procedures of the Russian Federation required for entry into force had been met

  8. Protocol Additional to the Agreement between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 22 August 2000

  9. Protocol Additional to the Agreement between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and entered into force on 10 October 2000

  10. Protocol Additional to the Agreement between the Government of the Republic of Lithuania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Lithuania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 8 December 1997, signed in Vienna on 11 March 1998, and entered into force on 5 July 2000

  11. Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons (NPT), which was approved by the Board of Governors on 20 September 1999 and signed in Vienna on 29 September 1999. The Protocol entered into force on 29 September 1999

  12. Protocol Additional to the Agreement between the Government of Japan and the International Atomic Energy Agency in implementation of Article III.1 and 4 of the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Agreement between the Government of Japan and the International Atomic Energy Agency in implementation of Article III.1 and 4 of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), which was approved by the Board of Governors on 25 November 1998 and signed in Vienna on 4 December 1998. The Protocol entered into force on 16 December 1998

  13. Statement by the Iraqi Ministry of Foreign Affairs on the twentieth anniversary of Iraq's ratification of the treaty on the non-proliferation of nuclear weapons (NPT)

    International Nuclear Information System (INIS)

    The document reproduces the full text of the statement made by the Iraqi Ministry of Foreign Affairs on the twentieth anniversary of Iraq's ratification of the Treaty on the Non-Proliferation of Nuclear Weapons

  14. After Indonesia’s Ratification: The ASEAN Agreement on Transboundary Haze Pollution and Its Effectiveness As a Regional Environmental Governance Tool

    OpenAIRE

    Daniel Heilmann

    2015-01-01

    On 20 January 2015 Indonesia deposited its instrument of ratification for the ASEAN Agreement on Transboundary Haze Pollution with the ASEAN Secretariat, becoming the last ASEAN member state to join the treaty. Haze pollution poses a serious health threat to the people of Indonesia, Singapore and Malaysia, and for decades haze pollution has been a highly contentious issue among ASEAN member states. This article argues that Indonesia's ratification will not be an immediate game changer. The me...

  15. Dismantling of a Breakthrough: The Kyoto Protocol – Just Symbolic Policy!

    OpenAIRE

    Böhringer, Christoph; Vogt, Carsten

    2002-01-01

    We show that U.S. withdrawal from the Kyoto Protocol is straightforward under political economy considerations. The reason is that U.S. compliance costs exceed low willingness to pay for dealing with global warming in the U.S. The withdrawal had a crucial impact on the concretion of the Protocol prior to its likely ratification at the end of 2002. Remaining non-EU Parties to the Kyoto Protocol gained veto bargaining power and, thus, were successful in asserting far reaching concessions from t...

  16. Explaining Political Party Performance in European Communication: A Qualitative Comparative Analysis of Party Political Cueing in domestic EU Treaty Ratification.

    OpenAIRE

    Packham, Kathrin

    2009-01-01

    Political parties messages or cues constitute important factors shaping public attitudes not only on domestic matters but also on issues of European integration and constitutionalisation. The question explored in the book is, how national political parties communication matters for European integration. The study aims at providing explanations for the politicisation of European contentious politics here EU treaty ratification by analysing patterns of variation in political parties public comm...

  17. Ratification vote on taxonomic proposals to the International Committee on Taxonomy of Viruses (2016).

    Science.gov (United States)

    Adams, Michael J; Lefkowitz, Elliot J; King, Andrew M Q; Harrach, Balázs; Harrison, Robert L; Knowles, Nick J; Kropinski, Andrew M; Krupovic, Mart; Kuhn, Jens H; Mushegian, Arcady R; Nibert, Max; Sabanadzovic, Sead; Sanfaçon, Hélène; Siddell, Stuart G; Simmonds, Peter; Varsani, Arvind; Zerbini, Francisco Murilo; Gorbalenya, Alexander E; Davison, Andrew J

    2016-10-01

    This article lists the changes to virus taxonomy approved and ratified by the International Committee on Taxonomy of Viruses (ICTV) in April 2016.Changes to virus taxonomy (the Universal Scheme of Virus Classification of the International Committee on Taxonomy of Viruses [ICTV]) now take place annually and are the result of a multi-stage process. In accordance with the ICTV Statutes ( http://www.ictvonline.org/statutes.asp ), proposals submitted to the ICTV Executive Committee (EC) undergo a review process that involves input from the ICTV Study Groups (SGs) and Subcommittees (SCs), other interested virologists, and the EC. After final approval by the EC, proposals are then presented for ratification to the full ICTV membership by publication on an ICTV web site ( http://www.ictvonline.org/ ) followed by an electronic vote. The latest set of proposals approved by the EC was made available on the ICTV website by January 2016 ( https://talk.ictvonline.org/files/proposals/ ). A list of these proposals was then emailed on 28 March 2016 to the 148 members of ICTV, namely the EC Members, Life Members, ICTV Subcommittee Members (including the SG chairs) and ICTV National Representatives. Members were then requested to vote on whether to ratify the taxonomic proposals (voting closed on 29 April 2016).

  18. Claims to success: advocacy for the protocol on the rights of women in Africa – solidarity for African women’s rights and the use of information and communication technologies

    NARCIS (Netherlands)

    K. Kemp (Karoline)

    2010-01-01

    textabstractThe goal of this particular research has been to examine the role of information and communication technologies (ICTs) in policy advocacy as applied by civil society. Taking the Solidarity for African Women’s Rights coalition and their work towards the ratification of the Protocol on Wom

  19. Carbon emissions: the economic benefits of the Kyoto Protocol

    International Nuclear Information System (INIS)

    The third Conference of the Parties in Kyoto set the target of reducing greenhouse-gas emissions by an average of 5.3 per cent with respect to 1990 values by 2008 - 2012. One of the main objections to the protocol's ratification is that compliance would pose an unbearable economic burden on the countries involved. But we show here that this is not the case if costs apart from the direct costs of energy production are also considered. Costs are also incurred in rectifying damage to human health, material goods, agriculture and the environment related to greenhouse-gas emissions. (author)

  20. Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Armenia and the IAEA for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). It was approved by the Board of Governors on 23 September 1997, signed in Vienna on 29 September 1997, and it will enter into force on the date the Agency receives written notification that Armenia's statutory and/or constitutional requirements for entry into force have been met. Pending entry into force, this Protocol shall apply provisionally from the date of signature, i.e., 29 September 1997

  1. A field exercise course to train IAEA safeguards inspectors in implementing the additional protocol and performing complementary access activities (LA-UR-06-5798)

    International Nuclear Information System (INIS)

    Full text: The IAEA Department of Safeguards has the task of implementing the Additional Protocol (AP) in the Member States that have signed agreements bringing that treaty into force. The IAEA inspector under the traditional INFCIRC/153 safeguards has been an accountant focused on the declared nuclear material stores of a Member State. The INFCIRC/540 Strengthened Safeguards System (SSS) provides the Agency and its inspectors with the right to investigate a Member State's nuclear programme to see if all declared activities are in order and no undeclared activities exist. This broadening of the scope of the inspector's responsibilities has changed the training of the inspectors to orient them to being an investigator compared to an accountant. The Safeguards training department has created a curriculum of courses that provides the background to train the inspectorate into this new inspection regime. The United States Support Program (USSP) has contributed to this curriculum by putting together a course at Brookhaven National Laboratory (BNL) in Additional Protocol Complementary Access (APCA) to give the IAEA the opportunity to provide inspectors a necessary field exercise in a realistic environment at a research site. Brookhaven National Laboratory contains three shutdown nuclear research reactors, operating particle accelerators, hot cells, radioactive waste storage, laser laboratories, and magnet production facilities on a large site very similar to numerous research facilities around the world situated in non-nuclear weapon states (NNWS). The BNL team created an Article 2 declaration containing annotated maps of the site, descriptions of the buildings on site, satellite and aerial photographs of the area, and a declaration of research activities on the site. The declaration is as realistic to actual BNL research except that proprietary and security concerns of the BNL site have been taken into account. The BNL team felt the best training vehicle provides a

  2. Bill project authorizing the ratification of the statutes of the International Renewable Energy Agency (IRENA); Projet de Loi autorisant la ratification des statuts de l'Agence internationale pour les energies renouvelables (IRENA)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    After a presentation text describing the content of each of the 20 articles of the statutes of the International Renewable Energy Agency (IRENA), this document contains the full text of these statutes. A third text is the bill project authorizing the ratification of these statutes, and described the economic, financial, social, environmental, administrative or juridical consequences of the implementation of the agreement or convention associated with the creation of the agency. The text also recalls the negotiation process, and indicates the place given to the French language

  3. Clean energy exports and the Kyoto Protocol

    International Nuclear Information System (INIS)

    This paper discussed Canada's attempt in international negotiations to gain credits for energy exports that may result in greenhouse gas emission reductions in the United States. It examined how well founded this position is from an environmental perspective and in terms of international equity and political reality. The author emphasized that the clean energy export issue does not provide a legitimate reason to delay Canada's ratification of the Kyoto Protocol, and cautioned that further renegotiation of Kyoto targets for the first commitment period would not be practical and would jeopardize Canada's international standing. The author did note, however, that for the second commitment period, this issue could be reintroduced. Although the problem can potentially be resolved by granting credits to producers and exempting emissions, it was suggested that the most effective approach would be for countries to factor energy export considerations into their negotiating positions

  4. Protocol Additional to the agreement between the Republic of Poland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Poland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 23 September 1997, signed in Vienna on 30 September 1997, and entered into force on 5 May 2000

  5. Protocol Additional to the agreement between the Republic of Hungary and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Hungary and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 4 April 2000

  6. Protocol Additional to the agreement between the Kingdom of Norway and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the agreement between the Kingdom of Norway and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 24 March 1999, signed in Vienna on 29 September 1999, and entered into force on 16 May 2000

  7. Protocol Additional the the agreement between the Republic of Croatia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Croatia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 14 September 1998, signed in Vienna on 22 September 1998, and entered into force on 6 July 2000

  8. A simple protocol for the michael addition of indoles with electron deficient olefins catalysed by TBAHS in aqueous media and their broad spectrum antibacterial activity

    Indian Academy of Sciences (India)

    M Damodiran; R Senthil Kumar; P M Sivakumar; Mukesh Doble; Paramasivan T Perumal

    2009-01-01

    Tetrabutylammonium hydrogen sulfate catalysed addition of indoles to electron deficient olefins in water generated the corresponding Michael adducts in good to excellent yield. The Michael addition of indole occurred regioselectively at position 3 and the -alkylated products have not been observed. The synthesized compounds were tested for their antibacterial activity against four microorganisms namely, E. coli NCIM 2931, S. aureus NCIM 5021, P. vulgaris NCIM 2813, P. aeruginosa NCIM 5029 by micro dilution method. These compounds showed MIC (Minimum Inhibitory Concentration) values in the range of 0.16-2.67 M.

  9. The ADDITION-Cambridge trial protocol: a cluster – randomised controlled trial of screening for type 2 diabetes and intensive treatment for screen-detected patients

    OpenAIRE

    Kinmonth Ann; Prevost A Toby; Barling Roslyn S; Williams Kate M; Simmons Rebecca K; Echouffo-Tcheugui Justin B; Wareham Nicholas J; Griffin Simon J

    2009-01-01

    Abstract Background The increasing prevalence of type 2 diabetes poses a major public health challenge. Population-based screening and early treatment for type 2 diabetes could reduce this growing burden. However, the benefits of such a strategy remain uncertain. Methods and design The ADDITION-Cambridge study aims to evaluate the effectiveness and cost-effectiveness of (i) a stepwise screening strategy for type 2 diabetes; and (ii) intensive multifactorial treatment for people with screen-de...

  10. Protocol for ADDITION-PRO: a longitudinal cohort study of the cardiovascular experience of individuals at high risk for diabetes recruited from Danish primary care

    Directory of Open Access Journals (Sweden)

    Johansen Nanna B

    2012-12-01

    Full Text Available Abstract Background Screening programmes for type 2 diabetes inevitably find more individuals at high risk for diabetes than people with undiagnosed prevalent disease. While well established guidelines for the treatment of diabetes exist, less is known about treatment or prevention strategies for individuals found at high risk following screening. In order to make better use of the opportunities for primary prevention of diabetes and its complications among this high risk group, it is important to quantify diabetes progression rates and to examine the development of early markers of cardiovascular disease and microvascular diabetic complications. We also require a better understanding of the mechanisms that underlie and drive early changes in cardiometabolic physiology. The ADDITION-PRO study was designed to address these issues among individuals at different levels of diabetes risk recruited from Danish primary care. Methods/Design ADDITION-PRO is a population-based, longitudinal cohort study of individuals at high risk for diabetes. 16,136 eligible individuals were identified at high risk following participation in a stepwise screening programme in Danish general practice between 2001 and 2006. All individuals with impaired glucose regulation at screening, those who developed diabetes following screening, and a random sub-sample of those at lower levels of diabetes risk were invited to attend a follow-up health assessment in 2009–2011 (n = 4,188, of whom 2,082 (50% attended. The health assessment included detailed measurement of anthropometry, body composition, biochemistry, physical activity and cardiovascular risk factors including aortic stiffness and central blood pressure. All ADDITION-PRO participants are being followed for incident cardiovascular disease and death. Discussion The ADDITION-PRO study is designed to increase understanding of cardiovascular risk and its underlying mechanisms among individuals at high risk of diabetes

  11. The ADDITION-Cambridge trial protocol: a cluster – randomised controlled trial of screening for type 2 diabetes and intensive treatment for screen-detected patients

    Directory of Open Access Journals (Sweden)

    Kinmonth Ann

    2009-05-01

    Full Text Available Abstract Background The increasing prevalence of type 2 diabetes poses a major public health challenge. Population-based screening and early treatment for type 2 diabetes could reduce this growing burden. However, the benefits of such a strategy remain uncertain. Methods and design The ADDITION-Cambridge study aims to evaluate the effectiveness and cost-effectiveness of (i a stepwise screening strategy for type 2 diabetes; and (ii intensive multifactorial treatment for people with screen-detected diabetes in primary care. 63 practices in the East Anglia region participated. Three undertook the pilot study, 33 were allocated to three groups: no screening (control, screening followed by intensive treatment (IT and screening plus routine care (RC in an unbalanced (1:3:3 randomisation. The remaining 27 practices were randomly allocated to IT and RC. A risk score incorporating routine practice data was used to identify people aged 40–69 years at high-risk of undiagnosed diabetes. In the screening practices, high-risk individuals were invited to take part in a stepwise screening programme. In the IT group, diabetes treatment is optimised through guidelines, target-led multifactorial treatment, audit, feedback, and academic detailing for practice teams, alongside provision of educational materials for newly diagnosed participants. Primary endpoints are modelled cardiovascular risk at one year, and cardiovascular mortality and morbidity at five years after diagnosis of diabetes. Secondary endpoints include all-cause mortality, development of renal and visual impairment, peripheral neuropathy, health service costs, self-reported quality of life, functional status and health utility. Impact of the screening programme at the population level is also assessed through measures of mortality, cardiovascular morbidity, health status and health service use among high-risk individuals. Discussion ADDITION-Cambridge is conducted in a defined high-risk group

  12. The Kyoto Protocol : Canada's risky rush to judgement

    International Nuclear Information System (INIS)

    This paper outlined the 4 proposed policy options to implement the Kyoto Protocol in Canada and presented reasons why the Canadian timetable to ratify the Kyoto Protocol is an unrealistic and unsound policy. The Canadian Prime Minister will ask Parliament to ratify the agreement before the end of 2002 but the authors claim that before any decision regarding ratification is made, the government should cost out all relevant options, under all reasonable contingencies. For policy purposes, this paper focuses on reductions of carbon dioxide. Canada's obligation is to reduce them 6 per cent below 1990 levels by 2010, but because of economic growth, emissions among participating countries may be 30 per cent above their aggregate target. In addition, the withdrawal of the United States means that about two-thirds of the world's emissions are not covered by Kyoto. The first policy option involves the selling of emission permits covering about 80 per cent of domestic emitters. It results in 16 MT of domestic emissions reductions being accomplished and 128 MT of foreign permits being purchased. This first option is considered to be the least costly of the four. The second option relies on command-and-control measures in which 104 MT worth of new targeted measures are forced through. Although the government has not provided cost estimates for option 2, it is likely to be much more costly than option 1. The third option slightly adjusts the mix of permits trading and command-and-control measures, and distributes the permits freely instead of selling them. Only the large emitters are involved in the trading system, covering 40 per cent of domestic emission sources. The cost of emissions reductions would be lower than under option 1. The fourth and final option combines tradable permits systems in which only large emitters are involved, but where permits are distributed according to sectoral emission reduction costs, expected future emission growth rates as well as economic

  13. Addition of telephone coaching to a physiotherapist-delivered physical activity program in people with knee osteoarthritis: A randomised controlled trial protocol

    Directory of Open Access Journals (Sweden)

    Bennell Kim L

    2012-12-01

    data. Follow-up assessments will also occur at 12 and 18 months. Discussion The findings will help determine whether the addition of telephone coaching sessions can improve sustainability of outcomes from a physiotherapist-delivered physical activity intervention in people with knee OA. Trial Registration Australian New Zealand Clinical Trials Registry reference: ACTRN12612000308897

  14. Optimising corticosteroid injection for lateral epicondylalgia with the addition of physiotherapy: A protocol for a randomised control trial with placebo comparison

    Directory of Open Access Journals (Sweden)

    Brooks Peter

    2009-06-01

    Full Text Available Abstract Background Corticosteroid injection and physiotherapy are two commonly prescribed interventions for management of lateral epicondylalgia. Corticosteroid injections are the most clinically efficacious in the short term but are associated with high recurrence rates and delayed recovery, while physiotherapy is similar to injections at 6 weeks but with significantly lower recurrence rates. Whilst practitioners frequently recommend combining physiotherapy and injection to overcome harmful effects and improve outcomes, study of the benefits of this combination of treatments is lacking. Clinicians are also faced with the paradox that the powerful anti-inflammatory corticosteroid injections work well, albeit in the short term, for a non-inflammatory condition like lateral epicondylalgia. Surprisingly, these injections have not been rigorously tested against placebo injections. This study primarily addresses both of these issues. Methods A randomised placebo-controlled clinical trial with a 2 × 2 factorial design will evaluate the clinical efficacy, cost-effectiveness and recurrence rates of adding physiotherapy to an injection. In addition, the clinical efficacy and adverse effects of corticosteroid injection beyond that of a placebo saline injection will be studied. 132 participants with a diagnosis of lateral epicondylalgia will be randomly assigned by concealed allocation to one of four treatment groups – corticosteroid injection, saline injection, corticosteroid injection with physiotherapy or saline injection with physiotherapy. Physiotherapy will comprise 8 sessions of elbow manipulation and exercise over an 8 week period. Blinded follow-up assessments will be conducted at baseline, 4, 8, 12, 26 and 52 weeks after randomisation. The primary outcome will be a participant rating of global improvement, from which measures of success and recurrence will be derived. Analyses will be conducted on an intention-to-treat basis using linear

  15. [International regulation of ethics committees on biomedical research as protection mechanisms for people: analysis of the Additional Protocol to the Convention on Human Rights and Biomedicine, concerning Biomedical Research of the Council of Europe].

    Science.gov (United States)

    de Lecuona, Itziar

    2013-01-01

    The article explores and analyses the content of the Council of Europe's Additional Protocol to the Convention on Human Rights and Biomedicine concerning Biomedical Research regarding the standard legal instrument in biomedical research, issued by an international organization with leadership in bioethics. This implies ethics committees are mechanisms of protection of humans in biomedical research and not mere bureaucratic agencies and that a sound inescapable international regulatory framework exists for States to regulate biomedical research. The methodology used focuses on the analysis of the background, the context in which it is made and the nature and scope of the Protocol. It also identifies and analyses the characteristics and functions of ethics committees in biomedical research and, in particular, the information that should be provided to this bodies to develop their functions previously, during and at the end of research projects. This analysis will provide guidelines, suggestions and conclusions for the awareness and training of members of these committees in order to influence the daily practice. This paper may also be of interest to legal practitioners who work in different areas of biomedical research. From this practical perspective, the article examines the legal treatment of the Protocol to meet new challenges and classic issues in research: the treatment of human biological samples, the use of placebos, avoiding double standards, human vulnerability, undue influence and conflicts of interest, among others. Also, from a critical view, this work links the legal responses to develop work procedures that are required for an effective performance of the functions assigned of ethics committees in biomedical research. An existing international legal response that lacks doctrinal standards and provides little support should, however, serve as a guide and standard to develop actions that allow ethics committees -as key bodies for States- to advance in

  16. After Indonesia’s Ratification: The ASEAN Agreement on Transboundary Haze Pollution and Its Effectiveness As a Regional Environmental Governance Tool

    Directory of Open Access Journals (Sweden)

    Daniel Heilmann

    2015-01-01

    Full Text Available On 20 January 2015 Indonesia deposited its instrument of ratification for the ASEAN Agreement on Transboundary Haze Pollution with the ASEAN Secretariat, becoming the last ASEAN member state to join the treaty. Haze pollution poses a serious health threat to the people of Indonesia, Singapore and Malaysia, and for decades haze pollution has been a highly contentious issue among ASEAN member states. This article argues that Indonesia’s ratification will not be an immediate game changer. The mechanisms of the agreement are too weak to contribute much to a reduction of haze pollution in the region. The agreement is designed according to the ASEAN way: a non-binding approach that is based on the principles of state sovereignty and non-intervention. This makes it unlikely that the agreement itself will bring about change, even now that all ASEAN member states have ratified it.

  17. Report on the behalf of the Foreign Affairs, Defence and Armed Forces Commission on: the bill project (accelerated procedure) authorizing the ratification of the joint procurement agreement for a designation by auction of common bid platforms, and the bill project (accelerated procedure) authorizing the ratification of the joint procurement agreement for a designation by auction of an auction monitor. Nr 171

    International Nuclear Information System (INIS)

    This document first presents the currently operating greenhouse gas emission quota trading scheme and its evolution according to which quotas will be put up for auction. Then, it more precisely describes different aspects of this arrangement: general economy of the auction system, common auction platforms, auction monitor, and market procedures. Consequences on the French law are presented. The ratification procedure is discussed

  18. A secure additive protocol for card players

    CERN Document Server

    Cordon-Franco, Andres; Fernandez-Duque, David; Joosten, Joost J; Soler-Toscano, Fernando

    2011-01-01

    Consider three players Alice, Bob and Cath who hold a, b and c cards, respectively, from a deck of d=a+b+c cards. The cards are all different and players only know their own cards. Suppose Alice and Bob wish to communicate their cards to each other without Cath learning whether Alice or Bob holds a specific card. Considering the cards as consecutive natural numbers 0,1,..., we investigate general conditions for when Alice or Bob can safely announce the sum of the cards they hold modulo an appropriately chosen integer. We demonstrate that this holds whenever a,b>2 and c=1. Because Cath holds a single card, this also implies that Alice and Bob will learn the card deal from the other player's announcement.

  19. Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for teh Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002

  20. Protocol Additional to the Agreement between the Dominican Republic and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Dominican Republic and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed in Vienna on 20 September 2007

  1. The roles of parties with different commitments under the Kyoto Protocol and implications for NAFTA

    International Nuclear Information System (INIS)

    A government perspective on climate change negotiations was presented with particular reference to Canada's cleaner energy exports, the Kyoto mechanism and the second commitment period. The author emphasized the importance of cleaner energy exports for Canada, although progress is likely to be slow in this area because of the opposition among other Parties. Whatever approach the United States takes to trading, it must be compatible with the Kyoto Protocol. Eligibility for trading in North America was discussed with reference to what effect Canada's ratification of the Protocol would have on energy exports. It was noted that if Canada ratifies, it could be both a buyer and a seller, whereas the United States could only buy and Mexico could only sell. The author also suggested that developing countries or major emitters should take on commitments in order to provide greater compatibility in the North American context, especially if the United States rejoined the Kyoto Protocol

  2. Protocol Additional to the agreement between the United Kingdom of Great Britain and Northern Ireland, the European Atomic Energy Community and the International Atomic Energy Agency for the application of safeguards in the United Kingdom of Great Britain and Northern Ireland in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the United Kingdom of Great Britain and Northern Ireland, the European Atomic Energy Community and the International Atomic Energy Agency for the Application of Safeguards in the United Kingdom of Great Britain and Northern Ireland in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 30 April 2004, the date on which the Agency received written notification that the European Atomic Energy Community and the United Kingdom had met their respective internal requirements for entry into force

  3. Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed on 7 July 2006 in Sydney and 14 July 2006 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 14 July 2006, upon signature by the representatives of the Republic of the Fiji Islands and the Agency

  4. Protocol Additional to the agreement between the Republic of El Salvador and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of El Salvador and the International Atomic Energy Agency in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 23 September 2002. It was signed on 5 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 May 2004, the date on which Agency received from El Salvador written notification that El Salvador's statutory and/or constitutional requirements for entry into force had been met

  5. Protocol Additional to the agreement between the Republic of Paraguay and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Paraguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 12 June 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 15 September 2004, the date on which the Agency received from Paraguay written notification that Paraguay's statutory and/or constitutional requirements for entry into force had been met

  6. Protocol Additional to the agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the application of safeguards in connection with the treaty for the prohibition of nuclear weapons in Latin America and the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 18 February 2005, the date on which the Agency received from Nicaragua written notification that Nicaragua's statutory and/or constitutional requirements for entry into force had been met

  7. Protocol Additional to the Agreement between the Republic of Cuba and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Cuba and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 9 September 2003. It was signed on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 3 June 2004, the date on which the Agency received from Cuba written notification that Cuba's statutory and/or constitutional requirements for entry into force had been met

  8. Protocol Additional to the Agreement of 31 October 1975 between the Government of the Republic of Korea and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement of 31 October 1975 between the Government of the Republic of Korea and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 24 March 1999 and signed in Vienna on 21 June 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 February 2004, the date on which the Agency received from the Republic of Korea written notification that the Republic of Korea's statutory and/or constitutional requirements for entry into force had been met

  9. Optimisation thermique de moules d'injection construits par des processus génératifs

    Science.gov (United States)

    Boillat, E.; Glardon, R.; Paraschivescu, D.

    2002-12-01

    Une des potentialités les plus remarquables des procédés de production génératifs, comme le frittage sélectif par laser, est leur capacité à fabriquer des moules pour l'injection plastique équipés directement de canaux de refroidissement conformes, parfaitement adaptés aux empreintes Pour que l'industrie de l'injection puisse tirer pleinement parti de cette nouvelle opportunité, il est nécessaire de mettre à la disposition des moulistes des logiciels de simulation capables d'évaluer les gains de productivité et de qualité réalisables avec des systèmes de refroidissement mieux adaptés. Ces logiciels devraient aussi être capables, le cas échéant, de concevoir le système de refroidissement optimal dans des situations où l'empreinte d'injection est complexe. Devant le manque d'outils disponibles dans ce domaine, le but de cet article est de proposer un modèle simple de moules d'injection. Ce modèle permet de comparer différentes stratégies de refroidissement et peut être couplé avec un algorithme d'optimisation.

  10. Report on the behalf of the Commission for Foreign Affairs on the bill project adopted by the Senate, bearing application of the additional protocol to the agreement between France, the European Atomic Energy Community, and the International Atomic Energy Agency related to the application of guarantees in France, signed in Vienna on the 22 September 1998. Nr 3428

    International Nuclear Information System (INIS)

    This report first discusses an international context which requires a strengthened regime of nuclear non proliferation. It outlines that the struggle against nuclear proliferation is more than ever a matter of concern (a severe threat for peace, security and stability, a contrasted situation with noticeable advances in some countries and regions on the one hand, and severe proliferation crisis on the other hand). It analyses the contribution of the additional protocol to the strengthening of the non proliferation regime: a necessary strengthening of the IAEA guarantee system, the NPT as a keystone of the non proliferation regime, and a perfectible regime on other issues. The second part outlines that the bill project consolidates the French participation to the IAEA guarantee system. The Commission works are then reported, notably the detailed examination of the different bill project articles which deal with declaration obligations, international verification, penal arrangements, and arrangements related to overseas territories and other arrangements. Appendices propose an impact study, a comparative table between the text transmitted by the Senate and the provisions of the additional protocol, a comparison between the French additional protocol and the model adopter in 1997, a comparative table of additional protocols adopted by other countries, and a list of additional protocols

  11. Submission to the British Columbia government on the Kyoto Protocol

    International Nuclear Information System (INIS)

    The Business Council provided its comments concerning the Kyoto Protocol and climate change to the government of British Columbia, recommending that a clear position be established quickly on the matter. The adopted position should also be disseminated broadly to allow stake holders sufficient time to prepare for the upcoming meetings of the Joint Ministers and First Ministers. The federal government has announced that the decision on whether to ratify the Kyoto Protocol will be made before the end of 2002, and this decision will have numerous effects on the people of British Columbia, businesses, workers, and consumers alike. The Business Council of British Columbia believes that the unique interests of the province can best be protected by a proactive approach. Actions plans are being prepared by several of the other provinces and territories, who have already stated their position concerning the Kyoto Protocol. The long-term risks of climate change for British Columbia have not been determined nor have the elements of a provincial approach. The following elements should be included in British Columbia's position on the Kyoto Protocol, according to the Business Council of British Columbia: (1) a credible and cost-effective implementation plan that does not unduly burden the province and other jurisdictions must be developed before Canada decides to ratify the Protocol. British Columbia should go on the record stating it does not support the ratification of the Kyoto Protocol in its present form. (2) the province should advocate for a national approach to climate change that can be achieved within a reasonable time frame, reflects the long-term nature of the problem, and is in agreement with the economic development objectives of British Columbia, (3) a plan detailing how the province intends to deal with the growth of greenhouse gas emissions should supplement and support the position of the province on the Kyoto Protocol. Consumers and business should be engaged

  12. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... framework. We call this framework VIFF, short for Virtual Ideal Functionality Framework. VIFF implements a UC functionality for general multiparty computation on asynchronous networks. We give a formal definition of the functionality in Chapter 3. There we also describe how we implemented the functionality...... no information is released. The communication complexity of this protocol is the same as that of a passively secure solution up to a constant factor. It is secure against an adaptive and active adversary corrupting less than n=3 players. Following the presentation of VIFF, we turn to a more theoretical subject...

  13. Rational Protocols

    Science.gov (United States)

    Cachin, Christian

    Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.

  14. A study protocol of a randomised controlled trial incorporating a health economic analysis to investigate if additional allied health services for rehabilitation reduce length of stay without compromising patient outcomes

    Directory of Open Access Journals (Sweden)

    Peiris Casey

    2010-11-01

    alongside the randomised controlled trial. Discussion This paper outlines the study protocol for the first fully powered randomised controlled trial incorporating a health economic analysis to establish if additional Saturday allied health services for rehabilitation inpatients reduces length of stay without compromising discharge outcomes. If successful, this trial will have substantial health benefits for the patients and for organizations delivering rehabilitation services. Clinical trial registration number Australian and New Zealand Clinical Trials Registry ACTRN12609000973213

  15. Law project for the application of additional protocol to the agreement between France and the atomic energy european community and the international atomic energy agency relative to the application of guaranties in France, signed at Vienna the 22 september 1998; Projet de loi portant application du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France, signe a Vienne le 22 septembre 1998

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-04-15

    This law project aims to allow the application of the additional protocol. This protocol plans the transmission, by France, to IAEA of defined information. These information concern materials and nuclear activities non declared by States not owning the nuclear weapon. (A.L.B.)

  16. Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed on 7 July 2006 in Sydney and 14 July 2006 in Vienna

  17. Protocol Additional to the Agreement between the Republic of Costa Rica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between the Republic of Costa Rica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 29 November 2001. It was signed in in San Jose, Costa Rica on 12 December 2001

  18. Protocol Additional to the Agreement between Antigua and Barbuda and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The text of the Protocol Additional to the Agreement between Antigua and Barbuda and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 10 September 2013. It was signed on 30 October 2013 in St. John's, Antigua and Barbuda, and on 15 November 2013 in Vienna, Austria

  19. Histology protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Tim D. Hewitson & Ian A. Darby (Eds Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 611, 2010 Pages: 230; € 83.15 ISBN: 978-1-60327-344-2 Impressive as it can sounds in the era that Biology see a clear dominance of reductionism with the idea that complexity can be disentagled more and more thanks to the use of molecular tools, the reader will remain fascinated by this slim and agile volume devoted to bring together what apparently are two separeted words: molecular biology and histology. Simply remembering to the youngest scientists.....

  20. CJEU - Judgment of 23.9.2013 (grand chamber) - Case c-221/11 leyla Demirkan v Bundesrepublik Deutschland - Association agreement with Turkey - Article 41 of the additional protocol -freedom to provide services - Visa requirement: Turkey association agreement does not cover passive reception of services and Turkish nationals wishing to enter the Schengen area cannot benefit from this freedom

    NARCIS (Netherlands)

    Matera, C.

    2014-01-01

    With the Demirkan case the CJEU was called upon to clarify the scope of Article 41(1) of the Additional protocol to the EU - Turkey Association Agreement and affirm whether the Soysal and Savatli ruling was also applicable to the passive reception of services and, more specifically, to tourists. The

  1. Report on the behalf of the Foreign Affairs Commission on the bill project n 3080 authorizing the ratification of the statutes of the International Renewable Energy Agency (IRENA)

    International Nuclear Information System (INIS)

    This document first recalls that the creation of the International Renewable Energy Agency (IRENA) is due to a German initiative. It recalls the rather quick negotiations (2007-2009) which led to the creation of the Agency, outlines that its statutes were inspired by those of other organizations coming under the United Nations. It comments the content of the article which defines the agency's missions. Then it discusses some questions which have been shelved: the absence of China and Russia, the risk of non ratification by the United States, the language issue. In a second part, the document reports the discussions during the bill examination by the Commission. An appendix indicates the countries which have signed or ratified the IRENA statutes

  2. Testing for identification of locking, maintenance and ratification of large expansion joints; Teste para identificacao de travamento, manutencao e aceitacao de junta de expansao de grande porte

    Energy Technology Data Exchange (ETDEWEB)

    Veiga, Jordana Luiza Barbosa da Costa; Lemos, Ricardo Jose Fernandes; Medeiros, Jorivaldo [Petroleo Brasileiro S.A. (PETROBRAS), Rio de Janeiro, RJ (Brazil)

    2012-07-01

    Piping systems connected to large machines must have high reliability. In particular systems that have traditionally turbo expander large diameter and operate at high temperatures (up to 760 deg C) and low pressure (less than 4 kgf/cm2). This paper focuses on verification, maintenance and ratification of the correct functioning of expansion joints ('JE') of a piping system (72 inches external diameter), connected to a turbo expander system. After verification of 'JE's' locking, it was necessary to intervene in the system to restore the correct operation, for reasons of delivery, only maintenance was carried out in the expansion joints connected to this system. These expansion joints were tested before and after the maintenance to ensure proper operation after installation and verify that the locking system had its origin in 'JE'. This paper presents the degradation observed in JE, maintenance performed and the results of the tests. (author)

  3. Evolution du parcours génératif : vers un remaniement des structures spatiales dans La Route d'Altamont de Gabrielle Roy

    Directory of Open Access Journals (Sweden)

    Navarette Pierre-Antoine

    2014-07-01

    Full Text Available A partir d’une sémiotique de l’espace appliquée à l’œuvre de G. Roy, La Route d’Altamont, publiée en 1966, nous nous proposons à travers cet article de mesurer l’évolution du modèle d’analyse du parcours génératif au sein de la théorie générale de la signification, tel qu’il a été présenté par A. J. Greimas et J. Courtès dans Le Dictionnaire raisonné de la théorie du langage, puis par J. Fontanille dans Sémiotique du discours et Sémiotique et littérature notamment, afin de pouvoir évaluer la pertinence de ses mécanismes et la puissance de son appareil théorique. Sur le plan épistémologique, nous nous intéresserons donc aux transformations qui se sont opérées lors du passage d’une version du parcours génératif à l’autre. Pour mener à bien cette étude, et pour pouvoir mesurer les implications d’un tel remaniement théorique, nous nous baserons donc sur des fragments textuels mettant en exergue précisément ce qu’autorise en matière de production de sens le nouveau modèle fontanillien : nous étudierons ainsi La Route d’Altamont de G. Roy afin de dégager des structures spatiales relevant d’un ordre sémiotique différent de celui que propose la théorie classique lorsque celle-ci, par exemple, situe exclusivement au niveau fondamental les valeurs abstraites et axiologiques.

  4. Nr 621 - Report on the behalf of the Commission of foreign affairs, defence and armed forces on the bill project on the application of the additional protocol to the agreement between France, the European Atomic Energy Community, and the International Atomic Energy Agency related to the application of guarantees in France, signed in Vienna on the 22 September 1998

    International Nuclear Information System (INIS)

    This report concerns an additional protocol which aims at reinforcing the efficiency of the international guarantee system. This system is part of an international approach for the struggle against nuclear weapon proliferation. The authors outline the necessary evolution of law to deal with the risk of development of clandestine military nuclear programs. They present the role of the IAEA, its organisation, its financing, and outline its reinforced role within the frame of the NPT (Non Proliferation Treaty) and of generalised guarantee agreements (a typology of these agreements is given). They also outline the limits of this guarantee system, and the necessity of its adaptation through an additional protocol. They discuss the difficulty of an international application (notably in the cases of Iran and North Korea). The articles are then discussed. They deal with definitions, declaration obligations, international verification, penal arrangements, arrangements related to overseas territories and other arrangements. The commission discussion is reported, and tables give comparisons between agreements

  5. Brazil and the strengthening of safeguard system of the International Atomic Energy Agency: from the four-part agreement to the additional protocol; O Brasil e o fortalecimento do sistema de salvaguardas da Agencia Internacional de Energia Atomica: do acordo quadripartite ao protocolo adicional

    Energy Technology Data Exchange (ETDEWEB)

    Moura, Carmen Lidia Richter Ribeiro

    2001-07-01

    The main objective of this paper is to analyse the evolution of IAEA verification system, that constitutes one of the main fundaments of the Non-proliferation nuclear weapons regimen, and to point out elements that contribute to inform the Brazilian position related to the Model Protocol additional to agreements for safeguard application: instrument that comprehend the most recent multilateral efforts of the nuclear verification

  6. Protocol between Romania and the International Atomic Energy Agency additional to the agreement between the Socialist Republic of Romania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    The document reproduces the text of the Protocol Additional to the agreement between Romania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 9 June 1999, signed in Vienna on 11 June 1999, and entered into force on 7 July 2000

  7. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  8. Mobile internet protocol analysis

    OpenAIRE

    Brachfeld, Lawrence J.

    1999-01-01

    Mobile Internet Protocol (IP) is a proposed standard that builds on the current Internet Protocol by making the fact that a user is mobile transparent to applications and higher level protocols such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet while maintaining any current conne...

  9. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  10. Reading the Kyoto Protocol. Ethical aspects of the convention on climate change

    International Nuclear Information System (INIS)

    The Kyoto Protocol to the United Nations Framework Convention on Climate Change aims to reduce greenhouse gas emissions by urging the international community to take measures preventing 'dangerous man-made interference with the climate system'. Since its publication in 1997, the Kyoto Protocol has triggered heated debates among scientists and politicians. According to a number of critics, the questions as to whether global warming is caused by human intervention, and whether taking appropriate measures could reduce the trend, has not yet been conclusively answered. In a limited number of countries, this situation has led to a delay in the ratification process. Only when these disputes were settled in February 2005 the Kyoto Protocol became legally binding on all the signatories. If predictions are accurate, measures have to be taken to prevent a global catastrophe. This leads to another, much overlooked, but no less important question, namely how mankind can be motivated to accept the burden attached to the measures proposed by the Kyoto Protocol; in other words, how do we find and formulate an ethical basis for measures forcing us to sacrifice some of our wealth and riches, for a cleaner, more sustainable world?

  11. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Ching-Nung Yang; Su-Hsuan Chu; Bing-Ling Lu

    2005-01-01

    Kak's quantum key distribution (QKD) protocol provides not only the distribution but also the integrity of secret key simultaneously in quantum channel. Consequently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the failure of Kak's protocol and show that Kak's protocol does not have the joint distribution and integration that the author declares in [1].

  12. Report made on behalf of the Commission of foreign affairs about the bill, adopted by the Senate, authorizing the approval of the additional protocol to the construction agreement between the French government and the International organization of fusion energy for the joint implementation of the ITER project, and relative to the role of the labour inspection on the ITER international organization site and dealing with occupational health and safety

    International Nuclear Information System (INIS)

    The aim of the additional protocol to the construction agreement between the French Government and the ITER Organization is to allow the French labour inspection services to control the good respect of the French occupational health and safety regulation at the project site (Cadarache, Bouches du Rhone) and to play its role of adviser to the persons responsible for the organization. A bill authorizing the approval of this additional protocol was adopted by the French Senate. This report is the examination by the Commission of foreign affairs of this bill. It presents, first the ITER project, its opportunities for Europe and France, and its juridical framework which favours transparency. Then it introduces the additional protocol as an additional element of transparency and as an exception to the traditional rules of the international right as well. Finally, the authorization of this approval by the Commission of foreign affairs is presented in the form of a single article. (J.S.)

  13. Methow and Columbia Rivers studies: summary of data collection, comparison of database structure and habitat protocols, and impact of additional PIT tag interrogation systems to survival estimates, 2008-2012

    Science.gov (United States)

    Martens, Kyle D.; Tibbits, Wesley T.; Watson, Grace A.; Newsom, Michael A.; Connolly, Patrick J.

    2014-01-01

    designed to show some initial analysis and to disseminate summary information that could potentially be used in ongoing modeling efforts by USGS, Reclamation, and University of Idaho. The second chapter documents the database of fish and habitat data collected by USGS from 2004 through 2012 and compares USGS habitat protocols to the Columbia Habitat Monitoring Program (CHaMP) protocol. The third chapter is a survival analysis of fish moving through Passive Integrated Transponder (PIT) tag interrogation systems in the Methow and Columbia Rivers. It examines the effects of adding PIT tags and/or PIT tag interrogation systems on survival estimates of juvenile steelhead and Chinook salmon.

  14. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison pr

  15. Economic analysis of a phase III clinical trial evaluating the addition of total androgen suppression to radiation versus radiation alone for locally advanced prostate cancer (Radiation Therapy Oncology Group protocol 86-10)

    International Nuclear Information System (INIS)

    Purpose: To evaluate the cost-effectiveness of adding hormone therapy to radiation for patients with locally advanced prostate cancer, using a Monte Carlo simulation of a Markov Model. Methods and Materials: Radiation Therapy Oncology Group (RTOG) protocol 86-10 randomized patients to receive radiation therapy (RT) alone or RT plus total androgen suppression (RTHormones) 2 months before and during RT for the treatment of locally advanced prostate cancer. A Markov model was designed with Data Pro (TreeAge Software, Williamstown, MA). The analysis took a payer's perspective. Transition probabilities from one state of health (i.e., with no disease progression or with hormone-responsive metastatic disease) to another were calculated from published rates pertaining to RTOG 86-10. Patients remained in one state of health for 1 year. Utility values for each health state and treatment were obtained from the literature. Distributions were sampled at random from the treatment utilities according to a second-order Monte Carlo simulation technique. Results: The mean expected cost for the RT-only treatments was $29,240 (range, $29,138-$29,403). The mean effectiveness for the RT-only treatment was 5.48 quality-adjusted life years (QALYs) (range, 5.47-5.50). The mean expected cost for RTHormones was $31,286 (range, $31,058-$31,555). The mean effectiveness was 6.43 QALYs (range, 6.42-6.44). Incremental cost-effectiveness analysis showed RTHormones to be within the range of cost-effectiveness at $2,153/QALY. Cost-effectiveness acceptability curve analysis resulted in a >80% probability that RTHormones is cost-effective. Conclusions: Our analysis shows that adding hormonal treatment to RT improves health outcomes at a cost that is within the acceptable cost-effectiveness range

  16. Research on Protocol Migration

    Institute of Scientific and Technical Information of China (English)

    汪芸; 顾冠群; 等

    1996-01-01

    This paper elaborates the concept and model of protocol migration in network interconnection.Migration strategies and principles are discussed and several cases are studied in detail which show the basic procedure and techniques used in protocol migration.

  17. A New Watermarking Protocol against Conspiracy

    Institute of Scientific and Technical Information of China (English)

    ZHANG Jun; KOU Weidong; FAN Kai; CAO Xuefei

    2006-01-01

    A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.

  18. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  19. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  20. Cryptographic Protocols under Quantum Attacks

    CERN Document Server

    Lunemann, Carolin

    2011-01-01

    The realm of this thesis is cryptographic protocol theory in the quantum world. We study the security of quantum and classical protocols against adversaries that are assumed to exploit quantum effects to their advantage. Security in the quantum world means that quantum computation does not jeopardize the assumption, underlying the protocol construction. But moreover, we encounter additional setbacks in the security proofs, which are mostly due to the fact that some well-known classical proof techniques are forbidden by certain properties of a quantum environment. Interestingly, we can exploit some of the very same properties to the benefit of quantum cryptography. Thus, this work lies right at the heart of the conflict between highly potential effects but likewise rather demanding conditions in the quantum world.

  1. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and all...

  2. Adaptation of TURN protocol to SIP protocol

    CERN Document Server

    Guezouri, Mustapha; Keche, Mokhtar

    2010-01-01

    Today, SIP is a protocol par Excellence in the field of communication over Internet. But, the fact that it belongs to the application layer constitutes a weakness vis-a-vis the NAT traversal. This weakness is due to the way in which the server replies to the requests of clients on the one hand. On the other, it is caused by the dynamic allocation of UDP ports for emission and reception of packets RTP/RTCP. The TURN Protocol may face this weakness. However, its use requires a certain number of exchanges between the clients and a TURN server before establishing the multimedia sessions and this increase the latent time. In this article, we propose to adapt TURN protocol for applications based on SIP protocol such as telephony over Internet, conference video, etc. This adaptation optimises the establishment of multimedia sessions by integrating a manager of TCP connections and multimedia flow controller into SIP Proxy server.

  3. Blind Collective Signature Protocol

    Directory of Open Access Journals (Sweden)

    Nikolay A. Moldovyan

    2011-06-01

    Full Text Available Using the digital signature (DS scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed protocols can be used also as protocols for simultaneous signing a contract. The proposed blind collective DS protocol represents a particular implementation of the blind multisignature schemes that is a novel type of the signature schemes. The proposed protocols are the first implementations of the multisignature schemes based on Belarusian signature standard.

  4. Training program to prepare the U.S. DOE laboratories for the entry into force of the protocol additional to the agreement between the United States of America and the International Atomic Energy Agency for the application of safeguards in the United

    Energy Technology Data Exchange (ETDEWEB)

    Boyer, Brian David [Los Alamos National Laboratory; Stevens, Rebecca C [Los Alamos National Laboratory; Uribe, Eva C [Los Alamos National Laboratory; Sandoval, M Analisa [Los Alamos National Laboratory; Valente, John N [Los Alamos National Laboratory; Valente, John U [BNL; Jo, Jae H [BNL; Sellen, Joana [U.S. DOE/NNSA; Wonder, Edward [QINETIQ-NORTH AMERICA

    2009-01-01

    In 2008, a joint team from Brookhaven National Laboratory (BNL) and Los Alamos National Laboratory (LANL) consisting of specialists in training IAEA inspectors in the use of complementary access activities formulated a training program to prepare the U.S DOE laboratories for the entry into force of the U.S. Additional Protocol. Since the U.S. Additional Protocol would allow for IAEA access to the DOE laboratories under the aegis of complementary access activities, the DOE laboratories would need to prepare for such visits. The goal of the training was to ensure that the DOE laboratories would successfully host an IAEA complementary access. In doing so, the labs must be able to provide the IAEA with the information that the IAEA would need to resolve its questions about the U.S. Declaration and declared activities at the lab, and also protect certain equities, as provided under the U.S. Additional Protocol Article 1.b and c. which set forth a 'National Security Exclusion.' This 'NSE' states that the AP provisions apply within the United States 'excluding only instances where its application would result in access by the Agency to activities with direct national security significance to the United States or to location or information associated with such activities.' These activities are referred to collectively as DNSS-direct national security significance. Furthermore, the U.S. has a specific right to employ managed access, without prejudice to the right under Article 1.b, in connection with activities of DNSS. The provisions in Articles 1.b and 1.c are unique to the U.S. AP, and are additional to the more general right, under Article 7, to use managed access to protect from disclosure proprietary and/or proliferation-sensitive information, and to meet safety and security requirements, that is incorporated directly from the Model Additional Protocol. The BNL-LANL team performed training at Lawrence Livermore National Laboratory, Idaho

  5. Is the Kyoto Protocol an adequate environmental agreement to resolve the climate change problem?

    International Nuclear Information System (INIS)

    The lack of understanding on how to handle the issue of global warming, which is embodied by the Kyoto Protocol, among the various nations of the world reached a point where environmental policy-makers saw a number of possible scenarios to global warming before the last meeting on Climate Change in July 2001 in Bonn: Amendments to the Kyoto Protocol, by changing the current targets and timetable into a long-term view of the global warming issue. The U.S. does not agree with the Kyoto Protocol Therefore, it will not do anything about it in terms of its ratification. A middle ground between the two previous options. The idea is the creation of a new mechanism where nations meet in international environmental for a voluntarily exchange of views with no legal commitments. In order to move forward, we should stop thinking of the global warming issue only in a cost-benefit analysis and instead take more into account public health and safety requirements. Since the U.S. and EU representatives may well find themselves deadlocked again when they meet at the end of October 2001 in Morocco for the next climate change convention, the author would like to make some recommendations at the end of this article. (author)

  6. Protocol for the ADDITION-Plus study: a randomised controlled trial of an individually-tailored behaviour change intervention among people with recently diagnosed type 2 diabetes under intensive UK general practice care

    Directory of Open Access Journals (Sweden)

    Fanshawe Tom

    2011-04-01

    Full Text Available Abstract Background The increasing prevalence of type 2 diabetes poses both clinical and public health challenges. Cost-effective approaches to prevent progression of the disease in primary care are needed. Evidence suggests that intensive multifactorial interventions including medication and behaviour change can significantly reduce cardiovascular morbidity and mortality among patients with established type 2 diabetes, and that patient education in self-management can improve short-term outcomes. However, existing studies cannot isolate the effects of behavioural interventions promoting self-care from other aspects of intensive primary care management. The ADDITION-Plus trial was designed to address these issues among recently diagnosed patients in primary care over one year. Methods/Design ADDITION-Plus is an explanatory randomised controlled trial of a facilitator-led, theory-based behaviour change intervention tailored to individuals with recently diagnosed type 2 diabetes. 34 practices in the East Anglia region participated. 478 patients with diabetes were individually randomised to receive (i intensive treatment alone (n = 239, or (ii intensive treatment plus the facilitator-led individual behaviour change intervention (n = 239. Facilitators taught patients key skills to facilitate change and maintenance of key behaviours (physical activity, dietary change, medication adherence and smoking, including goal setting, action planning, self-monitoring and building habits. The intervention was delivered over one year at the participant's surgery and included a one-hour introductory meeting followed by six 30-minute meetings and four brief telephone calls. Primary endpoints are physical activity energy expenditure (assessed by individually calibrated heart rate monitoring and movement sensing, change in objectively measured dietary intake (plasma vitamin C, medication adherence (plasma drug levels, and smoking status (plasma cotinine levels at

  7. Block Advertisement Protocol

    OpenAIRE

    Nemirovsky, Danil

    2015-01-01

    Bitcoin, a decentralized cryptocurrency, has attracted a lot of attention from academia, financial service industry and enthusiasts. The trade-off between transaction confirmation throughput and centralization of hash power do not allow Bitcoin to perform at the same level as modern payment systems. Block Advertisement Protocol is proposed as a step to resolve this issue. The protocol allows block mining and block relaying to happen in parallel. The protocol dictates a miner to advertise the ...

  8. Military veterans with mental health problems: a protocol for a systematic review to identify whether they have an additional risk of contact with criminal justice systems compared with other veterans groups

    Directory of Open Access Journals (Sweden)

    Taylor James

    2012-11-01

    Full Text Available Abstract Background There is concern that some veterans of armed forces, in particular those with mental health, drug or alcohol problems, experience difficulty returning to a civilian way of life and may subsequently come into contact with criminal justice services and imprisonment. The aim of this review is to examine whether military veterans with mental health problems, including substance use, have an additional risk of contact with criminal justice systems when compared with veterans who do not have such problems. The review will also seek to identify veterans’ views and experiences on their contact with criminal justice services, what contributed to or influenced their contact and whether there are any differences, including international and temporal, in incidence, contact type, veteran type, their presenting health needs and reported experiences. Methods/design In this review we will adopt a methodological model similar to that previously used by other researchers when reviewing intervention studies. The model, which we will use as a framework for conducting a review of observational and qualitative studies, consists of two parallel synthesis stages within the review process; one for quantitative research and the other for qualitative research. The third stage involves a cross study synthesis, enabling a deeper understanding of the results of the quantitative synthesis. A range of electronic databases, including MEDLINE, PsychINFO, CINAHL, will be systematically searched, from 1939 to present day, using a broad range of search terms that cover four key concepts: mental health, military veterans, substance misuse, and criminal justice. Studies will be screened against topic specific inclusion/exclusion criteria and then against a smaller subset of design specific inclusion/exclusion criteria. Data will be extracted for those studies that meet the inclusion criteria, and all eligible studies will be critically appraised. Included

  9. Transport Protocol Throughput Fairness

    Directory of Open Access Journals (Sweden)

    Saleem Bhatti

    2009-11-01

    Full Text Available Interest continues to grow in alternative transport protocols to the Transmission Control Protocol (TCP. These alternatives include protocols designed to give greater efficiency in high-speed, high-delay environments (so-called high-speed TCP variants, and protocols that provide congestion control without reliability. For the former category, along with the deployed base of ‘vanilla’ TCP – TCP NewReno – the TCP variants BIC and CUBIC are widely used within Linux: for the latter category, the Datagram Congestion Control Protocol (DCCP is currently on the IETF Standards Track. It is clear that future traffic patterns will consist of a mix of flows from these protocols (and others. So, it is important for users and network operators to be aware of the impact that these protocols may have on users. We show the measurement of fairness in throughput performance of DCCP Congestion Control ID 2 (CCID2 relative to TCP NewReno, and variants Binary Increase Congestion control (BIC, CUBIC and Compound, all in “out-of-the box” configurations. We use a testbed and endto- end measurements to assess overall throughput, and also to assess fairness – how well these protocols might respond to each other when operating over the same end-to-end network path. We find that, in our testbed, DCCP CCID2 shows good fairness with NewReno, while BIC, CUBIC and Compound show unfairness above round-trip times of 25ms.

  10. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    . In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise...

  11. Diagrammatization of the Transmission Control Protocol

    Directory of Open Access Journals (Sweden)

    Sabah Al-Fedaghi

    2012-09-01

    Full Text Available With the wide spread of Internet services, developers and users need a greater understanding of the technology of networking. Acquiring a clear understanding of communication protocols is an important step in understanding how a network functions; however, many protocols are complicated, and explaining them can be demanding. In addition, protocols are often explained in terms of traffic analysis and oriented toward technical staff and those already familiar with network protocols. This paper aims at proposing a diagrammatic methodology to represent protocols in general, with a focus on the Transmission Control Protocol and Secure Sockets Layer in particular. The purpose is to facilitate understanding of protocols for learning and communication purposes. The methodology is based on the notion of flow of primitive things in a system with six stages: creation, release, transfer, arrival, acceptance, and processing. Though the method presents a basic description of protocols without in-depth analysis of all aspects and mechanisms, the resultant conceptual description is a systematic specification that utilizes a few basic notions that assist in illustrating functionality and support comprehension.

  12. Guidance for States Implementing Comprehensive Safeguards Agreements and Additional Protocols

    International Nuclear Information System (INIS)

    This publication is aimed at enhancing States’ understanding of the safeguards obligations of both the State and the IAEA, and at improving the cooperation between States and the IAEA in safeguards implementation. It is principally intended for State or regional safeguards regulatory authorities and facility operators, and is a reference document that is supported by detailed guidance and examples in safeguards implementation practices presented in other publications in the series. (This version is the 2016 update.)

  13. On using Mobile IP Protocols

    Directory of Open Access Journals (Sweden)

    Fayza A. Nada

    2006-01-01

    Full Text Available The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol has been designed within the IETF to support the mobility of users who wish to connect to the Internet and maintain communications as they move from place to place. This study describes and summarizes the current Internet draft for mobile IP (MIPv4 with its major components: agent discovery, registration and tunneling. In addition, we outline the available encapsulation techniques and route optimization procedure. In the end, we describe the design of the new protocol for transparent routing of IPv6 packets to mobile IPv6 nodes operating in the Internet.

  14. IPv6 Protocol Analyzer

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    With the emerging of next generation Intemet protocol (IPv6), it is expected to replace the current version of Internet protocol (IPv4) that will be exhausted in the near future. Besides providing adequate address space, some other new features are included into the new 128 bits of IP such as IP auto configuration, quality of service, simple routing capability, security, mobility and multicasting. The current protocol analyzer will not be able to handle IPv6 packets. This paper will focus on developing protocol analyzer that decodes IPv6 packet. IPv6 protocol analyzer is an application module,which is able to decode the IPv6 packet and provide detail breakdown of the construction of the packet. It has to understand the detail construction of the IPv6, and provide a high level abstraction of bits and bytes of the IPv6 packet.Thus it increases network administrators' understanding of a network protocol,helps he/she in solving protocol related problem in a IPv6 network environment.

  15. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  16. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  17. Additivity dominance

    Directory of Open Access Journals (Sweden)

    Paul Rozin

    2009-10-01

    Full Text Available Judgments of naturalness of foods tend to be more influenced by the process history of a food, rather than its actual constituents. Two types of processing of a ``natural'' food are to add something or to remove something. We report in this study, based on a large random sample of individuals from six countries (France, Germany, Italy, Switzerland, UK and USA that additives are considered defining features of what makes a food not natural, whereas ``subtractives'' are almost never mentioned. In support of this, skim milk (with major subtraction of fat is rated as more natural than whole milk with a small amount of natural vitamin D added. It is also noted that ``additives'' is a common word, with a synonym reported by a native speaker in 17 of 18 languages, whereas ``subtractive'' is lexicalized in only 1 of the 18 languages. We consider reasons for additivity dominance, relating it to omission bias, feature positive bias, and notions of purity.

  18. 1996 : Track Count Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The goal of St. Vincent National Wildlife Refuge's Track Count Protocol is to provide an index to the population size of game animals inhabiting St. Vincent Island.

  19. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  20. Potlining Additives

    Energy Technology Data Exchange (ETDEWEB)

    Rudolf Keller

    2004-08-10

    In this project, a concept to improve the performance of aluminum production cells by introducing potlining additives was examined and tested. Boron oxide was added to cathode blocks, and titanium was dissolved in the metal pool; this resulted in the formation of titanium diboride and caused the molten aluminum to wet the carbonaceous cathode surface. Such wetting reportedly leads to operational improvements and extended cell life. In addition, boron oxide suppresses cyanide formation. This final report presents and discusses the results of this project. Substantial economic benefits for the practical implementation of the technology are projected, especially for modern cells with graphitized blocks. For example, with an energy savings of about 5% and an increase in pot life from 1500 to 2500 days, a cost savings of $ 0.023 per pound of aluminum produced is projected for a 200 kA pot.

  1. Dual Mode Vehicle with In-Wheel Motor: Regenerative Braking Optimization Véhicule bi-mode avec moteurs roues : optimisation du freinage récupératif

    Directory of Open Access Journals (Sweden)

    Le Solliec G.

    2013-03-01

    Full Text Available To meet the growing need for mobility of people and goods while massively reducing CO2 emissions, the electrification of vehicles is an essential solution. The variety of vehicles and their use results in innovative solutions for adapted architecture. This is especially true for light commercial vehicles where the objective is to promote full electric use in urban conditions (zero emission vehicle while maintaining significant range autonomy on road. The project VelRoue, a partnership between Renault, Michelin and IFP Energies nouvelles, aims to develop a dedicated dual-mode vehicle using a conventional thermal powertrain on the front axle and in-wheel motors on the rear one each powertrain to its use and makes it possible to achieve a low level of homologation CO2 emissions. In addition to features that meet the specific use of a commercial vehicle, in this paper we will particularly demonstrate the benefit of such an architecture to optimize the regenerative braking while ensuring a safe dynamic behaviour. Pour faire face au besoin croissant de mobilité des personnes et des biens tout en réduisant massivement les émissions de CO2, l’électrification des véhicules est une solution majeure. La grande variété des véhicules et de leur utilisation conduit à la mise en place d’architectures adaptées et donc de solutions innovantes. Cela est particulièrement le cas pour le développement de véhicules utilitaires dont l’objectif est de promouvoir un usage tout électrique en ville (véhicule zéro émission tout en maintenant une autonomie significative pour un usage extra-urbain. Le projet VelRoue, un partenariat entre Renault, Michelin et IFP Energies nouvelles, a pour objectif le développement d’un véhicule utilitaire bi-mode utilisant un groupe motopropulseur thermique traditionnel sur le train avant et des moteurs roues sur le train arrière. Chaque système de propulsion sera alors séparément optimisé à son utilisation

  2. Privacy-Preserving Protocols for Eigenvector Computation

    CERN Document Server

    Pathak, Manas A

    2010-01-01

    In this paper, we present a protocol for computing the dominant eigenvector of a collection of private data distributed across multiple parties, with the individual parties unwilling to share their data. Our proposed protocol is based on secure multiparty computation with a trusted third-party arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We also augment the protocol with randomization to make it difficult, with a high probability, for any party to estimate properties of the data belonging to other parties from the intermediate steps. The previous approaches towards this problem were based on expensive QR decomposition of correlation matrices, we present an efficient algorithm using the power iteration method. We present an analysis of the correctness, security, efficiency of protocol and experiments over a prototype implementation.

  3. Cytoskeleton - Methods and Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-03-01

    Full Text Available Cytoskeleton - Methods and ProtocolsSecond edition, 2010; Ray H. Gavin (Ed; Springer Protocols methods in molecular biology, vol. 586 Humana press, Totowa, New Jersey (USA; Pages: 390; €95.44; ISBN: 978-1-60761-375-6Ray H. Gavin, from the Brooklyn College of The City University of New York, Brooklyn, NY, USA, wrote a few line as preface of this book. This is quite understandable: there is not a great need of words when there are facts that sustain and favour the dissemination of a cultural product. This is the case of the second edition of Cytoskeleton - Methods and Protocols, which appears just ten years after the first edition...

  4. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  5. Convention on the physical protection of nuclear material. Status list as of 12 September 2000. Signature, ratification, acceptance, approval, accession or succession. Declarations/reservations made upon expressing consent to be bound and objections thereto. Declarations/reservations made upon signature

    International Nuclear Information System (INIS)

    This document contains signatures, ratifications, acceptance, approval, accession or succession of the Convention on the physical protection of nuclear material as well as declarations/reservations made upon expressing consent to be bound and objections thereto and declarations made upon signature

  6. Convention on early notification of a nuclear accident and convention on assistance in the case of a nuclear accident or radiological emergency. Status lists as of 12 September 2000. Signature, ratification, acceptance, approval, accession or succession. Declarations/reservations made upon expressing consent to be bound and objections thereto. Declarations/reservations made upon signature

    International Nuclear Information System (INIS)

    This document includes the information given in document INFCIRC/335/Add.9 and INFCIRC/336/Add. 10. It accordingly supersedes that document. It contains signatures, ratification, acceptance, approval, accession or successions, as well as declarations/reservations made upon signature by the countries and-or organizations with have accepted it

  7. Minority Languages of the Russian Federation: Perspectives for a Ratification of the European Charter of Regional and Minority Languages. Mercator Working Papers = Las lenguas minoritarias de la Federacion Rusa Perspectivas para una ratificacion de la Carta Europea de las Lenguas Regionales y Minoritarias. Mercator Documentos de trabajo.

    Science.gov (United States)

    Vieytez, Eduardo J. Ruiz

    This paper describes the linguistic plurality of the Russian Federation, assessing the impact that the hypothetical ratification of the European Charter of Regional and Minority Languages could have on it. Four sections focus on the following: (1) "Introduction"; (2) "Part 1--The Linguistic Plurality of the Russian Federation": the linguistic…

  8. The mother of all protocols: Restructuring quantum information's family tree

    CERN Document Server

    Abeyesinghe, A; Hayden, P; Winter, A; Abeyesinghe, Anura; Devetak, Igor; Hayden, Patrick; Winter, Andreas

    2006-01-01

    We give a simple, direct proof of the "mother" protocol of quantum information theory. In this new formulation, it is easy to see that the mother, or rather her generalization to the fully quantum Slepian-Wolf protocol, simultaneously accomplishes two goals: quantum communication-assisted entanglement distillation, and state transfer from the sender to the receiver. As a result, in addition to her other "children," the mother protocol generates the state merging primitive of Horodecki, Oppenheim and Winter, a fully quantum reverse Shannon theorem, and a new class of distributed compression protocols for correlated quantum sources which are optimal for sources described by separable density operators. Moreover, the mother protocol described here is easily transformed into the so-called "father" protocol whose children provide the quantum capacity and the entanglement-assisted capacity of a quantum channel, demonstrating that the division of single-sender/single-receiver protocols into two families was unnecess...

  9. Apoptosis - Methods and Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-03-01

    Full Text Available Apoptosis - Methods and ProtocolsSecond edition, 2009; Peter Erhardt and Ambrus Toth (Eds; Springer Protocols - Methods in molecular biology, vol. 559; Humana press, Totowa, New Jersey (USA; Pages: 400; €88.35; ISBN: 978-1-60327-016-8The editors rightly begin the preface telling us that: “The ability to detect and quantify apoptosis, to understand its biochemistry and to identify its regulatory genes and proteins is crucial to biomedical research”. Nowadays this is a grounding concept of biology and medicine. What is particularly remarkable...

  10. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  11. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  12. Security Protocol Design: A Case Study Using Key Distribution Protocols

    Directory of Open Access Journals (Sweden)

    Reiner Dojen

    2009-10-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities that lead to theattacks are analyzed and guidelines for effective security protocol design are proposed. The presented guidelines are applied to the Andrew Secure RPC protocol and its adapted versions. It is demonstrated that compliance with the guidelines successfully avoidsfreshness and parallel session attacks.

  13. A family of quantum protocols

    CERN Document Server

    Devetak, I; Winter, A

    2003-01-01

    We introduce two dual, purely quantum protocols: for entanglement distillation assisted by quantum communication (``mother'' protocol) and for entanglement assisted quantum communication (``father'' protocol). We show how a large class of ``children'' protocols (including many previously known ones) can be derived from the two by direct application of teleportation or super-dense coding. Furthermore, the parent may be recovered from most of the children protocols by making them ``coherent''. We also summarize the various resource trade-offs these protocols give rise to.

  14. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  15. Phototherapy Modalities and Protocols

    Directory of Open Access Journals (Sweden)

    Ayten Ferahbaş

    2010-12-01

    Full Text Available Over the past few years, the development of irradiation devices with new emission spectra has led to an expanded role for phototherapy in the treatment of skin diseases. This development is best illustrated by the increasing frequency with which 311 nm UVB phototherapy is used for the treatment of psoriasis and vitiligo, especially. Another example is UVA1 340-400 nm. UVA1 was first used to treat patients with atopic dermatitis, but it has been found to be efficacious in several other skin diseases. This is overview of the protocols for phototherapy with UV in the treatment of skin diseases as currently used according to recent literature review. There are, of course, other protocols in use that are effective.

  16. Mitosis Methods & Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Mitosis Methods & Protocols Andrew D. McAinsh (Edt Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 545, 2009 ISBN: 978-1-60327-992-5   It is quite clear from the contents of this book that the remarkably fascinating phenomenon of mitosis (that captured, and still is capturing, the attention of entire generations of scientists is still open to research. This is mainly due to our lack of knowledge of so many multifaced events of this extraordinarly complex process. The reader giving a glace through the Contents and Contributors sections is speechless: All of the first-class models (i.e., budding yeast, Caenorabditis, Drosophila, Xenopus and Human are presented..... 

  17. Variations on Kak's Three Stage Quantum Cryptography Protocol

    OpenAIRE

    Thomas, James Harold

    2007-01-01

    This paper introduces a variation on Kak's three-stage quanutm key distribution protocol which allows for defence against the man in the middle attack. In addition, we introduce a new protocol, which also offers similar resiliance against such an attack.

  18. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  19. Revisiting the BAN-modified Andrew Secure RPC protocol

    OpenAIRE

    Gugel, Alberto; Aziz, Benjamin; Hamilton, Geoff

    2014-01-01

    We have analysed the well-known BAN modified Andrew Secure RPC authentication protocol by means of the AVISPA Web tool considering all the available back-ends and with the basic configurations of sessions. The protocol has been found vulnerable to a replay/mutation attack based on homomorphism by one of the back-ends. In order to fix it, we integrated into the protocol a common solution, including a new addition to the original protocol and the solution proposed by Liu, Ma and Yang, who earli...

  20. Requiem for Kyoto: An Economic Analysis of the Kyoto Protocol

    OpenAIRE

    Nordhaus, William D.; Joseph G. Boyer

    1998-01-01

    This paper uses the newly developed RICE-98 model to analyze the economics of the Kyoto Protocol. It analyzes versions of the Kyoto Protocol that have different approaches to trading emissions rights and compares these with efficient approaches. The major conclusions are: (a) the global cost of the Kyoto Protocol is $716 billion in present value, (b) the United States bears almost two-thirds of the global cost; and (c) the benefit-cost ratio of the Kyoto Protocol is 1/7. Additionally, the emi...

  1. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo;

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...... demonstrate that these techniques suffice for identifying a number of authentication flaws in symmetric key protocols such as Needham-Schroeder, Otway-Rees, Yahalom and Andrew Secure RPC....

  2. An automatic protocol composition checker

    OpenAIRE

    Kojovic, Ivana

    2012-01-01

    Formal analysis is widely used to prove security properties of the protocols. There are tools to check protocols in isolation, but in fact we use many protocols in parallel or even vertically stacked, e.g. running an application protocol (like login) over a secure channel (like TLS) and in general it is unclear if that is safe. There are several works that give sufficient conditions for parallel and vertical composition, but there exists no program to check whether these conditions are actual...

  3. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Directory of Open Access Journals (Sweden)

    Ning Li

    2016-03-01

    Full Text Available Underwater acoustic sensor networks (UASNs have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  4. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  5. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-01-01

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research. PMID:27011193

  6. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.;

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques...

  7. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  8. Transfusion protocol in trauma

    Directory of Open Access Journals (Sweden)

    Kaur Paramjit

    2011-01-01

    Full Text Available Blood and blood components are considered drugs because they are used in the treatment of diseases. As with any drug, adverse effects may occur, necessitating careful consideration of therapy. Like any other therapeutic decision, the need for transfusion should be considered on the basis of risks and benefits and alternative treatments available to avoid over- and under-transfusion. This review is focused on the blood transfusion protocol in trauma patients with hemorrhagic shock. Besides, issues related to emergency and massive transfusion have also been elaborated. We conducted a comprehensive MEDLINE search and reviewed the relevant literature, with particular reference to emergency medical care in trauma.

  9. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 74683-79494

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  10. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  11. Provenance Query Protocol

    OpenAIRE

    Miles, S.; Moreau, L; Groth, P; Tan, V.; Munroe, S; Jiang, Sheng

    2006-01-01

    A related document defines schemas to be used for documentation about the execution of a process. It also defines the provenance of a data item as the process that led to that item. A provenance query is a query for the provenance of a data item and the results of such a query is documentation of the process that led to the item. In this document, we specify a protocol by which a querying actor and provenance store can communicate in performing a provenance query. This primarily takes the for...

  12. Background of the implementation of the Protocol the Convention against Torture: Monitoring places of detention and prevention of torture in Uruguay

    Directory of Open Access Journals (Sweden)

    Álvaro Garcé García y Santos

    2014-07-01

    Full Text Available The ratification of the Optional Protocol of the Convention against Torture had for our country, the significance of an ethical and juridical commitment of giving priority to the prevention of abuses for all the people deprived from liberty who are in jails or in other places of detention, as a consequence of a judicial decision or by virtue of an administrative mandate. Among the obligations established by the said Protocol it is found the one of setting up a National Mechanism of Prevention, technically and economically independent, in charge of the systematic monitoring of the detention centers. The creation of the National Institution of Human Rights, together with the legal mandate the same bears to coordinate its duties with the pre-existing Parliamentary Commissioner, finally brings the certain possibility of fulfilling with the obligations arising from the Protocol. At the same time, the original national solution, unparalleled in the region, implies a series of juridical complexities approached in this work. The cooperation between the two State Institutions involved in the matter, so as to avoid a useless overlapping of duties, brings up a promising future in relation to the prevention of torture in Uruguay.

  13. PROFILE: Environmental Impact Assessment Under the National Environmental Policy Act and the Protocol on Environmental Protection to the Antarctic Treaty.

    Science.gov (United States)

    Ensminger; McCold; Webb

    1999-07-01

    / Antarctica has been set aside by the international community for protection as a natural reserve and a place for scientific research. Through the Antarctic Treaty of 1961, the signing nations agreed to cooperate in protecting the antarctic environment, in conducting scientific studies, and in abstaining from the exercise of territorial claims. The 1991 signing of the Protocol on Environmental Protection to the Antarctic Treaty (Protocol) by representatives of the 26 nations comprising the Antarctic Treaty Consultative Parties (Parties) significantly strengthened environmental protection measures for the continent. The Protocol required ratification by each of the governments individually prior to official implementation. The US government ratified the Protocol by passage of the Antarctic Science, Tourism, and Conservation Act of 1997. Japan completed the process by ratifying the Protocol on December 15, 1997. US government actions undertaken in Antarctica are subject to the requirements of both the Protocol and the US National Environmental Policy Act (NEPA). There are differences in the scope and intent of the Protocol and NEPA; however, both require environmental impact assessment (EIA) as part of the planning process for proposed actions that have the potential for environmental impacts. In this paper we describe the two instruments and highlight key similarities and differences with particular attention to EIA. Through this comparison of the EIA requirements of NEPA and the Protocol, we show how the requirements of each can be used in concert to provide enhanced environmental protection for the antarctic environment. NEPA applies only to actions of the US government; therefore, because NEPA includes certain desirable attributes that have been refined and clarified through numerous court cases, and because the Protocol is just entering implementation internationally, some recommendations are made for strengthening the procedural requirements of the Protocol

  14. A quartet of speculative impact scenarios of Kyoto Protocol implementation in Canada

    International Nuclear Information System (INIS)

    This presentation was intended to stimulate thought about the implementation of the Kyoto Protocol. The author proposes four potential scenarios for the Canadian economy under the Kyoto Protocol and offers speculation regarding the ramifications of non-compliance. The author notes that Canada's expectation of achieving a greenhouse gas (GHG) reduction target of 6 per cent below 1990 levels by 2012-2015 was based on achieving credits for actions already taken, for clean energy exports to the United States, and for carbon sequestration. These actions have been largely rejected by the international community and the issue of ratification is still questionable in several developed and developing countries. This presentation outlined the following 4 scenarios and presented their impacts, assumptions underlying estimates, and scenario probability: (1) Kyoto within international trading and clean energy exports; (2) Kyoto with only internal trading; (3) Kyoto without trading; and (4) Kyoto without immediate action. The first scenario, although deemed unlikely, has a high potential for attaining reductions through sequestration, as well as a high potential for technology and energy transfer. The second scenario is considered possible, but unlikely. It assumes that least cost solutions are less available and biological sequestration credits are unlikely. The third scenario is considered to be more probable than the first two, but no mechanism exists to find or promote least cost solutions. Sequestration would be more available in some provinces than in others. The fourth and final scenario is considered to be the most probable, with investment into existing energy efficiency programs. The author cautioned that the actions taken by the current government may lead Canada into failure to attain greenhouse gas obligations, which in turn could be used by climate alarmist groups to justify implementation of the third scenario. 7 refs

  15. Dynamically Adaptable Improved OLSR (DA-IOLSR Protocol

    Directory of Open Access Journals (Sweden)

    P.S.Vinayagam,

    2016-05-01

    Full Text Available Optimized Link State Routing (OLSR protocol is a proactive type of routing protocol that uses Multipoint Relay (MPR set as the virtual backbone structure. The existing literature has identified various issues with respect to its backbone structure and has accordingly proposed improvements. In this paper, the focus is on improving the OLSR protocol by employing a Connected Dominating Set (CDS based virtual backbone structure that is dynamically adaptable to rapid topology changes. A new Dynamically Adaptable Improved Optimized Link State Routing (DA-IOLSR protocol is proposed that uses the local topology information to adapt the virtual backbone to topology changes. This assumes significance especially in networks that experience very high mobility. Changes in the network topology caused by node additions, node deletions and node mobility are taken care of. Simulations are carried out to assess the performance of DA-IOLSR protocol and OLSR protocol. Packet delivery achieved by both the protocols is examined under varying mobility by using various combinations of node speed and pause time values. It is found that DA-IOLSR protocol provides better packet delivery as compared to OLSR protocol, under varying mobility conditions.

  16. Stream Control Transmission Protocol Steganography

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows. This paper describes potential steganographic methods that may be applied to SCTP and may pose a threat to network security. Proposed methods utilize new, characteristic SCTP features like multi-homing and multistreaming. Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.

  17. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  18. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern......This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...

  19. A PROGRAMMED LABOUR - PROTOCOL

    Directory of Open Access Journals (Sweden)

    Savita

    2014-12-01

    Full Text Available A Prospective randomized Clinical study of outcome of labour following. “A Programmed labour. Protocol” was done at Department of OBG, MRMC Gulbarga. The Protocol was aimed with dual. Objective of Providing Pain relief during labour and teaching the goal of safe motherhood by optimizing objective outcome. AIMS AND OBJECTIVES: Shortening of duration of labour. Effect of labour analgesia. Monitoring of the events during labour. Lowering the incidence of operative deliveries. METHODS: 100 cases primi pregnant women admitted in labour room are randomly selected. It is designed to apply to low risk primi parous, singleton cephalic presentation without evidence of CPD and spontaneous onset of labour. RESULTS: Shortened duration of all the stages of Labour, especially significant reduction in duration of active phase of labour. CONCLUSION: The programmed labour is simple easy and effective method for painless and safe delivery.

  20. A Bayesian approach to optimizing cryopreservation protocols

    Directory of Open Access Journals (Sweden)

    Sammy Sambu

    2015-06-01

    Full Text Available Cryopreservation is beset with the challenge of protocol alignment across a wide range of cell types and process variables. By taking a cross-sectional assessment of previously published cryopreservation data (sample means and standard errors as preliminary meta-data, a decision tree learning analysis (DTLA was performed to develop an understanding of target survival using optimized pruning methods based on different approaches. Briefly, a clear direction on the decision process for selection of methods was developed with key choices being the cooling rate, plunge temperature on the one hand and biomaterial choice, use of composites (sugars and proteins as additional constituents, loading procedure and cell location in 3D scaffolding on the other. Secondly, using machine learning and generalized approaches via the Naïve Bayes Classification (NBC method, these metadata were used to develop posterior probabilities for combinatorial approaches that were implicitly recorded in the metadata. These latter results showed that newer protocol choices developed using probability elicitation techniques can unearth improved protocols consistent with multiple unidimensionally-optimized physical protocols. In conclusion, this article proposes the use of DTLA models and subsequently NBC for the improvement of modern cryopreservation techniques through an integrative approach.

  1. PROTOCOL FOR EXAMINATION OF THE INNER CAN CLOSURE WELD REGION FOR 3013 DE CONTAINERS

    Energy Technology Data Exchange (ETDEWEB)

    Mickalonis, J.

    2014-09-16

    The protocol for the examination of the inner can closure weld region (ICCWR) for 3013 DE containers is presented within this report. The protocol includes sectioning of the inner can lid section, documenting the surface condition, measuring corrosion parameters, and storing of samples. This protocol may change as the investigation develops since findings may necessitate additional steps be taken. Details of the previous analyses, which formed the basis for this protocol, are also presented.

  2. Paper presented to the Commission des transports et de l'environnement in the context of the general consultation concerning the implementation of the Kyoto Protocol in Quebec

    International Nuclear Information System (INIS)

    Climate change is a major issue facing Quebec's population and future generations. The scientific community generally agrees on the negative effects resulting from global climate change on human health, the environment and the economy. In 1997, the Kyoto Protocol was adopted by industrialized countries, whereby countries agreed to reduce their emissions of greenhouse gases (GHG) by a certain percentage, calculated from 1990 levels. In the case of Canada, this percentage was 6 per cent, for the first commitment period covering 2008-2012. Quebec's performance on the issue of GHG emissions compares favorably to that of other Canadian provinces, even to that of other industrialized countries. Canada ratified the Kyoto Protocol in December 2002. The Quebec National Assembly called for a parliamentary committee to meet on 18 February 2003 on the implementation of the Kyoto Protocol. Hydro-Quebec, since 1997, has favored the ratification of the Kyoto Protocol by the Canadian government. In this document, Hydro-Quebec makes its position known in the context of this debate and the commercial context of the electric power industry in 2003. The first section of the document was devoted to the favorable performance of Hydro-Quebec, on the retroactive and prospective aspects of GHG emissions with regard to the entire electric power industry in Canada. In the second section, an explanation was provided, in the context of deregulation of the electricity market in North America, on the implementation of the Kyoto Protocol in Quebec and in Canada and how it becomes a major commercial issue for Hydro-Quebec. The analysis was conducted in light of the mandate of Hydro-Quebec to provide a secure and reliable service to its customers. refs., 1 fig

  3. İSLAM HUKUKU MUAMELÂT KONULARINDA SÜKÛT’A RIZA ANLAMI VERİLEN İŞLEMLER / TRANSACTION IN ISLAMIC LAW, THAT THE SILENCE IS MEANING RATIFICATION OF PROCEDURE

    Directory of Open Access Journals (Sweden)

    Ömer Faruk HABERGETİREN

    2012-07-01

    Full Text Available İslam hukukunda muamelelerin (akitlerin sıhhati rızaya dayanır. Kişi genellikle bu iradesini, açık lafızla (sözle ifade eder. Hukuki bir kural olarak “sakite bir söz isnat olunmaz.” Ancak kimi durumlarda sessiz kalma, kişinin niyetini ortaya koyar. Bu nedenle beyana ihtiyaç duyulan yerlerde sükûta bir anlam yüklenir. Susma, konuşma ve yapılan işlemi onaylama olarak kabul edilir. Burada, kişinin durumu ile örf ve âdet etkendir. İstisna olarak kabul edilen bu konularda hukuki işlemlerde kolaylık, kişilerin menfaatini koruma ve muhtemel bir zarara engel olma amaçlanır.In Islamic law, legality of contracts is based on consent. Person usually states his statement of condition by talking. According to principle of Islamic law “a word is not attributable to the silent.” But, in some situation, silence present intention of men. Therefore, ascribe a meaning to this attitude. Silence accepted talking and ratification of procedure. State of people and customs is effective in this situation.

  4. Protocols for Robotic Telescope Networks

    Directory of Open Access Journals (Sweden)

    Alain Klotz

    2010-01-01

    This paper is addressed to astronomers who are not specialists in computer science. We give explanations of some basic and advanced protocols to receive events and how to implement them in a robotic observatory software. We describe messages such as GCN notices, VOEvents or RTML, and protocols such as CGI, HTTP, SOAP, RSS, and XMPP.

  5. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  6. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  7. Transport Layer Protocols Taxonomy From Voice Over Ip Perspective

    Directory of Open Access Journals (Sweden)

    Mosleh M. Abu-Alhaj

    2011-08-01

    Full Text Available VoIP technology is becoming increasingly important as they gain market share in PSTN technology. In the short run, it is likely that VoIP technology will dominate the telecommunications market. This evolution towards VoIP technology makes sense for improving the VoIP technology efficiency under the auspices of the internet. However, the PSTN still provide voice quality better than the VoIP technology voice quality. This would be due to many contributing factors such as delay and packet loss. Apart from internet hardware infrastructure, the VoIP transfer protocols cause the delay and packet loss problems as well. Typically, the Real-time Media Transfer Protocols (RTMTPs, such as the Real-time Transport Protocol (RTP, are working in conjunction with the transport layer protocols (TLPs to carry the VoIPapplications data. However, some of the TLPs protocols are transfer the VoIP applications data by themselves. The aim of this paper is to present the capability of the TLPs protocols to transfer the VoIP applications data, and the obstacles face these protocols to do so. For easier comparison and discussion, we have divided TLPs protocols into three groups, the Reliable Transport Layer Protocols (RTLPs, Unreliable Transport Layer Protocols (UTLPs, and Reliable and Unreliable Transport Layer Protocols (RUTLPs. We have studied the three groups from VoIP point of view. In addition, we have showed that the UTLPs group needs to work with the RTMTPs to be able to transfer the VoIP applications data. Finally, we have showed the problems caused by each group to the VoIP applications. As result, a comparison among the transport layer protocols is presented according to the problems resulting from theses protocols when transferring the VoIP applications data. The comparison can help to choose the suitable protocols to carry the VoIP data. However, after studied all the TLPs protocols, the paper recommend to use the UTLPs group in conjunction with the RTMTPs

  8. Updatable Queue Protocol Based On TCP For Virtual Reality Environment

    CERN Document Server

    Al-Howaide, Ala'a Z; Salhieh, Ayad M

    2011-01-01

    The variance in number and types of tasks required to be implemented within Distributed Virtual Environments (DVE) highlights the needs for communication protocols can achieve consistency. In addition, these applications have to handle an increasing number of participants and deal with the difficult problem of scalability. Moreover, the real-time requirements of these applications make the scalability problem more difficult to solve. In this paper, we have implemented Updatable Queue Abstraction protocol (UQA) on TCP (TCP-UQA) and compared it with original TCP, UDP, and Updatable Queue Abstraction based on UDP (UDP-UQA) protocols. Results showed that TCP-UQA was the best in queue management.

  9. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.

  10. A Dialogue Game Protocol for Agent Purchase Negotiations

    OpenAIRE

    McBurney, P.; van Eijk, R.M.; Parsons, S.; Amgoud, L.

    2003-01-01

    We propose a dialogue game protocol for purchase negotiation dialogues which identifies appropriate speech acts, defines constraints on their utterances, and specifies the different sub-tasks agents need to perform in order to engage in dialogues according to this protocol. Our formalism combines a dialogue game similar to those in the philosophy of argumentation with a model of rational consumer purchase decision behaviour adopted from marketing theory. In addition to the dialogue game proto...

  11. Modular approach to the design and analysis of password-based security protocols

    Institute of Scientific and Technical Information of China (English)

    FENG DengGuo; CHEN WeiDong

    2007-01-01

    In this paper, a general framework for designing and analyzing password-based security protocols is presented, First we introduce the concept of "weak computational indistinguishability" based on current progress of password-based security protocols. Then, we focus on cryptographic foundations for password-based security protocols, i.e., the theory of "weak pseudorandomness". Furthermore, based on the theory of weak pseudorandomness, we present a modular approach to design and analysis of password-based security protocols. Finally, applying the modular approach, we design two kinds of password-based security protocols, i.e.,password-based session key distribution (PSKD) protocol and protected password change (PPC) protocol. In addition to having forward secrecy and improved efficiency, new protocols are proved secure.

  12. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  13. Dynamic random channel reservation protocol

    Institute of Scientific and Technical Information of China (English)

    Ren Yanying; Zhang Wenjun; Yu Songyu

    2005-01-01

    Demand assignment MAC protocols have been used widely in wireless networks. It can effectively utilize wireless bandwidth. Some strategies can be used by demand assignment MAC protocols to further improve their efficiency. The concept of transmit probability is introduced. This concept allows a request slot to be assigned to many different traffic classes at the same time. Based on it, the dynamic random channel reservation (DRCR) protocol is proposed. The DRCR protocol operates dynamically by observing the traffic conditions. It uses information about the recent traffic conditions to assign transmit probability with which an mobile station can select request slots with lower traffic. The performance of DRCR is evaluated and compared with RSCA. The results show that DRCR is more stable than RSCA, it offers shorter delays of requests than RSCA and can relieve heavily stressed traffic classes faster than RSCA.

  14. National Elk Refuge vaccination protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Proposal by the State of Wyoming, Wyoming Game and Fish Department, to vaccinate elk on the National Elk Refuge. The proposal provides a protocol for vaccinating...

  15. Automatic Sequencing for Experimental Protocols

    Science.gov (United States)

    Hsieh, Paul F.; Stern, Ivan

    We present a paradigm and implementation of a system for the specification of the experimental protocols to be used for the calibration of AXAF mirrors. For the mirror calibration, several thousand individual measurements need to be defined. For each measurement, over one hundred parameters need to be tabulated for the facility test conductor and several hundred instrument parameters need to be set. We provide a high level protocol language which allows for a tractable representation of the measurement protocol. We present a procedure dispatcher which automatically sequences a protocol more accurately and more rapidly than is possible by an unassisted human operator. We also present back-end tools to generate printed procedure manuals and database tables required for review by the AXAF program. This paradigm has been tested and refined in the calibration of detectors to be used in mirror calibration.

  16. Improved Authenticated Multi-Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  17. Self-Healing Protocol Implementations

    OpenAIRE

    Tschudin, Christian; Yamamoto, Lidia

    2005-01-01

    Current studies on self-configuring and adaptive networks aim at developing specific and fixed protocols which are able to optimize their configuration in a variable network environment. In this talk we study the problem where the protocols need to cope with a defective execution, including the lossy execution or the injection of foreign code. One guiding question will be the creation of robust execution circuits which can distribute over a network and which continue their service despite par...

  18. Secure E-payment Protocol

    Directory of Open Access Journals (Sweden)

    Sattar J Aboud

    2009-11-01

    Full Text Available The vast spreading of information in the last decade has led to greatdevelopment in e-commerce. For instance, e-trade and e-bank are two mainInternet services that implement e-transaction from anyplace in the world. Thishelps merchant and bank to ease the financial transaction process and to giveuser friendly services at any time. However, the cost of workers andcommunications falls down considerably while the cost of trusted authority andprotecting information is increased. E-payment is now one of the most centralresearch areas in e-commerce, mainly regarding online and offline paymentscenarios. In this paper, we will discuss an important e-payment protocol namelyKim and Lee scheme examine its advantages and delimitations, whichencourages the author to develop more efficient scheme that keeping allcharacteristics intact without concession of the security robustness of theprotocol. The suggest protocol employs the idea of public key encryption schemeusing the thought of hash chain. We will compare the proposed protocol with Kimand Lee protocol and demonstrate that the proposed protocol offers moresecurity and efficiency, which makes the protocol workable for real worldservices.

  19. Comparison of a new whole-body continuous-table-movement protocol versus a standard whole-body MR protocol for the assessment of multiple myeloma

    Energy Technology Data Exchange (ETDEWEB)

    Weckbach, S. [University Hospital Munich-Grosshadern Campus, Department of Clinical Radiology, Munich (Germany); University Hospital Mannheim, Medical Faculty Mannheim, University of Heidelberg, Department of Clinical Radiology and Nuclear Medicine, Mannheim (Germany); Michaely, H.J.; Schoenberg, S.O.; Dinter, D.J. [University Hospital Mannheim, Medical Faculty Mannheim, University of Heidelberg, Department of Clinical Radiology and Nuclear Medicine, Mannheim (Germany); Stemmer, A. [Siemens AG, Healthcare Sector, Imaging and IT Division, Magnetic Resonance, Erlangen (Germany)

    2010-12-15

    To evaluate a whole body (WB) continuous-table-movement (CTM) MR protocol for the assessment of multiple myeloma (MM) in comparison to a step-by-step WB protocol. Eighteen patients with MM were examined at 1.5T using a WB CTM protocol (axial T2-w fs BLADE, T1-w GRE sequence) and a step-by-step WB protocol including coronal/sagittal T1-w SE and STIR sequences as reference. Protocol time was assessed. Image quality, artefacts, liver/spleen assessability, and the ability to depict bone marrow lesions less than or greater than 1 cm as well as diffuse infiltration and soft tissue lesions were rated. Potential changes in the Durie and Salmon Plus stage and the detectability of complications were assessed. Mean protocol time was 6:38 min (CTM) compared to 24:32 min (standard). Image quality was comparable. Artefacts were more prominent using the CTM protocol (P = 0.0039). Organ assessability was better using the CTM protocol (P < 0.001). Depiction of bone marrow and soft tissue lesions was identical without a staging shift. Vertebral fractures were not detected using the CTM protocol. The new protocol allows a higher patient throughput and facilitates the depiction of extramedullary lesions. However, as long as vertebral fractures are not detectable, the protocol cannot be safely used for clinical routine without the acquisition of an additional sagittal sequence. (orig.)

  20. A Voting Protocol Based on the Controlled Quantum Operation Teleportation

    Science.gov (United States)

    Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping

    2016-05-01

    Based on the controlled quantum operation teleportation, a secure voting protocol is proposed in this paper. Genuine four-qubit entangled state functions as the quantum channel. The eligible voter's quantum operation which represents his vote information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Voter's quantum identity authentication provides the anonymity of voters'ID, which is ensured by a zero-knowledge proof of the notary organization CA. Charlie's supervision in the whole voting process can make the protocol satisfy verifiability and non-reusability so as to avoid Bob's dishonest behaviour. The security analysis shows that the voting protocol satisfies unforgeability, and has great advantages over some relevant researches. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

  1. Efficient Protocols for Principal Eigenvector Computation over Private Data

    Directory of Open Access Journals (Sweden)

    Manas A. Pathak

    2011-12-01

    Full Text Available In this paper we present a protocol for computing the principal eigenvector of a collection of data matrices belonging to multiple semi-honest parties with privacy constraints. Our proposed protocol is based on secure multi-party computation with a semi-honest arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We augment the protocol with randomization and oblivious transfer to make it difficult for any party to estimate properties of the data belonging to other parties from the intermediate steps. The previous approaches towards this problem were based on expensive QR decomposition of correlation matrices, we present an efficient algorithm using the power iteration method. We present an analysis of the correctness, security, and efficiency of protocol along with experimental results using a prototype implementation over simulated data and USPS handwritten digits dataset.

  2. A Secure and Efficient Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yuping Hu

    2009-06-01

    Full Text Available The Digital watermarking technology has become increasing popular in the protection digital copyright. However, in the practical application, the watermarking algorithms should be combined with a secure copyright protection protocol to solve the copyright protection problems completely. In this paper, a novel buyer-seller watermarking protocol is proposed for piracy tracing, in which a memoryless Watermark Certification Authority (WCA can offer a number of watermarks for a buyer simultaneously, avoiding itself being involved in each digital transaction operated between the buyer and the seller. Besides, in order to guarantee the anonymity of the buyer, the WCA can provide the buyer with an encrypted digital certificate and have it submitted directly to the seller by the buyer. In addition, the proposed protocol also can resolve other problems, such as the customer right problem, the binding attack problem, the anonymity problem, the conspiracy problem, the dispute problem. The analyses indicate that the proposed protocol is secure and practical.

  3. Protocols.io: Virtual Communities for Protocol Development and Discussion

    Science.gov (United States)

    Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L.

    2016-01-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  4. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    Science.gov (United States)

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  5. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  6. Les systèmes coopératifs dans les transports : une approche coordonnée qui nécessite une affirmation des champs de compétence. Recherche Transports Sécurité Vol29 N113, juin 2013

    OpenAIRE

    GILLIERON, Pierre Yves; MARAIS, Juliette; Peyret, François; KAPARIAS, Ioannis

    2013-01-01

    Introduction du dossier "les systèmes coopératifs dans les transports : une approche coordonnée qui nécessite une affirmation des champs de compétence. Les nouvelles technologies de l’information révolutionnent l’organisation de notre société avec un impact sur le monde du travail, sur notre rapport avec les autres et sur notre mobilité. Le domaine des transports avec ses multiples challenges liés à la gestion du trafic et des infrastructures, à la diffusion d’information et...

  7. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  8. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    a concrete protocol by Blumberg et al. using one-way functions and commitments for providing various location based vehicle services, and report on our ndings and experience of carrying out its analysis using the ProVerif tool. Third, we make an abstract model of the powerful simulation-based Universally...... Compos- able framework by Canetti for specifying and analysing protocols, and show that our model is sound with respect to its standard computational interpretation. Our model supports powerful primitives such as homomorphic encryption and non-interactive zero-knowledge proofs, which we show may be used...... to implement several interesting two-party functionalities. As a case study we use the ProVerif tool to analyse an oblivious transfer protocol by Damgard et al. under static corruption...

  9. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  10. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  11. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  12. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  13. Analysis of the Transport Layer Security protocol

    OpenAIRE

    Firing, Tia Helene

    2010-01-01

    In this master thesis we have presented a security analysis of the TLS protocol with particular emphasis on the recently discovered renegotiation attack. From our security proof we get that the Handshake protocol with renegotiation, including the fix from IETF, is secure, and hence not vulnerable to the renegotiation attack anymore. We have also analysed the Handshake protocol with session resumption, and the Application data protocol together with the Record protocol. Both of these prot...

  14. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effo......-Spaces aids several steps in the development of a security protocolprotocol executions can be simulated in hostile environments, a security protocol can be implemented, and security properties of implementations can be formally verified....

  15. Extensible Authentication Protocol Overview and Its Applications

    Science.gov (United States)

    Youm, Heung Youl

    The Extensible Authentication Protocol (EAP) is an authentication framework that supports multiple authentication mechanisms [38] between a peer and an authentication server in a data communication network. EAP is used as a useful tool for enabling user authentication and distribution of session keys. There are numerous EAP methods that have been developed by global SDOs such as IETF, IEEE, ITU-T, and 3GPP. In this paper, we analyze the most widely deployed EAP methods ranging from the EAP-TLS [27] to the EAP-PSK [25]. In addition, we derive the security requirements of EAP methods meet, evaluate the typical EAP methods in terms of the security requirements, and discuss the features of the existing widely-deployed EAP methods. In addition, we identify two typical use cases for the EAP methods. Finally, recent global standardization activities in this area are reviewed.

  16. Protocol biopsies for renal transplantation

    Directory of Open Access Journals (Sweden)

    Rush David

    2010-01-01

    Full Text Available Protocol biopsies in renal transplantation are those that are procured at predetermined times post renal transplantation, regardless of renal function. These biopsies have been useful to study the natural history of the transplanted kidney as they have detected unexpected - i.e. "subclinical" pathology. The most significant subclinical pathologies that have been detected with protocol biopsies have been acute lesions, such as cellular and antibody mediated rejection, and chronic lesions, such as interstitial fibrosis and tubular atrophy, and transplant glomerulopathy. The potential benefit of early recognition of the above lesions is that their early treatment may result in improved long-term outcomes. Conversely, the identification of normal histology on a protocol biopsy, may inform us about the safety of reduction in overall immunosuppression. Our centre, as well as others, is attempting to develop non-invasive methods of immune monitoring of renal transplant patients. However, we believe that until such methods have been developed and validated, the protocol biopsy will remain an indispensable tool for the complete care of renal transplant patients.

  17. Kyoto protocol on climate change

    International Nuclear Information System (INIS)

    This article reports a short overview of main points of Kyoto protocol to United Nations Framework Convention on climate Change and of some options still to be defined, evolutions of Italian emissions with respect to other European countries, check of decree by inter ministerial committee on economic planning on national plan to reduce emissions

  18. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele;

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  19. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  20. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs;

    2016-01-01

    %) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  1. The Kyoto Protocol and China

    Institute of Scientific and Technical Information of China (English)

    佘巧云

    2005-01-01

    The kyoto Protocol is an agreement to the United Nations Framework Convention on CLimate Change (UNFCCC)2,an international treaty on global warming .It is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by an average of 5.2% compared to the level of 1990 during the 2008-12 period.

  2. Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2004-01-01

    This paper introduces a process calculus with recursion which allows us to express an unbounded number of runs of the ping-pong protocols introduced by Dolev and Yao. We study the decidability issues associated with two common approaches to checking security properties, namely reachability analysis...

  3. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  4. Automata-theoretic protocol programming

    NARCIS (Netherlands)

    Jongmans, Sung-Shik Theodorus Quirinus

    2016-01-01

    Parallel programming has become essential for writing scalable programs on general hardware. Conceptually, every parallel program consists of workers, which implement primary units of sequential computation, and protocols, which implement the rules of interaction that workers must abide by. As progr

  5. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  6. Trail-Using Ant Behavior Based Energy-Efficient Routing Protocol in Wireless Sensor Networks

    OpenAIRE

    Soon-gyo Jung; Byungseok Kang; Sanggil Yeoum; Hyunseung Choo

    2016-01-01

    Swarm Intelligence (SI) observes the collective behavior of social insects and other animal societies. Ant Colony Optimization (ACO) algorithm is one of the popular algorithms in SI. In the last decade, several routing protocols based on ACO algorithm have been developed for Wireless Sensor Networks (WSNs). Such routing protocols are very flexible in distributed system but generate a lot of additional traffic and thus increase communication overhead. This paper proposes a new routing protocol...

  7. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    Science.gov (United States)

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification. PMID:26123833

  8. Optimizing prostate cancer detection: 8 versus 12-core biopsy protocol

    NARCIS (Netherlands)

    J.J.M.C.H. de la Rosette; M.H. Wink; C. Mamoulakis; N. Wondergem; F.J.C. ten Kate; K. Zwinderman; Th.M. de Reijke; H. Wijkstra

    2009-01-01

    PURPOSE: We compared prostate cancer detection rates achieved using an 8 and 12-core biopsy protocol in a clinical population to determine the significance of additional transition zone sampling on repeat biopsy. MATERIALS AND METHODS: Between September 2004 and September 2007, 269 eligible patients

  9. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  10. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  11. How to write a protocol: part 2.

    Science.gov (United States)

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical protocols play an important role in the provision of high-quality care in nuclear medicine. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. The following article is the second in a 2-part series on how to write a protocol. A framework for composing protocols and the components of clinical imaging protocols were detailed in the first article. This article details the framework and components of protocols for cardiac stress testing, therapy, and quality control. PMID:25655345

  12. Novel analysis and improvement of Yahalom protocol

    Institute of Scientific and Technical Information of China (English)

    CHEN Chun-ling; YU Han; L(U) Heng-shan; WANG Ru-chuan

    2009-01-01

    The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a novel method of analyzing protocol's security. First, a mathematical model of BAN-Yahalom protocol is constructed. Second, penetrators' abilities are restricted with a rigorous and formalized definition. Moreover, to increase the security of this protocol against potential attackers in practice, a further improvement is made to the protocol. Future application of this re-improved protocol is also discussed.

  13. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    Science.gov (United States)

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-09-08

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency.

  14. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    Science.gov (United States)

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-01-01

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency. PMID:27685112

  15. SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    RAVIKIRAN PEELUKHANA,

    2011-04-01

    Full Text Available The cloud virtualization technology improves the economy of scale for data centers through server consolidation, application consolidation and resources consolidation. Virtualization allows the provider to move Virtual Images from more congested host to less-congested hosts, as required. Enterprises also get improved server reliability, which in turn increases application performance. Despite these benefits, it includes major security challenges with the portability of Virtual Images between different cloud providers.The security and integrity of Virtual images is the foundation for the overall security of the cloud. Many of the Virtual images are intended to be shared by diverse and unrelated users. Unfortunately, existing approaches to cloud security built by cloud practitioners fall short when dealing with Virtual images. Secure transmission of virtual Images can bepossible by providing authentication using Blind Authentication protocol (BAP. The proposed approach authenticates the allocation of virtual images using Blind authentication protocol. It provides provable protection against replay and client side attacks even if the keys of the user are compromised. The encryption also provides template protection, revocability and alleviates the concerns on privacy in widespread use of biometrics. Carrying out the authentication in the encrypted domain is a secure process, while the encryption key acts as an additional layer of security.

  16. Kyoto: protocol on climate protection

    International Nuclear Information System (INIS)

    At the 3rd Conference of the Signatory States to the United Nations Climate Framework Convention held in Kyoto, the so-called Kyoto Protocol on the UN Climate Framework Convention was adopted unanimously, after two years of difficult and complex negotiations, on December 11, 1997. The protocol for the first time includes legally binding obligations for the industrialized countries requiring them to reduce their greenhouse gas emissions between 2008 and 2012 by a total of 5.2% relative to the 1990 level. In meeting this obligation, the industrialized countries assumed different levels of reduction and limitation, respectively. Thus, e.g., the EU countries accepted a Communitywide reduction by 8%, while the USA is obliged to reduce by 7% and Japan by 6%. (orig.)

  17. Neonatal euthanasia: The Groningen Protocol.

    Science.gov (United States)

    Vizcarrondo, Felipe E

    2014-11-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  18. Chapter 14: Chiller Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  19. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  20. A student teamwork induction protocol

    OpenAIRE

    Kamau, Caroline; Spong, A.

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in HE. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group contract) designed to minimize social loafing, optimize coordination (by boosting good information sampling) and orient group dynamics towards the task. In the absen...

  1. Heuristic Methods for Security Protocols

    OpenAIRE

    Qurat ul Ain Nizamani; Emilio Tuosto

    2009-01-01

    Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  2. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial standa...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  3. Power Control Protocols in VANET

    OpenAIRE

    Samara, Ghassan; Salem, Amer O. Abu; Alhmiedat, Tareq

    2013-01-01

    Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of the Mobile Ad hoc Network (MANET), Power control is a critical issue in VANETwhere is should be managed carefully to help the channel to have high performance. In this paper a comparative study in the published protocols in the field of safety message dynamic power control will be presented and evaluated.

  4. Automatic analysis of distance bounding protocols

    CERN Document Server

    Malladi, Sreekanth; Kothapalli, Kishore

    2010-01-01

    Distance bounding protocols are used by nodes in wireless networks to calculate upper bounds on their distances to other nodes. However, dishonest nodes in the network can turn the calculations both illegitimate and inaccurate when they participate in protocol executions. It is important to analyze protocols for the possibility of such violations. Past efforts to analyze distance bounding protocols have only been manual. However, automated approaches are important since they are quite likely to find flaws that manual approaches cannot, as witnessed in literature for analysis pertaining to key establishment protocols. In this paper, we use the constraint solver tool to automatically analyze distance bounding protocols. We first formulate a new trace property called Secure Distance Bounding (SDB) that protocol executions must satisfy. We then classify the scenarios in which these protocols can operate considering the (dis)honesty of nodes and location of the attacker in the network. Finally, we extend the const...

  5. How to write a protocol: part 1.

    Science.gov (United States)

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical imaging protocols play an important role in the provision of high-quality care in nuclear medicine. It is imperative that all nuclear medicine facilities have protocols for every procedure performed. However, creating protocols that are detailed, unambiguous, and consistent is often easier said than done. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. This 2-part article provides technologists with a framework for composing comprehensive protocols. Part 1 discusses the secrets to successfully composing protocols ensuring they are detailed and step-by-step along with the importance of basing protocols on evidence from published guidelines and peer-reviewed literature. The components and important aspects of clinical imaging protocols are detailed. PMID:25613336

  6. A father protocol for quantum broadcast channels

    OpenAIRE

    Dupuis, Frédéric; Hayden, Patrick; Li, Ke

    2006-01-01

    A new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol is presented. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communica...

  7. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol...... is formalised in an extension of the LySa process calculus with blinding signatures. The analysis, which is fully automatic, pinpoints previously undiscovered flaws related to verifiability and accuracy and we suggest modifications of the protocol needed for validating these properties....

  8. ACSEPP On-Line Electronic Payment Protocol

    Institute of Scientific and Technical Information of China (English)

    WANG Shao-bin; ZHU Xian; HONG Fan

    2004-01-01

    With analyzing the existing on-line electronic payment protocols, this paper presents a new on-line electronic payment protocol named ACSEPP: Anonymous, Convenient and Secure Electronic Payment Protocol.Its aim is to design a practical electronic payment protocol which is both secure and convenient.Without using PKI_CA frame, it realized the anonymity of consumer and merchant, the convenient of handling, the low cost of maintenance and the security.

  9. Component versioning for protocol configuration management

    Institute of Scientific and Technical Information of China (English)

    CHEN Tian-zhou; HE Zhen-jie; HUANG Jiang-wei; DAI Hong-jun

    2005-01-01

    Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol configuration also encounters those problems. This paper focuses on solving protocol component versioning issues for protocol configuration management on embedded system, incorporating the following versioning issues: version identification, version description and protocol component archiving and retrieving based on the version library.

  10. A father protocol for quantum broadcast channels

    CERN Document Server

    Dupuis, F; Dupuis, Fr\\'ed\\'eric; Hayden, Patrick

    2006-01-01

    We present a new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communication. Regularized versions of all three rate regions are provably optimal.

  11. Message Protocols for Provisioning and Usage of Computing Services

    Science.gov (United States)

    Borissov, Nikolay; Caton, Simon; Rana, Omer; Levine, Aharon

    The commercial availability of computational resources enable consumers to scale their applications on-demand. However, it is necessary for both consumers and providers of computational resources to express their technical and economic preferences using common language protocols. Ultimately, this requires clear, flexible and pragmatic communication protocols and policies for the expression of bids and resulting generation of service level agreements (SLAs). Further standardization efforts in such description languages will foster the specification of common interfaces and matching rules for establishing SLAs. Grid middleware are not compatible with market-orientated resource provisioning. We aim to reduce this gap by defining extensions to a standardized specification such as JSDL. Furthermore, we present a methodology for matchmaking consumer bids and provider offers and map the additional economic attributes into a SLA. We demonstrate the usage of the message protocols in an application scenario.

  12. TWO PRIVACY-PRESERVING PROTOCOLS FOR POINT-CURVE RELATION

    Institute of Scientific and Technical Information of China (English)

    Liu Liang; Wu Chunying; Li Shundong

    2012-01-01

    Numerous privacy-preserving issues have emerged along with the fast development of Internet,both in theory and in real-life applications.To settle the privacy-preserving problems,secure multi-party computation is essential and critical.In this paper,we have solved two problems regarding to how to determine the position relation between points and curves without revealing any private information.Two protocols have been proposed in order to solve the problems in different conditions.In addition,some building blocks have been developed,such as scalar product protocol,so that we can take advantage of them to settle the privacy-preserving computational geometry problems which are a kind of special secure multi-party computation problems.Moreover,oblivious transfer and power series expansion serve as significant parts in our protocols.Analyses and proofs have also been given to argue our conclusion.

  13. Micro-ANP Network Protocol Architecture and Simulation Implementation

    Directory of Open Access Journals (Sweden)

    DU Xiujuan

    2013-04-01

    Full Text Available Due to the unique characteristics of underwater sensor network (UWSN, conventional network protocols for terrestrial WSN are unable to satisfy the performance of UWSN. In addition, the limits of energy, CPU and memory of UWSN nodes demand the protocol stack running on them should be simple and efficient. The paper proposed a Micro-ANP protocol architecture model for UWSN, which are three layered including application layer, network-transport layer and physical layer, optimized packet size using three objective functions: packet throughput, energy consumption and resource consumption under Micro-ANP architecture by means of MATLAB, designed and implemented UWSN simulation platform based on Micro-ANP and QualNet software, lay a solid foundation for further research on underwater sensor network.

  14. Analysis of the Similarities and Differences between MPLS Label Distribution Protocols RSVP and CR-LDP

    Directory of Open Access Journals (Sweden)

    Muhammad Asif

    2012-01-01

    Full Text Available MPLS is a new technology that offers to open up the Internet by providing many additional services to applications using IP. MPLS forwards data using labels that are attached to each data packet. These labels must be distributed between the nodes that comprise the network. Many of the new services that ISPs want to offer rely on Traffic Engineering functions. There are currently two label distribution protocols that provide support for Traffic Engineering: Resource ReSerVation Protocol (RSVP and Constraint-based Routed Label Distribution Protocol (CR-LDP. Although the two protocols provide a similar level of service, the way they operate is different, and the detailed function they offer is also not consistent. Hardware vendors and network providers need clear information to help them decide which protocol to implement in a Traffic Engineered MPLS network. Each protocol has its champions and detractors, and the specifications are still under development. Recognizing that the choice of label distribution protocol is crucial for the success of device manufacturers and network providers; this White Paper explains the similarities and important differences between the two protocols, to help identify which protocol is the right one to use in a particular environment. Data Connection€™s DC-MPLS family of portable MPLS products offers solutions for both the RSVP and CR-LDP label distribution protocols.

  15. Design for Additive Manufacturing

    OpenAIRE

    Bertran Comellas, Martí

    2012-01-01

    This Thesis, Design for Additive Manufacturing, has been mainly focused on the design process and the considerations to be taken into account when designing parts for Additive Manufacturing. It starts with an introduction to Additive Manufacturing, the different technologies and processes are described to let the readers understand their operating principle, materials used and their strengths and weaknesses. The applications of Additive manufacturing are also explained in the introductory ...

  16. Identity-based authenticated key exchange protocols from the Tate pairing

    Science.gov (United States)

    Shen, Jun; Jin, Hong; Yang, Zhiyong; Cui, Xiang

    2011-12-01

    Key agreement protocols are designed to establish a session keys between two or multiple entities oven an insecure network and the session key is used to assure confidentiality thought encryption. With the advantages of identity-based (ID-based) cryptography, there have been many ID-based key agreement protocols proposed. However, most of them are based on Weil pairing, which is more cost of computation compared with Tate paring. In this paper, we propose a newly ID-based key agreement protocol from the Tate pairing. Compared with previous protocols, the new protocol minimizes the cost of computation with no extra message exchange time. In addition, the proposed protocol provides known key security, no key control, no key-compromise impersonation and perfect forward secrecy.

  17. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  18. Cryptanalysis on Cheng et al. protocol

    Science.gov (United States)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  19. New dimensions in SNMP Protocol in Romania

    Directory of Open Access Journals (Sweden)

    Alice Nastovici

    2009-06-01

    Full Text Available In this year 2009, after e-finance shock made in each banks who worked with Simple NetworkManagement Protocol (SNMP default community string and vulnerability:- If you do not absolutely require SNMP, disable it- If you must use SNMP, use the same policy for community names as used for passwords.Make sure that they are difficult to guess or crack and that they are chanced periodically- Validate and check community names using SNMPwalk. Additional information can be foundat http://www.2nd.com/functionSNMPwalk.php- Filter SNMP (port 161/udp at the border-router or firewall unless it is absolutely necessary topool or manage devices from outside of the local network, where possible read-only

  20. Mean Response Time Approximation for HTTP Transactions over Transport Protocols

    Directory of Open Access Journals (Sweden)

    Y. J. Lee

    2014-12-01

    Full Text Available This paper addresses mean response time that end-users experience when using the Internet. HTTP (Hyper Text Transfer Protocol is a widely used transfer protocol to retrieve web objects in the Internet. Generally, HTTP uses TCP (Transmission Control Protocol in a transport layer. But it is known that HTTP interacts with TCP inefficiently. As an example of such inefficiencies, HTTP does not require TCP to deliver the rigid order, which may cause head-of-line blocking. As another transport layer protocol, SCTP (Stream Control Transmission Protocol has attractive features such as multi-streaming and multi-homing unlike TCP. Within an SCTP association, multi-streaming allows for independent delivery among streams, thus can avoid the head-of-line blocking. In addition, SCTP provides very large number of streams; therefore, it can transfer multiple objects more efficiently than the typical HTTP/1.1 over TCP which limits the number of pipelines. Mean response time is one of the main measures that end users using Internet concern. This paper presents the simple analytical model and algorithm to find the mean response time for HTTP over SCTP including the previous HTTP over TCP. Some computational experiences show that the proposed model and algorithm are well approximated to the real environment. Also, it is shown that mean response time for HTTP over SCTP can be less than that for HTTP over TCP.

  1. Automated addition of Chelex solution to tubes containing trace items

    DEFF Research Database (Denmark)

    Stangegaard, Michael; Hansen, Thomas Møller; Hansen, Anders Johannes;

    2011-01-01

    Extraction of DNA from trace items for forensic genetic DNA typing using a manual Chelex based extraction protocol requires addition of Chelex solution to sample tubes containing trace items. Automated of addition of Chelex solution may be hampered by high viscosity of the solution and fast...

  2. Epidemic Protocols for Pervasive Computing Systems - Moving Focus from Architecture to Protocol

    DEFF Research Database (Denmark)

    Mogensen, Martin

    2009-01-01

    epidemic protocols as distribution mechanism for pervasive systems. The nature of epidemic protocols make them easy to implement, easy to deploy, and resilient to failures. By using epidemic protocols, it is possible to mitigate a wide range of the potential issues on the protocol layer. The result...

  3. Optimizing One Fair Document Exchange Protocol

    CERN Document Server

    Alaraj, Abdullah M

    2012-01-01

    This paper presents an efficient fair document exchange protocol. The exchange of the documents will be between two parties. The protocol is based on the verifiable and recoverable encryption of a document's key. This verifiable and recoverable encryption of the document's key will allow one party to verify the encrypted key. It will also ensure this party that the Semi Trusted Third Party will be able to recover the key if the other party misbehaves. The protocol also incorporates the concept of enforcing the honesty of one party. The proposed protocol consists of only three messages and is more efficient than related protocols.

  4. Vulnerabilities in Quantum Key Distribution Protocols

    CERN Document Server

    Kuhn, D R

    2003-01-01

    Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return of entangled qubits to create a shared key. The protocols that are cryptanalyzed in this paper were proven secure with respect to some eavesdropping approaches, and results reported here do not invalidate these proofs. Rather, they suggest that quantum cryptographic protocols, like conventional protocols, may be vulnerable to methods of attack that were not envisaged by their designers.

  5. Reactive broadcasting protocol for video on demand

    Science.gov (United States)

    Paris, Jehan-Francois; Carter, Steven W.; Long, Darrell D. E.

    1999-12-01

    We propose a reactive broadcasting protocol that addresses the problem of distributing moderately popular videos in a more efficient fashion. Like all efficient broadcasting protocols, reactive broadcasting assumes that the customer set-top box has enough local storage to store at least one half of each video being watched. Unlike other broadcasting protocols, reactive broadcasting only broadcasts the later portions of each video. the initial segment of each video is distributed on demand using a stream tapping protocol. Our simulations show that reactive broadcasting outperforms both conventional broadcasting protocols and pure stream tapping for a wide range of video request rates.

  6. Sequence Patterns of Identity Authentication Protocols

    Institute of Scientific and Technical Information of China (English)

    Tao Hongcai; He Dake

    2006-01-01

    From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication,and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then , according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.

  7. Simple and Efficient Contract Signing Protocol

    CERN Document Server

    Alaraj, Abdullah M

    2012-01-01

    In this paper, a new contract signing protocol is proposed based on the RSA signature scheme. The protocol will allow two parties to sign the same contract and then exchange their digital signatures. The protocol ensures fairness in that it offers parties greater security: either both parties receive each other's signatures or neither does. The protocol is based on offline Trusted Third Party (TTP) that will be brought into play only if one party fails to sign the contract. Otherwise, the TTP remains inactive. The protocol consists of only three messages that are exchanged between the two parties.

  8. Novel Ω-protocols for NP

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Ω-protocols, introduced by Garay, Mackenzie and Yang, is a variant of S-protocols with online extractor which is a useful tool to overcome the nest effect in concurrent scenario. In this work, we construct an Ω-protocol for Hamiltonian cycle problem, and therefore, it allows us to present Ω-protocol for any NP relation. For most general NP relations, our construction of Ω-protocols is much more efficient than the informal one described by Garay et al. and we believe that the method for our construction may be of independent interest.

  9. Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach

    Directory of Open Access Journals (Sweden)

    Meenakshi Sharma

    2012-10-01

    Full Text Available This paper gives a brief description about some routing protocols like EEE LEACH, LEACH and DirectTransmission protocol (DTx in Wireless Sensor Network (WSN and a comparison study of theseprotocols based on some performance matrices. Addition to this an attempt is done to calculate theirtransmission time and throughput. To calculate these, MATLAB environment is used. Finally, on the basisof the obtained results from the simulation, the above mentioned three protocols are compared. Thecomparison results show that, the EEE LEACH routing protocol has a greater transmission time thanLEACH and DTx protocol and with smaller throughput

  10. Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach

    Directory of Open Access Journals (Sweden)

    Meenakshi Sharma

    2012-12-01

    Full Text Available This paper gives a brief description about some routing protocols like EEE LEACH, LEACH and DirectTransmission protocol (DTx in Wireless Sensor Network (WSN and a comparison study of theseprotocols based on some performance matrices. Addition to this an attempt is done to calculate theirtransmission time and throughput. To calculate these, MATLAB environment is used. Finally, on the basisof the obtained results from the simulation, the above mentioned three protocols are compared. Thecomparison results show that, the EEE LEACH routing protocol has a greater transmission time thanLEACH and DTx protocol and with smaller throughput.

  11. Authenticating Tripartite Key Agreement Protocol with Pairings

    Institute of Scientific and Technical Information of China (English)

    Sheng-Li Liu; Fang-Guo Zhang; Ke-Fei Chen

    2004-01-01

    In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.

  12. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  13. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...... called SPS (Security Protocol Specification) language, that enables users, without requiring deep expertise in formal models from them, to specify a wide range of real-world protocols in a simple and intuitive way. Thus, SPS allows users to verify their protocols using different tools, and generate...

  14. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...... representation and do not address how to build up protocol representations in a compositional fashion. This dissertation presents a new, event-based approach to reasoning about security protocols. We seek a broader class of models to show how event-based models can be structured in a compositional way and so...

  15. A Secure Short Message Communication Protocol

    Institute of Scientific and Technical Information of China (English)

    Chao-Wen Chang; Heng Pan; Hong-Yong Jia

    2008-01-01

    According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway are realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application.

  16. Protocols for calibrating multibeam sonar

    OpenAIRE

    Foote, Kenneth G.; Chu, Dezhang; Hammar, Terence R.; Baldwin, Kenneth C.; Mayer, Larry A.; Hufnagle, Lawrence C. jr.; Jech, J. Michael

    2005-01-01

    Development of protocols for calibrating multibeam sonar by means of the standard-target method is documented. Particular systems used in the development work included three that provide the water-column signals, namely the SIMRAD SM2000/90- and 200-kHz sonars and RESON SeaBat 8101 sonar, with operating frequency of 240 kHz. Two facilities were instrumented specifically for the work: a sea well at the Woods Hole Oceanographic Institution and a large, indoor freshwater tank at the University o...

  17. Research on Container Behaviors Protocol

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With the development of middleware technology, there are some new features to be adopted on demand in middleware platform based on container component. Aiming at the adaptation of middleware platform, from the nature of component container, this paper begins with behaviors features of EJB (Enterprise Java Bean) container, extracts general behaviors protocol of container, and defines its formal behaviors specification. In the end, the interactive relationship of components is described by WRIGHT language, and the configuration of whole system is shown. The method proposed in this paper mines the hidden features of framework of component container, and applies to refactor middleware platform in reflection and aspect-oriented programming technology.

  18. New Models for Population Protocols

    CERN Document Server

    Michail, Othon

    2010-01-01

    Wireless sensor networks are about to be part of everyday life. Homes and workplaces capable of self-controlling and adapting air-conditioning for different temperature and humidity levels, sleepless forests ready to detect and react in case of a fire, vehicles able to avoid sudden obstacles or possibly able to self-organize routes to avoid congestion, and so on, will probably be commonplace in the very near future. Mobility plays a central role in such systems and so does passive mobility, that is, mobility of the network stemming from the environment itself. The population protocol model was

  19. Protocolized Resuscitation of Burn Patients.

    Science.gov (United States)

    Cancio, Leopoldo C; Salinas, Jose; Kramer, George C

    2016-10-01

    Fluid resuscitation of burn patients is commonly initiated using modified Brooke or Parkland formula. The fluid infusion rate is titrated up or down hourly to maintain adequate urine output and other endpoints. Over-resuscitation leads to morbid complications. Adherence to paper-based protocols, flow sheets, and clinical practice guidelines is associated with decreased fluid resuscitation volumes and complications. Computerized tools assist providers. Although completely autonomous closed-loop control of resuscitation has been demonstrated in animal models of burn shock, the major advantages of open-loop and decision-support systems are identifying trends, enhancing situational awareness, and encouraging burn team communication. PMID:27600131

  20. Trust relationships in exchange protocols

    OpenAIRE

    González-Deleito Collell, Nicolás

    2005-01-01

    Les protocoles d'échange d'informations représentent un des grands domaines actuels de recherche en sécurité informatique, et sont entre autres à la base des mécanismes de commerce électronique. Ils sont par exemple nécessaires à la réalisation d'un achat en ligne, à la signature d'un contrat électronique et au courrier électronique recommandé. Dans ces exemples, les échanges d'informations consistent à échanger respectivement un objet électronique contre un paiement, des signatures digitales...

  1. Trypanosoma spp. ring test protocol

    International Nuclear Information System (INIS)

    Test material will be chosen by the coordinating lab for incorporation into a proficiency panel after repeated testing by more than one analyst on multiple PCR runs on different days. Test material: suitable test material will be provided. Protocol and laboratory procedures: Each laboratory is allowed to use their own 'in-house' test procedure (SOPs will nevertheless be provided by the respective laboratories for comparison and evaluation). Each PCR should be executed on two separate occasions. Test material used will be coded and sent as a blind panel to the participants. Each participating laboratory will be given a unique set of codes

  2. Additives in yoghurt production

    Directory of Open Access Journals (Sweden)

    Milna Tudor

    2008-02-01

    Full Text Available In yoghurt production, mainly because of sensory characteristics, different types of additives are used. Each group, and also each substance from the same group has different characteristics and properties. For that reason, for improvement of yoghurt sensory characteristics apart from addition selection, the quantity of the additive is very important. The same substance added in optimal amount improves yoghurt sensory attributes, but too small or too big addition can reduce yoghurt sensory attributes. In this paper, characteristics and properties of mostly used additives in yoghurt production are described; skimmed milk powder, whey powder, concentrated whey powder, sugars and artificial sweeteners, fruits, stabilizers, casein powder, inulin and vitamins. Also the impact of each additive on sensory and physical properties of yoghurt, syneresis and viscosity, are described, depending on used amount added in yoghurt production.

  3. Wire + Arc Additive Manufacturing

    OpenAIRE

    Williams, Stewart W.; Martina, Filomeno; Addison, Adrian C.; Ding, Jialuo; Pardal, Goncalo; Colegrove, Paul A.

    2016-01-01

    Depositing large components (>10 kg) in titanium, aluminium, steel and other metals is possible using Wire + Arc Additive Manufacturing. This technology adopts arc welding tools and wire as feedstock for additive manufacturing purposes. High deposition rates, low material and equipment costs, and good structural integrity make Wire+Arc Additive Manufacturing a suitable candidate for replacing the current method of manufacturing from solid billets or large forgings, especially with regards to ...

  4. Vicarious Michael Addition

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    C-H bond can undergo vicarious Michael addition reaction (VMA) with doubleactivated double bond in the absence of strong base and catalyst under mild conditions.Intramolecular H-bonding, electron-withdrawing inductive effect, and steric hindrance at aposition of nucleophile facilitates C-H addition over N-H addition. By using VMA, high branching multiplicity, novel branching pattern, controllable density and distribution of functional groups can be envisioned for novel dendrimer synthesis.

  5. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  6. Additive Gaussian Processes

    CERN Document Server

    Duvenaud, David; Rasmussen, Carl Edward

    2011-01-01

    We introduce a Gaussian process model of functions which are additive. An additive function is one which decomposes into a sum of low-dimensional functions, each depending on only a subset of the input variables. Additive GPs generalize both Generalized Additive Models, and the standard GP models which use squared-exponential kernels. Hyperparameter learning in this model can be seen as Bayesian Hierarchical Kernel Learning (HKL). We introduce an expressive but tractable parameterization of the kernel function, which allows efficient evaluation of all input interaction terms, whose number is exponential in the input dimension. The additional structure discoverable by this model results in increased interpretability, as well as state-of-the-art predictive power in regression tasks.

  7. Research on Routing Protocol of Mobile Ad Hoc Network

    OpenAIRE

    Tuo Ming Fu; Che Min

    2016-01-01

    Routing protocol is an important content of mobile Ad Hoc. The typical mobile Ad Hoc network routing protocols is introduced. The advantages and disadvantages of these routing protocols are analyzed. A hybrid routing protocol is put forward based on this.

  8. Toward Synthesis, Analysis, and Certification of Security Protocols

    Science.gov (United States)

    Schumann, Johann

    2004-01-01

    Implemented security protocols are basically pieces of software which are used to (a) authenticate the other communication partners, (b) establish a secure communication channel between them (using insecure communication media), and (c) transfer data between the communication partners in such a way that these data only available to the desired receiver, but not to anyone else. Such an implementation usually consists of the following components: the protocol-engine, which controls in which sequence the messages of the protocol are sent over the network, and which controls the assembly/disassembly and processing (e.g., decryption) of the data. the cryptographic routines to actually encrypt or decrypt the data (using given keys), and t,he interface to the operating system and to the application. For a correct working of such a security protocol, all of these components must work flawlessly. Many formal-methods based techniques for the analysis of a security protocols have been developed. They range from using specific logics (e.g.: BAN-logic [4], or higher order logics [12] to model checking [2] approaches. In each approach, the analysis tries to prove that no (or at least not a modeled intruder) can get access to secret data. Otherwise, a scenario illustrating the &tack may be produced. Despite the seeming simplicity of security protocols ("only" a few messages are sent between the protocol partners in order to ensure a secure communication), many flaws have been detected. Unfortunately, even a perfect protocol engine does not guarantee flawless working of a security protocol, as incidents show. Many break-ins and security vulnerabilities are caused by exploiting errors in the implementation of the protocol engine or the underlying operating system. Attacks using buffer-overflows are a very common class of such attacks. Errors in the implementation of exception or error handling can open up additional vulnerabilities. For example, on a website with a log-in screen

  9. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  10. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Directory of Open Access Journals (Sweden)

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  11. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  12. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols. PMID:27163786

  13. Evaluation and Application of the Strand-Specific Protocol for Next-Generation Sequencing

    Directory of Open Access Journals (Sweden)

    Kuo-Wang Tsai

    2015-01-01

    Full Text Available Next-generation sequencing (NGS has become a powerful sequencing tool, applied in a wide range of biological studies. However, the traditional sample preparation protocol for NGS is non-strand-specific (NSS, leading to biased estimates of expression for transcripts overlapped at the antisense strand. Strand-specific (SS protocols have recently been developed. In this study, we prepared the same RNA sample by using the SS and NSS protocols, followed by sequencing with Illumina HiSeq platform. Using real-time quantitative PCR as a standard, we first proved that the SS protocol more precisely estimates gene expressions compared with the NSS protocol, particularly for those overlapped at the antisense strand. In addition, we also showed that the sequence reads from the SS protocol are comparable with those from conventional NSS protocols in many aspects. Finally, we also mapped a fraction of sequence reads back to the antisense strand of the known genes, originally without annotated genes located. Using sequence assembly and PCR validation, we succeeded in identifying and characterizing the novel antisense genes. Our results show that the SS protocol performs more accurately than the traditional NSS protocol and can be applied in future studies.

  14. RSRP: A Robust Secure Routing Protocol in MANET

    Directory of Open Access Journals (Sweden)

    Sinha Ditipriya

    2014-05-01

    Full Text Available In this paper, we propose a novel algorithm RSRP to build a robust secure routing protocol in mobile ad-hoc networks (MANETs. This algorithm is based on some basic schemes such as RSA_CRT for encryption and decryption of messages; CRT for safety key generation, Shamir’s secret sharing principle for generation of secure routes. Those routes which are free from any malicious node and which belong to the set of disjoint routes between a source-destination pair are considered as probable routes. Shamir’s secret sharing principle is applied on those probable routes to obtain secure routes. Finally, most trustworthy and stable route is selected among those secure routes. Selection of the final route depends on some criteria of the nodes present in a route e.g.: battery power, mobility and trust value. In addition, complexity of key generation is reduced to a large extent by using RSA-CRT instead of RSA. In turn, the routing becomes less expensive and most secure and robust one. Performance of this routing protocol is then compared with non-secure routing protocols (AODV and DSR, secure routing scheme using secret sharing, security routing protocol using ZRP and SEAD depending on basic characteristics of these protocols. All such comparisons show that RSRP shows better performance in terms of computational cost, end-to-end delay and packet dropping in presence of malicious nodes in the MANET, keeping the overhead in terms of control packets same as other secure routing protocols.

  15. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2015-02-24

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  16. Additive and polynomial representations

    CERN Document Server

    Krantz, David H; Suppes, Patrick

    1971-01-01

    Additive and Polynomial Representations deals with major representation theorems in which the qualitative structure is reflected as some polynomial function of one or more numerical functions defined on the basic entities. Examples are additive expressions of a single measure (such as the probability of disjoint events being the sum of their probabilities), and additive expressions of two measures (such as the logarithm of momentum being the sum of log mass and log velocity terms). The book describes the three basic procedures of fundamental measurement as the mathematical pivot, as the utiliz

  17. Protocols development for security and privacy of radio frequency identification systems

    Science.gov (United States)

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  18. Food Additives and Hyperkinesis

    Science.gov (United States)

    Wender, Ester H.

    1977-01-01

    The hypothesis that food additives are causally associated with hyperkinesis and learning disabilities in children is reviewed, and available data are summarized. Available from: American Medical Association 535 North Dearborn Street Chicago, Illinois 60610. (JG)

  19. Groups – Additive Notation

    Directory of Open Access Journals (Sweden)

    Coghetto Roland

    2015-06-01

    Full Text Available We translate the articles covering group theory already available in the Mizar Mathematical Library from multiplicative into additive notation. We adapt the works of Wojciech A. Trybulec [41, 42, 43] and Artur Korniłowicz [25].

  20. Climate change scenarios and technology transfer protocols

    Energy Technology Data Exchange (ETDEWEB)

    Kypreos, Socrates; Turton, Hal [Energy Economics Group, Paul Scherrer Institute, Villigen PSI, CH-5232 (Switzerland)

    2011-02-15

    We apply a specific version of MERGE-ETL, an integrated assessment model, to study global climate policies supported by Technology Transfer Protocols (TTPs). We model a specific formulation of such a TTP where donor countries finance via carbon tax revenues, the diffusion of carbon-free technologies in developing countries (DCs) and quantify its benefits. Industrialized countries profit from increased technology exports, global diffusion of advanced technology (leading to additional technology learning and cost reductions) and reduced climate damages through the likelihood of greater global participation in a new international agreement. DCs experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and expected secondary benefits of carbon abatement (such as reduced local and regional air pollution). The analysis identifies potential candidate technologies that could be supported under a TTP, and the impact of a TTP on economic development (including the flow of transfer subsidies) and global emissions. Although a TTP may encourage additional participation, such a proposal is only likely to be successful if an increased willingness to pay to avoid climate damages is accepted, first by the present and future generations of the industrialized world and later on, when sufficient economic growth is accumulated, by today's developing countries. (author)

  1. Additively Manufactured Propulsion System

    OpenAIRE

    Dushku, Matthew; Mueller, Paul

    2012-01-01

    New high-performance, carbon-fiber reinforced polymer material allows additive manufacturing to produce pressure vessels capable of high pressures (thousands of pounds per square inch). This advancement in turn allows integral hybrid propulsion which is revolutionary for both CubeSats and additively-manufactured spacecraft. Hybrid propulsion offers simplicity as compared to bipropellant liquid propulsion, significantly better safety compared to solid or monopropellant hydrazine propulsion, an...

  2. Symmetric cryptographic protocols for extended millionaires' problem

    Institute of Scientific and Technical Information of China (English)

    LI ShunDong; WANG DaoShun; DAI YiQi

    2009-01-01

    Yao's millionaires' problem is a fundamental problem in secure multiparty computation, and its solutions have become building blocks of many secure multiparty computation solutions. Unfortunately,most protocols for millionaires' problem are constructed based on public cryptography, and thus are inefficient. Furthermore, all protocols are designed to solve the basic millionaires' problem, that is,to privately determine which of two natural numbers is greater. If the numbers are real, existing solutions do not directly work. These features limit the extensive application of the existing protocols. This study introduces and refines the first symmetric cryptographic protocol for the basic millionaires' problem, and then extends the symmetric cryptographic protocol to privately determining which of two real numbers is greater, which are called the extended millionaires' problem, and proposes corresponding Constructed based on symmetric cryptography, these protocols are very efficient.

  3. VANET Routing Protocols: Pros and Cons

    CERN Document Server

    Paul, Bijan; Bikas, Md Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol has taken significant attention. So, it is very necessary to identify the pros and cons of routing protocols which can be used for further improvement or development of any new routing protocol. This paper presents the pros and cons of VANET routing protocols for inter vehicle communication.

  4. Novel construction of Secure RFID Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Shafiqul Abidin

    2014-10-01

    Full Text Available This article proposes an efficient and secure authentication protocol for secure and low-cost RFID systems in random oracles. Security is one of the prime concerns of RFID system. Proposed protocol relies on Elliptic Curve Discrete Logarithm Problem (ECDLP to achieve security. The protocol achieves the most important security goals scalability, anonymity and anti-cloning for RFID system. A password based protocol has vulnerability on fixed password. This can be exploited by threats. In the proposed protocol, there is a provision to change the password of the Tags. Hence the vulnerability can be reduced in an acceptable level. Computation cost is very less as compare to the other protocols.

  5. E-Cash Payment Protocols

    Directory of Open Access Journals (Sweden)

    Shweta Srivastava

    2012-09-01

    Full Text Available E-cash is a payment system designed and implemented for making purchases over open networks such as the Internet. Need of a payment system which enables the electronic transactions are growing at the same time that the use of Internet is growing in our daily life. Present days electronic payment systems have a major problem, they cannot handle the security and the users anonymity and at the same time these systems are secure on the cost of their users anonymity. This paper shows the payment protocols for digital cash and discusses how a digital cash system can be formed by presenting a few of the present days digital cash systems in details. We also provide a comparison and determine them together to see which one of them fulfils the properties for digital cash and the required security level.

  6. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  7. [The research protocol. Part I].

    Science.gov (United States)

    Miranda-Novales, María Guadalupe; Villasís-Keever, Miguel Ángel

    2015-01-01

    One of the principal aims in research is the publication of the study in scientific journals. This implies two challenges: the first one, the election of an adequate research design, and the second one, the concrete and simple wording of the results for the study to be accepted in the most appropriate journal according to the scope. Despite numerous supporting documents are available for both issues, the publication process is long, tiresome, and can discourage the most enthusiastic researcher. This is the first of a series of articles with the objective to describe the steps from the research question to the publication of the study. First of all, the importance of the research design will be addressed. The structure of the protocol is essential to achieve the objectives, and provides a way to organize the investigation in a logic, comprehensible and efficient manner.

  8. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    Directory of Open Access Journals (Sweden)

    Seema Mehla

    2010-05-01

    Full Text Available the Extensible Authentication Protocol (EAP is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP re-authentication protocol, andcompared it with that of the EAP-TLS protocol. The result shows that the authentication delay of EAP reauthentication protocol is only twentieth of that in the EAPTLS protocol.

  9. nPAKE+:A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords

    Institute of Scientific and Technical Information of China (English)

    Zhi-guo Wan; Robert H. Deng; Feng Bao; Bart Preneel; Ming Gu

    2009-01-01

    Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a tree-based group PAKE protocol -- nPAKE+ protocol under the setting where each party shares an independent password with a trusted server. The nPAKE+ protocol is a novel combination of the hierarchical key tree structure and the password-based Diffie-Hellman exchange, and hence it achieves substantial gain in computation efficiency. In particular, the computation cost for each client in our protocol is only O(log n). Additionally, the hierarchical feature of nPAKE+ enables every subgroup to obtain its own subgroup key in the end. We also prove the security of our protocol under the random oracle model and the ideal cipher model.

  10. An Identity- Based Key- Exchange Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ya-juan; ZHU Yue-fei; HUANG Qiu-sheng

    2005-01-01

    An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure(session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diffie-Hellmen) assumption is correct. Then we apply the signature-based authenticator to our protocol and obtain an identity-Based key-exchange protocol that is SK-secure in the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.

  11. Vulnerabilities in Quantum Key Distribution Protocols

    OpenAIRE

    Kuhn, D. Richard

    2003-01-01

    Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return of entangled qubits to create a shared key. The protocols that are cryptanalyzed in this paper were proven secure with respect to some eavesdropping approaches, and results reported here do not invalidate these proofs. Rather, they suggest th...

  12. SCRUTINY OF BROADCASTING PROTOCOLS IN VANET

    OpenAIRE

    Rohini Nere; Uma Nagaraj

    2015-01-01

    Definitive broadcasting in vehicular ad hoc networks is the key to success for various services and applications on an intelligent transportation system. Many trusted broadcasting protocols have been proposed but none of them has been evaluated in realistic scenario. In this paper, we discuss these reliable broadcasting protocols on VANET. Basic mechanism in broadcasting, and also we are providing collective research of Broadcasting protocols in vanet in that some real time protoc...

  13. Emission trading under the Kyoto Protocol

    OpenAIRE

    Holtsmark, Bjart; Hagem, Cathrine

    2003-01-01

    On 11 December 1997, delegates to the third conference of the Parties to the UN Framework Convention on Climate Change agreed upon the Kyoto Protocol. The protocol sets binding emission targets for developed nations (Annex B countries). The Protocol states that Annex B countries may participate in emission trading. The rules for emission trading are to be discussed at the fourth Conference of the Parties in November 1998. differentiation of targets among countries, but not in any system...

  14. Security in network environment-network protocols

    OpenAIRE

    Fessl, Jaromír

    2011-01-01

    Work is focused on network protocols features and security characteristics. Overview of protocols is made through all layers of OSI model and by this design structured. For each layer is made summary of interesting facts. Separate chapter is dedicated for VPN and for implementation possibilities of VPN. In chapter Practical problems are reflected most important problems of actual security (from network protocol point of view) concerned on SSL/TLS, SMTP and DNS. Together with security charact...

  15. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  16. VULNERABILITIES OF THE SSL/TLS PROTOCOL

    OpenAIRE

    Jelena Ćurguz

    2016-01-01

    This paper analyzes vulnerabilities of the SSL/TLS Handshake protocol, which is responsible for authentication of the parties in the communication and negotiation of security parameters that will be used to protect confidentiality and integrity of the data. It will be analyzed the attacks against the implementation of Handshake protocol, as well as the attacks against the other elements necessary to SSL/TLS protocol to discover security flaws that were exploited, modes of attac...

  17. Rewriting-Based Verification of Authentication Protocols

    OpenAIRE

    Ogata, Kazuhiro; Futatsugi, Kokichi

    2004-01-01

    We propose a method of formally analysing security protocols based on rewriting. The method is roughly as follows. A security protocol is modeled as an observational transition system, which is described in CafeOBJ. Proof scores showing that the protocol has safety (security) properties are then written in CafeOBJ and the proof scores are executed (rewritten) by the CafeOBJ system.

  18. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  19. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  20. CIMS Network Protocol and Its Net Models

    Institute of Scientific and Technical Information of China (English)

    罗军舟; 顾冠群

    1997-01-01

    Computer communication network architectures for cims are based on the OSI Reference Model.In this paper,CIMS network protocol model is set up on the basis of the corresqonding service model.Then the authors present a formal specification of transport protocols by using an extended Predicate/Transition net system that is briefly introduced in the third part.Finally,the general methods for the Petri nets based formal specification of CIMS network protocols are outlined.

  1. Universal protocol for alopecia areata clinical studies.

    Science.gov (United States)

    Mesinkovska, Natasha A; Bergfeld, Wilma F

    2013-12-01

    Within the area of alopecia areata research, there is an obvious need for well-designed clinical trials of therapeutic agents. The National Alopecia Areata Foundation (NAAF) has created an initiative for the development of a unified protocol with guidelines for clinical studies. The NAAF universal protocol represents a joint effort of clinicians and investigators with experience in treating alopecia areata. This protocol will serve as a tremendous resource to facilitate future clinical studies. PMID:24326554

  2. A Formal Approach to Protocol Performance Testing

    Institute of Scientific and Technical Information of China (English)

    XU Mingwei; WU Jianping

    1999-01-01

    This paper proposes a formal approach to protocol performance testing based on the extended concurrent TTCN. To meet the needs of protocol performance testing, concurrent TTCN is extended, and the extended concurrent TTCN's operational semantics is defined in terms of Input-Output Labeled Transition System. An architecture design of protocol performance test system is described, and an example of test cases and its test resultare given.

  3. Quantum three-pass cryptography protocol

    Science.gov (United States)

    Yang, Li; Wu, Ling-An; Liu, Songhao

    2002-09-01

    We present a new kind of quantum cryptography protocol based on Shamir's three-pass protocol of classical cryptography, which allows the transmission of qubits directly and secretly via the aid of an unjammable classical channel. In this protocol we implement the encryption and decryption transformations via rotations on the Poincare sphere of the photons polarization parameters. The key technique is that Bob's encryption rotation must be commutative with Alice s decryption rotation; this means that the axes of these two rotations must be parallel. We also present a security analysis of the protocol under a man-in-the-middle attack.

  4. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick;

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process...... but then switches to a denser coding structure towards the end. Our systematic mechanism maintains the sparse structure during the recombination of packets at the intermediate nodes. The performance of our protocol is compared by means of simulations of IEEE reference grids against standard master-slave protocols...

  5. A formal model of fair exchange protocols

    Institute of Scientific and Technical Information of China (English)

    QING Sihan; LI Gaicheng

    2005-01-01

    Based on the study of existing fair exchange protocols, this paper sets up an accurate formal model by stepwise refinement. In the process of refinement an unreliable channel is employed to simulate an attack behavior. The model provides a novel formal definition of exchanged items, and presents the formal goals for fairness, accountability,etc., reflecting the inherent requirements for fair exchange protocols across-the-board. In order to check, prove, and design fair exchange protocols effectively and efficiently, the model puts forward a novel property of abuse-freeness which applies to all fair exchange protocols, gives a formal definition for trust strand of the third party, and presents general criteria of designing a secure and effective fair exchange protocol. Taking a typical fair exchange protocol as an example, this paper presents the analysis steps of fair exchange protocols appealing to our model. An unknown attack is uncovered. The analysis reveals the process of a complete attack, discovering deeper reasons for causing an attack.Finally, we modify the flawed protocol and the revised protocol ensures the desirable properties.

  6. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri;

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  7. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  8. Secure Key Management Protocol in WIMAX

    Directory of Open Access Journals (Sweden)

    Noudjoud Kahya

    2012-12-01

    Full Text Available The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16, is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS to Subscriber Station (SS. In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. Wefound that PKMv2 is vulnerable to replay, DoS, Man-in-the middle attacks. At last we have proposed asecure protocol (SPKM to prevent the authorization protocol from such attacks.

  9. Equilibria of Generalized Cut and Choose Protocols

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis; Kurokawa, David;

    Classic cake cutting protocols — which fairly allocate a divisible good among agents with heterogeneous preferences — are susceptible to manipulation. Do their strategic outcomes still guarantee fairness? To answer this question we adopt a novel algo rithmic approach, proposing a concrete...... computational model and reasoning about the game-theoretic properties of algorithms that operate in this model. Specifically, we show that each protocol in the class of generalized cut and choose (GCC) protocols — which includes the most important discrete cake cutting protocols — is guaranteed to have...

  10. Additive Manufacturing Infrared Inspection

    Science.gov (United States)

    Gaddy, Darrell

    2014-01-01

    Additive manufacturing is a rapid prototyping technology that allows parts to be built in a series of thin layers from plastic, ceramics, and metallics. Metallic additive manufacturing is an emerging form of rapid prototyping that allows complex structures to be built using various metallic powders. Significant time and cost savings have also been observed using the metallic additive manufacturing compared with traditional techniques. Development of the metallic additive manufacturing technology has advanced significantly over the last decade, although many of the techniques to inspect parts made from these processes have not advanced significantly or have limitations. Several external geometry inspection techniques exist such as Coordinate Measurement Machines (CMM), Laser Scanners, Structured Light Scanning Systems, or even traditional calipers and gages. All of the aforementioned techniques are limited to external geometry and contours or must use a contact probe to inspect limited internal dimensions. This presentation will document the development of a process for real-time dimensional inspection technique and digital quality record of the additive manufacturing process using Infrared camera imaging and processing techniques.

  11. Designing an Exploration Atmosphere Prebreathe Protocol

    Science.gov (United States)

    Conkin, Johnny; Feiveson, A. H.; Gernhardt, M. L.; Norcross, J. R.; Wessel, J. H., III

    2015-01-01

    Extravehicular activities (EVAs) at remote locations must maximize limited resources such as oxygen (O2) and also minimize the risk of decompression sickness (DCS). A proposed remote denitrogenation (prebreathe) protocol requires astronauts to live in a mildly hypoxic atmosphere at 8.2 psia while periodically performing EVAs at 4.3 psia. Empirical data are required to confirm that the protocol meets the current accept requirements: less than or equal to 15% incidence of Type I DCS, less than or equal to 20% incidence of Grade IV venous gas emboli (VGE), both at 95% statistical confidence, with no Type II DCS symptom during the validation trial. METHODS: A repeated measures statistical design is proposed in which groups of 6 subjects with physical characteristics similar to active-duty astronauts would first become equilibrated to an 8.2 psia atmosphere in a hypobaric chamber containing 34% O2 and 66% N2, over 48 h, and then perform 4 simulated EVAs at 4.3 psia over the next 9 days. In the equilibration phase, subjects undergo a 3-h 100% O2 mask prebreathe prior to and during a 5-min ascent to 8.2 psia to prevent significant tissue N2 supersaturation on reaching 8.2 psia. Masks would be removed once 34% O2 is established at 8.2 psia, and subjects would then equilibrate to this atmosphere for 48 h. The hypoxia is equivalent to breathing air at 1,220 meters (4,000 ft) altitude, just as was experienced in the shuttle 10.2 psia - 26.5% O2 staged denitrogenation protocol and the current ISS campout denitrogenation protocol. For simulated EVAs, each subject dons a mask and breathes 85% O2 and 15% N2 during a 3-min depressurization to 6.0 psia, holds for 15 min, and then completes a 3-min depressurization to 4.3 psia. The simulated EVA period starts when 6.0 psia is reached and continues for a total of 240 min (222 min at 4.3 psia). During this time, subjects will follow a prescribed repetitive activity against loads in the upper and lower body with mean metabolic rate

  12. A Framework for Group Key Management Protocol Assessment Independent of View Synchrony

    Directory of Open Access Journals (Sweden)

    David Manz

    2010-01-01

    previously inconsistently portrayed. The ability to see this before did not exist because a framework upon which to evaluate the costs did not exist. Now, literature can proceed with clearly defined understandings of what values exist in group key management protocols. Conclusion/Recommendations: Better communication in group key management will be a benefit to the entire field. Now that costs can be analyzed, procedure and security can be improved and protocols can be implemented for wireless ad-hoc networks. In addition, it led two authors of this study to create a new protocol, DTEGK, to maximize the most efficient communication, as view synchrony was hindering the effectiveness of previous protocols. Without the hindrance of view synchrony and a quantitative list of defined communication costs, protocols can also now be extended into the wireless, ad-hoc realm of group key management.

  13. Chapter 19: HVAC Controls (DDC/EMS/BAS) Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Romberger, J.

    2014-11-01

    The HVAC Controls Evaluation Protocol is designed to address evaluation issues for direct digital controls/energy management systems/building automation systems (DDC/EMS/BAS) that are installed to control heating, ventilation, and air-conditioning (HVAC) equipment in commercial and institutional buildings. (This chapter refers to the DDC/EMS/BAS measure as HVAC controls.) This protocol may also be applicable to industrial facilities such as clean rooms and labs, which have either significant HVAC equipment or spaces requiring special environmental conditions. This protocol addresses only HVAC-related equipment and the energy savings estimation methods associated with installing such control systems as an energy efficiency measure. The affected equipment includes: Air-side equipment (air handlers, direct expansion systems, furnaces, other heating- and cooling-related devices, terminal air distribution equipment, and fans); Central plant equipment (chillers, cooling towers, boilers, and pumps). These controls may also operate or affect other end uses, such as lighting, domestic hot water, irrigation systems, and life safety systems such as fire alarms and other security systems. Considerable nonenergy benefits, such as maintenance scheduling, system component troubleshooting, equipment failure alarms, and increased equipment lifetime, may also be associated with these systems. When connected to building utility meters, these systems can also be valuable demand-limiting control tools. However, this protocol does not evaluate any of these additional capabilities and benefits.

  14. Packet Drop Avoidance for High-speed network transmission protocol

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Guojun

    2004-05-01

    As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in Transmission Control Protocol (TCP) have worked well on low bandwidth delay product networks, but with newer high-bandwidth delay networks they have shown to be inefficient and prone to unstable. This is largely due to increased network bandwidth coupled with changes in internet traffic patterns. These changes come from a variety of new network applications that are being developed to take advantage of the increased network bandwidth. This paper will examine the end-to-end congestion avoidance mechanism and perform a step-by-step analysis of its theory. In addition we will propose an alternative approach developed as part of a new network transmission protocol. Our alternative protocol uses a packet drop avoidance (PDA) mechanism built on top of the maximum burst size (MBS) theory combined with a real-time available bandwidth algorithm.

  15. From additivity to synergism

    DEFF Research Database (Denmark)

    Ritz, Christian; Streibig, Jens Carl

    2014-01-01

    Interest in synergistic or antagonistic effects through mixture experiments has grown immensely over the past two decades, not the least within in pharmacology and toxicology. Several definitions of reference models exist; one commonly used reference model is concentration or dose addition, which...... assumes compounds, when administrated simultaneously, do not interfere with each other at the site of action. We focus on statistical modelling that allows evaluation of dose addition. We will describe several statistical approaches that are suitable for analysis mixture data where synergistic...... or antagonistic effects may be present. The statistical models are defined and explained and some of the approaches exemplified. Code in open-source software is provided....

  16. Alternative additives; Alternative additiver

    Energy Technology Data Exchange (ETDEWEB)

    2007-08-15

    In this project a number of industrial and agricultural waste products have been characterised and evaluated in terms of alkali-getter performance. The intended use is for biomass-fired power stations aiming at reducing corrosion or slagging related problems. The following products have been obtained, characterised and evaluated: 1) Brewery draff 2) Danish de-gassed manure 3) Paper sludge 4) Moulding sand 5) Spent bleaching earth 6) Anorthosite 7) Sand 8) Clay-sludge. Most of the above alternative additive candidates are deemed unsuitable due to insufficient chemical effect and/or expensive requirements for pre-treatment (such as drying and transportation). 3 products were selected for full-scale testing: de-gassed manure, spent bleaching earth and clay slugde. The full scale tests were undertaken at the biomass-fired power stations in Koege, Slagelse and Ensted. Spent bleaching earth (SBE) and clay sludge were the only tested additive candidates that had a proven ability to react with KCl, to thereby reduce Cl-concentrations in deposits, and reduce the deposit flux to superheater tubes. Their performance was shown to nearly as good as commercial additives. De-gassed manure, however, did not evaluate positively due to inhibiting effects of Ca in the manure. Furthermore, de-gassed manure has a high concentration of heavy metals, which imposes a financial burden with regard to proper disposal of the ash by-products. Clay-sludge is a wet clay slurring, and drying and transportation of this product entails substantial costs. Spent bleaching does not require much pre-treatment and is therefore the most promising alternative additive. On the other hand, bleaching earth contains residual plant oil which means that a range of legislation relating to waste combustion comes into play. Not least a waste combustion fee of 330 DKK/tonne. For all alternative (and commercial) additives disposal costs of the increase ash by-products represents a significant cost. This is

  17. Additives for the Axe

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    On May 1,China will begin to ban the production and use of two food additives commonly used to "bleach" flour,benzoyl peroxide and calcium peroxide.The decision was made after 10 years of wrangling between the policy makers,manufacturers,scientists and consumers.The Ministry of Health said in a statement it was applying the ban in response to consumers’ concerns about chemical substances in food,and technical improvements that had made the two additives unnecessary in flour processing.Minister of Health Chen Zhu has also said

  18. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2013-12-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  19. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Crawford, Aladsair J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gourisetti, Sri Nikhil Gup [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Viswanathan, Vilayanur V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ferreira, Summer [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Schoenwald, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rosewater, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-04-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Based on experiences with the application and use of that document, and to include additional ESS applications and associated duty cycles, test procedures and performance metrics, a first revision of the November 2012 Protocol was issued in June 2014 (PNNL 22010 Rev. 1). As an update of the 2014 revision 1 to the Protocol, this document (the March 2016 revision 2 to the Protocol) is intended to supersede the June 2014 revision 1 to the Protocol and provide a more user-friendly yet more robust and comprehensive basis for measuring and expressing ESS performance.

  20. Sloppy Addition and Multiplication

    DEFF Research Database (Denmark)

    Nannarelli, Alberto

    Sometimes reducing the precision of a numerical processor, by introducing errors, can lead to significant performance (delay, area and power dissipation) improvements without compromising the overall quality of the processing. In this work, we show how to perform the two basic operations, addition...

  1. The Project Based Mechanisms of the Kyoto Protocol. Credible Instruments or Challenges to the Integrity of the Kyoto Protocol?

    Energy Technology Data Exchange (ETDEWEB)

    Takeuchi Waldegren, Linn

    2006-03-15

    The project based mechanisms of the Kyoto Protocol are innovative instruments which allow projects to earn credits for reducing greenhouse gas (GHG) emissions. The credits can in turn be used by countries to reach their emissions targets according to the Kyoto Protocol. The Project based mechanisms are known as the Clean Development Mechanism (CDM) and the Joint Implementation (JI). If the project based mechanisms are to be effective policy instruments they must ensure the integrity of the Kyoto Protocol, and their ability to promote and prove real emission reductions is critical. The environmental credibility of the project based mechanisms will also ensure their ability to promote cost effectiveness. Key concepts in this context are environmental and project additionality, and their role and value for the project based mechanisms are analyzed. Environmental additionality is established by comparing a project's emissions to a baseline. The baseline's credibility is thus vital. The concept of project additionality is somewhat controversial, but is nonetheless of equal importance. The case studies of CDM approved methodologies (AMs) and proposed projects suggest that there are credibility issues that need to be addressed if the project based mechanisms are to promote real emissions reductions.

  2. Vulnerability of "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in Quantum Cryptography"

    OpenAIRE

    Abidin, Aysajan; Larsson, Jan-Åke

    2008-01-01

    In this paper we review and comment on "A novel protocol-authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography", [M. Peev et al., Int. J. Quant. Inform., 3, 225, (2005)]. In particular, we point out that the proposed primitive is not secure when used in a generic protocol, and needs additional authenticating properties of the surrounding quantum-cryptographic protocol.

  3. Guidance for States Implementing Comprehensive Safeguards Agreements and Additional Protocols (Spanish Edition)

    International Nuclear Information System (INIS)

    This publication is aimed at enhancing States’ understanding of the safeguards obligations of both the State and the IAEA, and at improving the cooperation between States and the IAEA in safeguards implementation. It is principally intended for State or regional safeguards regulatory authorities and facility operators, and is a reference document that will be supported by detailed guidance and examples in ‘Safeguards Implementation Practices’ (SIPs) to be published separately

  4. Safeguards Implementation Guide for States with Small Quantities Protocols

    International Nuclear Information System (INIS)

    The International Atomic Energy Agency (IAEA) works to enhance the contribution of nuclear energy for peace and prosperity around the world, while helping to ensure that nuclear material is not diverted to nuclear weapons or other nuclear explosive devices. In implementing safeguards, the IAEA plays an instrumental independent verification role, providing credible assurances that States' safeguards commitments are being respected. Most of the world's non-nuclear-weapon States (NNWSs) have concluded comprehensive safeguards agreements (CSAs) with the IAEA, pursuant to the Treaty on the Non- Proliferation of Nuclear Weapons (NPT). The IAEA and States are required to cooperate in the implementation of such agreements. Effective cooperation demonstrates a State's commitment to the peaceful use of nuclear energy and furthers the State's national interests by reducing the risk of unauthorized use of nuclear material. Over 100 NNWSs party to the NPT have very limited quantities of nuclear material and have concluded protocols to their CSAs which hold in abeyance many procedures in Part II of a CSA. These protocols are referred to as 'small quantities protocols' or 'SQPs' and remain in effect as long as the State meets certain eligibility criteria. The purpose of an SQP is to reduce the burden of safeguards implementation for States with little or no nuclear activities, while retaining the integrity of the safeguards system. States with SQPs have very important obligations they must fulfil under their CSAs. In 1997, as part of the IAEA's efforts to strengthen its safeguards system, the Model Additional Protocol to the Agreement(s) between State(s) and the International Atomic Energy Agency for the Application of Safeguards was developed to provide the IAEA with broader access to information and locations, thus significantly increasing the IAEA's ability to provide assurance of the absence of undeclared nuclear material and activities in States. Many States with SQPs have

  5. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    Pang, J.

    2002-01-01

    Needham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over insecure open netwo

  6. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  7. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  8. Performance of a connectionless protocol over ATM

    NARCIS (Netherlands)

    Heijenk, Geert J.; Moorsel, van Aad P.A.; Niemegeers, Ignas G.

    1992-01-01

    Recent studies show the existence of a demand for a connectionless broadband service. In order to cope with this demand, a connectionless protocol for the B-ISDN needs to be designed. Such a protocol should make use of ATM and the ATM Adaptation Layer. It needs to specify destination and bandwidth o

  9. Summary Report on Rational Cryptographic Protocols

    DEFF Research Database (Denmark)

    Alwen, Joël; Cachin, Christian; Pereira, Olivier;

    This report gives an overview of some of the models and techniques in rational cryptography, an emerging research area which in particular uses the methodologies and techniques of game theory to analyze cryptographic protocols and which uses cryptographic protocol theory to implement game theoretic...

  10. Welfare monitroing system : assessment protocol for horses

    NARCIS (Netherlands)

    Livestock Research,

    2012-01-01

    This document describes the protocol for horses in more detail. For the development of the protocol the Welfare Quality® framework was used. For each measure there is a description how to assess the measure including the method of classification.

  11. 40 CFR 161.70 - Acceptable protocols.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Acceptable protocols. 161.70 Section 161.70 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA... Development (OECD) Protocols. Tests conducted in accordance with the requirements and recommendations of...

  12. The Formal Specifications for Protocols of Decoders

    Institute of Scientific and Technical Information of China (English)

    YUAN Meng-ting; WU Guo-qing; SHU Feng-di

    2004-01-01

    This paper presents a formal approach, FSPD (Formal Specifications for Protocols of Decoders), to specify decoder communication protocols. Based on axiomatic, FSPD is a precise language with which programmers could use only one suitable driver to handle various types of decoders. FSPD is helpful for programmers to get high adaptability and reusability of decoder-driver software.

  13. Secure Geographic Routing Protocols: Issues and Approaches

    CERN Document Server

    sookhak, Mehdi; Haghparast, Mahboobeh; ISnin, Ismail Fauzi

    2011-01-01

    In the years, routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN) and also provide a qualitative comparison of them.

  14. Secure Geographic Routing Protocols: Issues and Approaches

    Directory of Open Access Journals (Sweden)

    Mehdi sookhak

    2011-09-01

    Full Text Available In the years, routing protocols in wireless sensor networks (WSN have been substantially investigated by researches Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN and also provide a qualitative comparison of them.

  15. ATTACKS AND IMPROVEMENTS ON THE RFID AUTHENTICATION PROTOCOLS BASED ON MATRIX

    Institute of Scientific and Technical Information of China (English)

    Wang Shaohui; Liu Sujuan

    2013-01-01

    Most of the Radio Frequency IDentification (RFID) authentication protocols,proposed to preserve security and privacy,are analysed to show that they can not provide security against some passive or active attacks.In this paper,the security of two matrix-based protocols,proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al.(RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard,are investigated.Using the linear relationship of multiplication of matrix and vector,we point out that both protocols can not provide scalability,and they are vulnerable to passive impersonation attack.In addition,both protocols are totally insecure if the adversary can compromise one tag to extract the secrets.A modified lightweight matrix-based authentication protocol is presented,which can resist mainly common attacks on an RFID authentication system including eavesdropping,relay attack,desynchronization attack,impersonation attack and tag tracking attack.The new protocol also has the desirable scalability property and can keep secure under compromising attack.

  16. Forests and the Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Goetze, D.C. [Environment Canada, Ottawa, ON (Canada)

    2001-07-01

    This PowerPoint presentation referred to carbon sinks in the Clean Development Mechanism (CDM) as specified in the Kyoto Protocol. Policy issues, opportunities and challenges were discussed. The slides summarized the environmental potential of carbon sink projects, the current status of carbon sinks in the CDM, and strategies towards a CDM carbon sink. The Nyakach, Kenya biomass enhancement case study was presented, along with the Colombian Andean biodiversity corridor reforestation project. Potential sink projects were described as those resulting in direct reduction of emissions. These include reducing deforestation by protecting forests from being converted to agriculture, by protecting forests from the impacts of human activities, and by substituting biomass energy sources for fossil fuels. Indirect reduction of emissions via sequestration involves restoring natural forests in deforested or degraded areas and expanding agroforests and plantations. The co-benefits of carbon sink projects are biodiversity and socio-economic benefits. Under the Bonn Agreement, afforestation and reforestation projects are eligible under the CDM. Credits are limited to 1 per cent of Annex 1 party's base year emissions per year. The important elements of the Marrakech Accord are the prompt start of the CDM, as well as modalities and procedures.

  17. Treatment protocols for cervical cancer

    Directory of Open Access Journals (Sweden)

    Vujkov Tamara

    2002-01-01

    Full Text Available Introduction Cervical cancer is the second most common cancer in women worldwide and the second cause of cancer death among women. About 95% (90% in developed countries of invasive carcinomas are of sqamous types, and 5% (10% in developed countries are adenocarcinomas. FIGO classification of cervical carcinomas, based on clinical staging and prognostic factor dictate therapeutic procedures and help in designing treatment protocols. Therapeutic modalities Surgical therapy includes conization, radical hysterectomy with pelvic lymphadenectomy and palliative operation urinary diversion and colostomy. Radiotherapy, brachytherapy and teletherapy are most recently combined with chemotherapy as concurrent chemoradiation. Discussion and conclusion No change in therapeutic modalities will ever decrease mortality rate of cervical carcinoma as much as education, prevention and early screening. The 5-year survival for locally advanced disease has not improved during the last 40 years as a result of failure to deliver therapy to the paraaortic region. Paraaortic lymph nodes should be evaluated before therapy planning by different imaging procedures, or more exactly by surgical staging: laparoscopy or laparotomy. Radical operations of cervical carcinoma should be performed by experienced surgeons, educated for this type of operation, with sufficient number of cases.

  18. Additives in swine nutrition

    OpenAIRE

    Sinovec Zlatan J.; Jokić Živan; Šefer Dragan

    2002-01-01

    To attain better feed utilization, longer preservation, easier manipultion and higher production and better quality of food of animal orgin as the final goal, besides raw materials, feed mixes contain numerous pronutrients (additives), added to perform different effects, in a narrower sense, the term pronutrient implies heterogenous substances, which have no diverse effects and have to be efficient in the manner of use. Basically, all pronutrients have to reach the goal of keeping optimal ani...

  19. Quantum Communication Complexity of Quantum Authentication Protocols

    CERN Document Server

    Guedes, Elloá B

    2011-01-01

    In order to perform Quantum Cryptography procedures it is often essencial to ensure that the parties of the communication are authentic. Such task is accomplished by quantum authentication protocols which are distributed algorithms based on the intrinsic properties of Quantum Mechanics. The choice of an authentication protocol must consider that quantum states are very delicate and that the channel is subject to eavesdropping. However, even in face of the various existing definitions of quantum authentication protocols in the literature, little is known about them in this perspective, and this lack of knowledge may unfavor comparisons and wise choices. In the attempt to overcome this limitation, in the present work we aim at showing an approach to evaluate quantum authentication protocols based on the determination of their quantum communication complexity. Based on our investigation, no similar methods to analyze quantum authentication protocols were found in the literature. Pursuing this further, our approa...

  20. Security Weaknesses in Arbitrated Quantum Signature Protocols

    Science.gov (United States)

    Liu, Feng; Zhang, Kejia; Cao, Tianqing

    2014-01-01

    Arbitrated quantum signature (AQS) is a cryptographic scenario in which the sender (signer), Alice, generates the signature of a message and then a receiver (verifier), Bob, can verify the signature with the help of a trusted arbitrator, Trent. In this paper, we point out there exist some security weaknesses in two AQS protocols. Our analysis shows Alice can successfully disavow any of her signatures by a simple attack in the first protocol. Furthermore, we study the security weaknesses of the second protocol from the aspects of forgery and disavowal. Some potential improvements of this kind of protocols are given. We also design a new method to authenticate a signature or a message, which makes AQS protocols immune to Alice's disavowal attack and Bob's forgery attack effectively.

  1. Cryptanalysis of the arbitrated quantum signature protocols

    Science.gov (United States)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-08-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  2. Cryptanalysis of the arbitrated quantum signature protocols

    CERN Document Server

    Gao, Fei; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-01-01

    As a new model for signing quantum message, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver Bob can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender Alice can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics in future study on AQS protocols.

  3. VULNERABILITIES OF THE SSL/TLS PROTOCOL

    Directory of Open Access Journals (Sweden)

    Jelena Ćurguz

    2016-05-01

    Full Text Available This paper analyzes vulnerabilities of the SSL/TLS Handshake protocol, which is responsible for authentication of the parties in the communication and negotiation of security parameters that will be used to protect confidentiality and integrity of the data. It will be analyzed the attacks against the implementation of Handshake protocol, as well as the attacks against the other elements necessary to SSL/TLS protocol to discover security flaws that were exploited, modes of attack, the potential consequences, but also studying methods of defense. All versions of the protocol are going to be the subject of the research but emphasis will be placed on the critical attack that the most endanger the safety of data. The goal of the research is to point out the danger of existence of at least vulnerability in the SSL/TLS protocol, which can be exploited and endanger the safety of the data that should be protected.

  4. Multicast Protocol for Uni-Directional Networks

    Institute of Scientific and Technical Information of China (English)

    黄皓; 陈贵海; 谢立; 孙钟秀

    2000-01-01

    A very inexpensive receive-only satellite receiver can receive high bandwidth traffic from a feeder. Therefore the connection between the feeder and the receiver is uni-directional. The existing routing protocols, such as Link-State and Distance-Vector, are designed on the premise that any links are bidirectional and they cannot handle the uni-directional links. In this paper, a dynamic multicast routing protocol is proposed, which can handle uni-directional networks. This protocol can also adapt to the dynamic change of the topology of the network and has good scalability. A formal description of the protocol by Petri net is given. Liveness,deadlock free and other properties of the protocol are proved.

  5. A polymerase chain reaction protocol for the detection of various geographical isolates of white spot virus.

    Science.gov (United States)

    Tapay, L M; Nadala, E C; Loh, P C

    1999-09-01

    Polymerase chain reaction (PCR) primers were designed based on the sequence of a cloned fragment of the white spot virus (WSV) genome and were used to detect at least four geographic isolates of WSV from both experimentally- and naturally-infected shrimp. In addition to high specificity, the one-step and two-step PCR protocols were determined to have sensitivities of 10-100 pg and 100 femtograms respectively. The two-step PCR protocol is recommended as a very sensitive and specific alternative protocol to Western blot assay for the detection of WSV.

  6. Two Modifications on IKE Protocol with Pre-shared Key Authentication

    Institute of Scientific and Technical Information of China (English)

    刘东喜; 张连华; 白英彩

    2003-01-01

    This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder generates the computation-intensive Diffie-Hellman public value. The second modification can improve its efficiency when the attack on messages occurs because it can detect the attack quickly by replacing the centralized authentication in origical IKE protocol with immediate authentication. In addition, the two modifications can be integrated into one protocol compactly.

  7. Exploring Shared Memory Protocols in FLASH

    Energy Technology Data Exchange (ETDEWEB)

    Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

    2007-04-01

    improvements of 18% on average using the non-coherent version. We also present data on the SpecOMP benchmarks, showing that the protocols have a modest overhead of less than 3% in applications where the alternative mechanisms are not needed. In addition to the selective coherence studies on the FLASH machine, in the last six months of this project ISI performed research on compiler technology for the transactional memory (TM) programming model being developed at Stanford. As part of this research ISI developed a compiler that recognizes transactional memory “pragmas” and automatically generates parallel code for the TM programming model

  8. Transfer learning improves supervised image segmentation across imaging protocols

    DEFF Research Database (Denmark)

    van Opbroek, Annegreet; Ikram, M. Arfan; Vernooij, Meike W.;

    2015-01-01

    The variation between images obtained with different scanners or different imaging protocols presents a major challenge in automatic segmentation of biomedical images. This variation especially hampers the application of otherwise successful supervised-learning techniques which, in order to perform...... well, often require a large amount of labeled training data that is exactly representative of the target data. We therefore propose to use transfer learning for image segmentation. Transfer-learning techniques can cope with differences in distributions between training and target data, and therefore...... may improve performance over supervised learning for segmentation across scanners and scan protocols. We present four transfer classifiers that can train a classification scheme with only a small amount of representative training data, in addition to a larger amount of other training data...

  9. An Eco-friendly, Scaled-down Gram Stain Protocol

    Directory of Open Access Journals (Sweden)

    Ruth A. Gyure

    2010-04-01

    Full Text Available Currently, flushing large volumes of Gram stain reagents into sanitary sewage systems is no longer acceptable. These chemical wastes are highly regulated and must be collected, labeled, and disposed of in a responsible manner, usually by paying a commercial service to remove them to an authorized off-site facility. Such services are costly and, as expected, costs are proportional to volume of collected waste. This “old” method of Gram staining, even if effluent is collected, generates a high volume of liquid waste which is unnecessarily diluted with additional large volumes of water from the rinsing steps. The purpose of using this scaled-down and eco-friendly protocol is to dramatically reduce the amount of liquid waste produced without sacrificing quality of results. This protocol is flexible, practical, and easy to implement. It does not require students to work at a bench sink, reduces user cost, and lowers environmental impact overall.

  10. H1 photonic crystal cavitites for hybrid quantum information protocols

    CERN Document Server

    Hagemeier, Jenna; Truong, Tuan-Anh; Kim, Hyochul; Beirne, Gareth J; Bakker, Morten; van Exter, Martin P; Luo, Yunqiu; Petroff, Pierre; Bouwmeester, Dirk

    2012-01-01

    Hybrid quantum information protocols are based on local qubits, such as trapped atoms, NV centers, and quantum dots, coupled to photons. The coupling is achieved through optical cavities. Here we demonstrate far-field optimized H1 photonic crystal membrane cavities combined with an additional back reflection mirror below the membrane that meet the optical requirements for implementing hybrid quantum information protocols. Using numerical optimization we find that 80% of the light can be radiated within an objective numerical aperture of 0.8, and the coupling to a single-mode fiber can be as high as 92%. We experimentally prove the unique external mode matching properties by resonant reflection spectroscopy with a cavity mode visibility above 50%.

  11. H1 photonic crystal cavities for hybrid quantum information protocols

    Science.gov (United States)

    Hagemeier, Jenna; Bonato, Cristian; Truong, Tuan-Anh; Kim, Hyochul; Beirne, Gareth J.; Bakker, Morten; van Exter, Martin P.; Luo, Yunqiu; Petroff, Pierre; Bouwmeester, Dirk

    2012-10-01

    Hybrid quantum information protocols are based on local qubits, such as trapped atoms, NV centers, and quantum dots, coupled to photons. The coupling is achieved through optical cavities. Here we demonstrate far-field optimized H1 photonic crystal membrane cavities combined with an additional back reflection mirror below the membrane that meet the optical requirements for implementing hybrid quantum information protocols. Using numerical optimization we find that 80% of the light can be radiated within an objective numerical aperture of 0.8, and the coupling to a single-mode fiber can be as high as 92%. We experimentally prove the unique external mode matching properties by resonant reflection spectroscopy with a cavity mode visibility above 50%.

  12. A Nonlinear Consensus Protocol of Multiagent Systems Considering Measuring Errors

    Directory of Open Access Journals (Sweden)

    Xiaochu Wang

    2013-01-01

    Full Text Available In order to avoid a potential waste of energy during consensus controls in the case where there exist measurement uncertainties, a nonlinear protocol is proposed for multiagent systems under a fixed connected undirected communication topology and extended to both the cases with full and partial access a reference. Distributed estimators are utilized to help all agents agree on the understandings of the reference, even though there may be some agents which cannot access to the reference directly. An additional condition is also considered, where self-known configuration offsets are desired. Theoretical analyses of stability are given. Finally, simulations are performed, and results show that the proposed protocols can lead agents to achieve loose consensus and work effectively with less energy cost to keep the formation, which have illustrated the theoretical results.

  13. Some Protocols For Optical-Fiber Digital Communications

    Science.gov (United States)

    Yeh, Cavour; Gerla, Mario

    1989-01-01

    One works best in heavy traffic, another, in light traffic. Three protocols proposed for digital communications among stations connected by passive taps to pair of uni-directional optical-fiber buses. Mediate round-robin, bounded-delay access to buses by all stations and particularly suited to fast transmission. Partly because transmission medium passive (no relay stations) and partly because protocols distribute control of network among all stations with provision for addition and deletion of stations (no control stations), communication network able to resist and recover from failures. Implicit token propagates in one direction on one bus and in opposite direction on other bus, minimizing interval of silence between end of one round and beginning of next.

  14. Secure direct bidirectional communication protocol using the Einstein-Podolsky-Rosen pair block

    OpenAIRE

    Zhang, Z. J.; Man, Z. X.

    2004-01-01

    In light of Deng-Long-Liu's two-step secret direct communication protocol using the Einstein-Podolsky-Rosen pair block [Phys. Rev. A {\\bf 68}, 042317 (2003)], by introducing additional local operations for encoding, we propose a brand-new secure direct communication protocol, in which two legitimate users can simultaneously transmit their different secret messages to each other in a set of quantum communication device.

  15. Additives in swine nutrition

    Directory of Open Access Journals (Sweden)

    Sinovec Zlatan J.

    2002-01-01

    Full Text Available To attain better feed utilization, longer preservation, easier manipultion and higher production and better quality of food of animal orgin as the final goal, besides raw materials, feed mixes contain numerous pronutrients (additives, added to perform different effects, in a narrower sense, the term pronutrient implies heterogenous substances, which have no diverse effects and have to be efficient in the manner of use. Basically, all pronutrients have to reach the goal of keeping optimal animal health status and to increase production of food of animal origin without adverse and negative effects. The development of biotechnology had a great part in the appearance of natural alternatives which are able to fulfil and satisfy the high demands of highly productive animals, as well as those of the consumer lobby and environmental protection movements. Growth promoters based upon physiological mechanisms and production potential of the animal have an unquestionable adventage, not only because of the lack of residues in food of animal origin; but also because of their ecological safety and decrease of envirnomental pollution by undigested materials. Demand continues to grow for "all natural", non-pharmaceutical feed additives with growth enhancing effects in food animals. Special attention is paid to minerals (anorganic and organic sources, growth stimulators (antibiotics, probiotics prebiotics, substances for better feed utilization (enzymes, acidifers adsorbents.

  16. A fully efficient secure quantum cryptography protocol

    CERN Document Server

    Xiang Bin Wang

    2001-01-01

    Since Bennett and Brassard suggested their quantum key distribution protocol(BB84 protocol) in 1984, the subject has been extensively studied both theoretically and experimentally. The protocol allows two remote parties Alice and Bob to create and share a secret key using a quantum channel and public authenticated communications. The quantum key created in this way is in principle secure because eavesdroppers have no way to tap the quantum channel without disturb it. In the protocol, two level quantum bits are measured in two basis, $X$ and $Z$ randomly by Bob. So at least half of the measurement results will be discarded because Bob has a half probability taking the measurement in a wrong basis. On the other hand, the security is not the maximum in BB84 protocol. To increase the security, one may straightforwardly increase the number of basis used in the protocol. For example, six state protocol was proposed recently for two level system. However, in this way, it seems to be the case that the higher the secu...

  17. Efficient Privacy Preserving Protocols for Similarity Join

    Directory of Open Access Journals (Sweden)

    Bilal Hawashin

    2012-04-01

    Full Text Available During the similarity join process, one or more sources may not allow sharing its data with other sources. In this case, a privacy preserving similarity join is required. We showed in our previous work [4] that using long attributes, such as paper abstracts, movie summaries, product descriptions, and user feedbacks, could improve the similarity join accuracy using supervised learning. However, the existing secure protocols for similarity join methods can not be used to join sources using these long attributes. Moreover, the majority of the existing privacy‐preserving protocols do not consider the semantic similarities during the similarity join process. In this paper, we introduce a secure efficient protocol to semantically join sources when the join attributes are long attributes. We provide two secure protocols for both scenarios when a training set exists and when there is no available training set. Furthermore, we introduced the multi‐label supervised secure protocol and the expandable supervised secure protocol. Results show that our protocols can efficiently join sources using the long attributes by considering the semantic relationships among the long string values. Therefore, it improves the overall secure similarity join performance.

  18. Snakebite management in Iran: Devising a protocol

    Directory of Open Access Journals (Sweden)

    Seyed Mostafa Monzavi

    2014-01-01

    Full Text Available Background: Snakebite in Iran has been a health concern. However, management of snakebite is not standardized and varies from center to center. This study is aimed at devising an evidence-based comprehensive protocol for snakebite management in Iran, to reduce unnecessary variations in practice. Materials and Methods: A narrative search in electronic databases was performed. Fifty peer-reviewed articles, guidelines, and textbooks were reviewed and practical details were extracted. Our currently used protocol in the Mashhad Toxicology Center was supplemented with this information. Consequently an improved wide-range protocol was developed. The protocol was then discussed and amended within a focus group comprised of medical toxicologists and internal medicine specialists. The amended version was finally discussed with expert physicians specialized in different areas of medicine, to be optimized by supplementing other specific considerations. Results: During a one-year process, the protocol was finalized. The final version of the protocol, which was designed in six steps, comprised of three components: A schematic algorithm, a severity grading scale, and instructions for supportive and adjunctive treatments. The algorithm pertains to both Viperidae and Elapidae snakebite envenomations and consists of a planned course of action and dosing of antivenom, based on the severity of the envenomation. Conclusion: Snakebite envenomation is a clinical toxicologic emergency, which needs to be treated in a timely and organized manner. Hence, a multi-aspect protocol was designed to improve the clinical outcomes, reduce unnecessary administration of antivenom, and help physicians make more proper clinical judgments.

  19. Energy Efficient Routing Protocol for MANET

    Directory of Open Access Journals (Sweden)

    S.Gopinath

    2012-03-01

    Full Text Available In recent years, many energy-efficient routing protocols have been proposed. However, very little efforts have been taken in studying the energy consumption of individual node, overhead and route maintaining issues. While not considering the design of energy efficient routing protocol, it may perform very worst than the normal routing protocol. Here, we have proposed On Demand Based Energy Efficient Routing Protocol (ODBEERP. The main aim of proposed protocol is to discover the minimum power-limitation route. The power limitation of a route is decided by the node which has the minimum energy in that route. So compared with the minimum node energy in any other route, the minimum node energy in the minimum power-limitation route has more energy. We have also proposed a more accurate analysis to track the energy consumptions due to various factors, and improve the performance during path discovery and in mobility scenarios. The proposed protocol is evaluated with object oriented discrete event simulator environment. Simulation results shows that the ODBEERP achieves good throughput, less delay, high packet delivery ratio and good energy efficiency than the existing protocol PEER.

  20. Additive Pattern Database Heuristics

    CERN Document Server

    Felner, A; Korf, R E; 10.1613/jair.1480

    2011-01-01

    We explore a method for computing admissible heuristic evaluation functions for search problems. It utilizes pattern databases, which are precomputed tables of the exact cost of solving various subproblems of an existing problem. Unlike standard pattern database heuristics, however, we partition our problems into disjoint subproblems, so that the costs of solving the different subproblems can be added together without overestimating the cost of solving the original problem. Previously, we showed how to statically partition the sliding-tile puzzles into disjoint groups of tiles to compute an admissible heuristic, using the same partition for each state and problem instance. Here we extend the method and show that it applies to other domains as well. We also present another method for additive heuristics which we call dynamically partitioned pattern databases. Here we partition the problem into disjoint subproblems for each state of the search dynamically. We discuss the pros and cons of each of these methods a...

  1. Perspectives on Additive Manufacturing

    Science.gov (United States)

    Bourell, David L.

    2016-07-01

    Additive manufacturing (AM) has skyrocketed in visibility commercially and in the public sector. This article describes the development of this field from early layered manufacturing approaches of photosculpture, topography, and material deposition. Certain precursors to modern AM processes are also briefly described. The growth of the field over the last 30 years is presented. Included is the standard delineation of AM technologies into seven broad categories. The economics of AM part generation is considered, and the impacts of the economics on application sectors are described. On the basis of current trends, the future outlook will include a convergence of AM fabricators, mass-produced AM fabricators, enabling of topology optimization designs, and specialization in the AM legal arena. Long-term developments with huge impact are organ printing and volume-based printing.

  2. Sarks as additional fermions

    Science.gov (United States)

    Agrawal, Jyoti; Frampton, Paul H.; Jack Ng, Y.; Nishino, Hitoshi; Yasuda, Osamu

    1991-03-01

    An extension of the standard model is proposed. The gauge group is SU(2) X ⊗ SU(3) C ⊗ SU(2) S ⊗ U(1) Q, where all gauge symmetries are unbroken. The colour and electric charge are combined with SU(2) S which becomes strongly coupled at approximately 500 GeV and binds preons to form fermionic and vector bound states. The usual quarks and leptons are singlets under SU(2) X but additional fermions, called sarks. transform under it and the electroweak group. The present model explains why no more than three light quark-lepton families can exist. Neutral sark baryons, called narks, are candidates for the cosmological dark matter having the characteristics designed for WIMPS. Further phenomenological implications of sarks are analyzed i including electron-positron annihilation. Z 0 decay, flavor-changing neutral currents. baryon-number non-conservation, sarkonium and the neutron electric dipole moment.

  3. ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    Amit Rana

    2012-09-01

    Full Text Available The Internet Engineering Task Force (IETF has proposednew protocols for highly secured wireless networking. Thepurpose of this paper is to implement one such proposedsecurity protocol - PEAP (Protected ExtensibleAuthentication Protocol [1]. PEAP was jointly developedby Microsoft, Cisco and RSA security. The protocolimplementation is done on the server end of a Client/Servernetwork model on a RADIUS server (RemoteAuthentication Dial-in User Service. The proposedprotocol - PEAP provides for Client identity protection andkey generation thus preventing unauthorized user accessand protecting or encrypting the data against maliciousactivities.

  4. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  5. Demand Priority Protocol Simulation and Evaluation

    Institute of Scientific and Technical Information of China (English)

    ZHAN Yongzhao; SONG Shunlin; XIE Li

    1999-01-01

    A new network protocol (DemandPriority Protocol) environment can provide more satisfying service fordifferent urgent transmission requests. In this paper, in order toprovide guidance for the selection of environment of multimedia datatransmission in Computer Supported Cooperative Work better, anobject-oriented protocol specification language based on C++ is used todesign a virtual environment of multiworkstation of computer cooperativework and to simulate exe-cution of demand priority network protocoland then the performances of various transmission requests are analyzed.Finally, an evaluation of the demand priority LAN is given.

  6. The Russian Federation and the Kyoto Protocol

    OpenAIRE

    Douma, Wybe; Ratsiborinskaya, Daria

    2007-01-01

    textabstractThis book brings together the results of two conferences: 'The Kyoto Protocol and beyond: A legal perspective', organised by the University of Siena on 10-11 June 2006, and 'Tackling Climate Change: An appraisal of the Kyoto Protocol and options for the future', held at the T.M.C. Asser Institute in The Hague on 30-31 March 2007. These conferences focused on the legal aspects of the Kyoto Protocol implementation and the post-2012 regime. Experts in European and international envir...

  7. Security-Preserving Asymmetric Protocol Encapsulation

    OpenAIRE

    Vaudenay, Serge; Phan, Raphael C-W

    2007-01-01

    Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different roles, and for which there is a need for two-way linkability between queries and responses within the protocol. We are motivated by the observation that though results exist in other related contexts, no provably secure scheme has been applied to the setting of client-server protocols, which differ from conventional co...

  8. Performance evaluation of TCP over ABT protocols

    Science.gov (United States)

    Ata, Shingo; Murata, Masayuki; Miyahara, Hideo

    1998-10-01

    ABT is promising for effectively transferring a highly bursty data traffic in ATM networks. Most of past studies focused on the data transfer capability of ABT within the ATM layer. In actual, however, we need to consider the upper layer transport protocol since the transport layer protocol also supports a network congestion control mechanism. One such example is TCP, which is now widely used in the Internet. In this paper, we evaluate the performance of TCP over ABT protocols. Simulation results show that the retransmission mechanism of ABT can effectively overlay the TCP congestion control mechanism so that TCP operates in a stable fashion and works well only as an error recovery mechanism.

  9. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  10. Analysis of Enhanced Associativity Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Said A. Shaar

    2006-01-01

    Full Text Available This study introduces an analysis to the performance of the Enhanced Associativity Based Routing protocol (EABR based on two factors; Operation complexity (OC and Communication Complexity (CC. OC can be defined as the number of steps required in performing a protocol operation, while CC can be defined as the number of messages exchanged in performing a protocol operation[1]. The values represent the worst-case analysis. The EABR has been analyzed based on CC and OC and the results have been compared with another routing technique called ABR. The results have shown that EABR can perform better than ABR in many circumstances during the route reconstruction.

  11. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  12. Comparison of on Demand Routing Protocols

    Directory of Open Access Journals (Sweden)

    Bharat Bhushan

    2013-02-01

    Full Text Available A routing protocol is used to facilitate communication in ad hoc network. The primary goal of such a routing protocol is to provide an efficient and reliable path between a pair of nodes. The routing protocols for ad hoc network can be categorized into three categories: table driven, on demand and hybrid routing. The table driven and hybrid routing strategies require periodic exchange of hello messages between nodes of the ad hoc network and thus have high processing and bandwidth requirements. On the other hand on demand routing strategy creates routes when required and hence is very much suitable for ad hoc network. This paper therefore examines the performance of three on demand routing protocols at application layer using QualNet-5.01 simulator.

  13. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  14. Standardized North American Marsh Bird Monitoring Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document describes monitoring protocols for marshbirds in North America. Monitoring parameters, field procedures, survey methods, timing of surveys, recording...

  15. Multicast Routing Protocols in Adhoc Mobile networks

    Directory of Open Access Journals (Sweden)

    S.Nagaprasad,

    2010-11-01

    Full Text Available The majority of applications are in areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions where participants share information dynamically using their mobile devices. Well established routing protocols do exist to offer efficient multicasting service in conventional wired networks. These protocols, having been designed for fixed networks, may fails to keep up with node movements and frequent topology changes in a MANET. Therefore, adapting existing wired multicast protocols as such to a MANET, which completely lacks infrastructure, appear less promising. Providing efficient multicasting over MANET faces many challenges, includes scalability,quality of service, reliable service, security, Address configuration, Applications for multicast over MANET. The existing multicast routing protocol do not addresses these issues effectively over Mobile Adhoc Networks (MANET.

  16. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  17. Protocol to Exploit Waiting Resources for UASNs.

    Science.gov (United States)

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  18. National Wildlife Refuge System Survey Protocol Template

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This template was developed for drafting National Wildlife Refuge System (NWRS) Survey Protocols. The template is arranged in the same order as the eight basic...

  19. ARC Code TI: Geometry Manipulation Protocol (GMP)

    Data.gov (United States)

    National Aeronautics and Space Administration — The Geometry Manipulation Protocol (GMP) is a library which serializes datatypes between XML and ANSI C data structures to support CFD applications. This library...

  20. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  1. Protocol to Exploit Waiting Resources for UASNs.

    Science.gov (United States)

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols. PMID:27005624

  2. Identity-based authentication protocol for grid

    Institute of Scientific and Technical Information of China (English)

    Li Hon; Sun Shixin; Yang Homiao

    2008-01-01

    Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol(SAP).The authentication process is very complicated,and therefore,the grid user is in a heavily loaded point both in computation and in communication.Based on identity-based architecture for grid(IBAG)and corre-sponding encryption and signature schemes,an identity-based authentication protocol for grid is proposed.Being certificate-free,the authentication protocol aligns well with the demands of grid computing.Through simulation testing,it is seen that the authentication protocol is more lightweight and efficient than SAP,especially the more lightweight user side.This contributes to the larger grid scalability.

  3. How To Develop Survey Protocols: A Handbook

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This handbook provides a standard and guidance for developing and reviewing survey protocols used in the National Wildlife Refuge System. In the handbook, survey...

  4. Rethinking low extra delay background transport protocols

    CERN Document Server

    Carofiglio, Giovanna; Rossi, Dario; Testa, Claudio; Valenti, Silvio

    2010-01-01

    BitTorrent has recently introduced LEDBAT, a novel application-layer congestion control protocol for data exchange. The protocol design starts from the assumption that network bottlenecks are at the access of the network, and that thus user traffic competes creating self-inducing congestion. To relieve from this phenomenon, LEDBAT is designed to quickly infer that self-induced congestion is approaching (by detecting relative changes of the one-way delay in the transmission path), and to react by reducing the sending rate prior that congestion occurs. Prior work has however shown LEDBAT to be affected by a latecomer advantage, where newly arriving connections can starve already existing flows. In this work, we propose modifications to the congestion window update mechanism of the LEDBAT protocol that aim at solving this issue, guaranteeing thus intra-protocol fairness and efficiency. Closed-form expressions for the stationary throughput and queue occupancy are provided via a fluid model, whose accuracy is conf...

  5. Reparable Key Distribution Protocols for Internet Environments

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    It has claimed that any practical way to achieve perfect reparability for key distribution protocol (KDP) could only be futile. Fortunately, this paper presents reparable KDPs for internet environments with the use of the concept of timestamps.

  6. Secure Key Management Protocol in WIMAX

    OpenAIRE

    Noudjoud Kahya; Nacira Ghoualmi; Pascal Lafourcade

    2012-01-01

    The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16), is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM) protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS) to Subscriber Station (SS). In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. ...

  7. OAuth protocol for CERN Web Applications

    OpenAIRE

    Kleszcz, Emil; Rodriguez Fernandez, Luis; Marescaux, Nicolas Bernard

    2016-01-01

    Project Specification The CERN Authentication service has recently increased his offer of SSO protocols/frameworks with OAuth2 standard. The purpose of the work is to explain the need for an authorization standard and explain how does OAuth2 protocol addresses our requirements. OAuth is an open standard for authorization which provides a secure access to server resources that belongs to a user. As a wide known and relatively new standard (2012) is used by big players in the industry a...

  8. The obscure future of the Kyoto protocol

    OpenAIRE

    Tsayem Demaze, Moise

    2013-01-01

    Since it came into effect in 2005 followed by its first period of application from 2008 to 2012, the Kyoto protocol has been subject to debates and international negotiations about its post-2012 future. Many grey areas persist, even though the Durban conference, held in December 2011, and the Doha conference, held in December 2012, ratified the principle of a second period of application of the protocol and started negotiations for a new international treaty supposed to come into effect in 2020.

  9. The Kyoto Protocol : a Review and Perspectives

    OpenAIRE

    Böhringer, Christoph

    2003-01-01

    International concern about climate change has led to the Kyoto Protocol, negotiated in 1997, which contains legally binding emission targets for industrialized countries to be achieved during the commitment period 2008-2012. While proponents of the Protocol celebrate it as a breakthrough in international climate policy, opponents criticize that its approach, namely setting targets and timetables for emission reductions, is seriously flawed. This paper provides a critical assessment of the Pr...

  10. Mutual Authentication Protocols for RFID Systems

    Institute of Scientific and Technical Information of China (English)

    Ashrar A. Omer; Johnson P. Thomas; Ling Zhu

    2008-01-01

    With the availability of low-cost radio frequency identification (RFID) tags, security becomes an increasing concern.However, such tags do not permit complex eryptographic functions due to their computational, communications, and storage limitations.In this paper, we investigate the security issues and requirements of RFID systems, and propose ultra-light weight and light weight protocols for low-cost RFID tags. The proposed protocols has been applied to a supply chain management system.

  11. Quantum Key Distribution Protocol with User Authentication

    CERN Document Server

    Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

    2005-01-01

    We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

  12. Protocol for communications in potentially noisy environments

    Energy Technology Data Exchange (ETDEWEB)

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  13. Voice over Internet Protocol (VOIP): Future Potential

    OpenAIRE

    Ms. Deepti

    2014-01-01

    VoIP (voice over IP) delivers standard voice over telephone services over Internet Protocol (IP). VoIP is the technology of digitizing sound, compressing it, breaking it up into data packets, and sending it over an IP (internet protocol) network where it is reassembled, decompressed, and converted back into an analog wave form. Gateways are the key component required to facilitate IP Telephony. A gateway is used to bridge the traditional circuit switched PSTN with the packet switched Internet...

  14. Compiling symbolic attacks to protocol implementation tests

    OpenAIRE

    Michael Rusinowitch; Ghazi Maatoug; Hatem Ghabri

    2013-01-01

    Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically g...

  15. Trust Authentication Protocol on the Web

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

  16. Dose protocols of acetylcholine test in Chinese

    Institute of Scientific and Technical Information of China (English)

    向定成; 龚志华; 何建新; 洪长江; 邱建; 马骏

    2004-01-01

    @@ Acetylcholine test has been widely used clinically in several countries as a practical test provoking coronary artery spasm.1-3 Although it has also been launched recently in a few hospitals in China, the dose protocol for acetylcholine test used in these hospitals were from abroad.4,5 This study was aimed at developing a dose protocol for acetylcholine test suitable for Chinese people.

  17. Analyzing the exhaustiveness of the synapse protocol

    OpenAIRE

    Marinkovic, Bojan; Ciancaglini, Vincenzo; Ognjanovic, Zoran; Glavan, Paola; Liquori, Luigi; Maksimovic, Petar

    2015-01-01

    International audience The Synapse protocol is a scalable protocol designed for information retrieval over inter-connected heterogeneous overlay networks. In this paper, we give a formal description of Synapse using the Abstract State Machines framework. The formal description pertains to Synapse actions that manipulate distributed keys. Based on this formal description, we present results concerning the expected exhaustiveness for a number of scenarios and systems maintained by the Synaps...

  18. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.;

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  19. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  20. Variable TDMA MAC Protocol For WDM EPON

    Institute of Scientific and Technical Information of China (English)

    Minsuk; Jung; Yongseok; Chang; Jonghoon; Eom; Sungho; Kim

    2003-01-01

    A MAC(Media Access Control) protocol, one of the most important technologies for an EPON(Ethernet Passive Optical Network), contains a scheduling algorithm to avoid collisions in shared links and assigns an effective bandwidth when ONUs (Optical Network Units) transfer signals upward. The current paper proposes a MAC Protocol that operates a TDMA(Time method with a variable slot assignment to overcome short of bandwidth using by the number of n wavelength., the next generation access network. To verify ...

  1. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  2. The impacts of electricity dispatch protocols on the emission reductions due to wind power and carbon tax.

    Science.gov (United States)

    Yu, Yang; Rajagopal, Ram

    2015-02-17

    Two dispatch protocols have been adopted by electricity markets to deal with the uncertainty of wind power but the effects of the selection between the dispatch protocols have not been comprehensively analyzed. We establish a framework to compare the impacts of adopting different dispatch protocols on the efficacy of using wind power and implementing a carbon tax to reduce emissions. We suggest that a market has high potential to achieve greater emission reduction by adopting the stochastic dispatch protocol instead of the static protocol when the wind energy in the market is highly uncertain or the market has enough adjustable generators, such as gas-fired combustion generators. Furthermore, the carbon-tax policy is more cost-efficient for reducing CO2 emission when the market operates according to the stochastic protocol rather than the static protocol. An empirical study, which is calibrated according to the data from the Electric Reliability Council of Texas market, confirms that using wind energy in the Texas market results in a 12% CO2 emission reduction when the market uses the stochastic dispatch protocol instead of the 8% emission reduction associated with the static protocol. In addition, if a 6$/ton carbon tax is implemented in the Texas market operated according to the stochastic protocol, the CO2 emission is similar to the emission level from the same market with a 16$/ton carbon tax operated according to the static protocol. Correspondingly, the 16$/ton carbon tax associated with the static protocol costs 42.6% more than the 6$/ton carbon tax associated with the stochastic protocol.

  3. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  4. Network-topology-adaptive quantum conference protocols

    Institute of Scientific and Technical Information of China (English)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication,quantum multiparty conference has made multiparty secret communication possible.Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology.However,the topology of the quantum network significantly affects the communication efficiency,e.g.,parallel transmission in a channel with limited bandwidth.We have proposed two distinctive protocols,which work in two basic network topologies with efficiency higher than the existing ones.We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping.Another protocol,based on quantum multicasting with quantum data compression,which can improve the efficiency of the network,works in the star-like network.The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption.In general,the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols.

  5. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  6. A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Nenad Kojić

    2012-06-01

    Full Text Available The networking infrastructure of wireless mesh networks (WMNs is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs. This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission. The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.

  7. A neural networks-based hybrid routing protocol for wireless mesh networks.

    Science.gov (United States)

    Kojić, Nenad; Reljin, Irini; Reljin, Branimir

    2012-01-01

    The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance. PMID:22969360

  8. Dynamic vs. fixed bag filling: impact on cardiac output rebreathing protocol.

    Science.gov (United States)

    Zavorsky, Gerald S; Beck, Kenneth C; Cass, Lauren M; Artal, Raul; Wagner, Peter D

    2010-04-15

    The purpose of this study was to compare the repeatability (2.77 multiplied by the within-subject SD)between two different rebreathing protocols on cardiac output ( ˙Q ), pulmonary diffusing capacity for carbon monoxide (DLCO) and nitric oxide (DLNO), and pulmonary capillary blood volume (Vc). This study compared two bag volume protocols [Fixed Bag Volume (FBV) = bag volume fixed at 60% of forced vital capacity; Dynamic Bag Volume (DBV) = bag volume matched to tidal volume at each stage of exercise].Ten females (age = 27±8 yrs; ˙VO2, (peak)=2.5±0.6 L/min had measurements at rest (12%), 52%, 88%, and 100% of ˙VO2, (peak) on two study days. Neither the slope nor intercept of ˙Q vs. ˙VO2 were different between either bag volume protocols. The slope of DLCO vs. ˙Q was the same but the intercept was higher for the FBV protocol. The bag volume affected the slope and the intercept between DLNO vs. ˙Q (p DLNO (p ≤ 0.06). Measurement error was lower for Vc when using the FBV protocol (p = 0.02). Also, the pattern of bag volume used during rebreathing maneuvers affected the relation between DLNO vs. ˙Q more than it affected DLCO vs. ˙Q , or Vc vs. ˙Q. Additionally, the FBV protocol provided less measurement error for Vc compared to the DBV protocol [corrected].

  9. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  10. Performance of coopMAC Protocols over CSMA/CA 802.11 protocols

    Directory of Open Access Journals (Sweden)

    H.Srikanth.Kamath

    2013-06-01

    Full Text Available Wireless communication is very fast becoming the most frequently used form of communication. Ad-Hoc networks can be easily set up anywhere without any infrastructure cost and its mobility adds to its advantage. Hence with increase in its demand the quality of the setup comes under scrutiny, hence calling for its development. This paper presents the concept of Cooperative MAC protocols. Cooperative MAC protocols are found to be more efficient over 802.11 MAC protocols and improve the network performance substantially. Comparison of 802.11 MAC protocols and CoopMAC protocols on NS2 platform is carried out and successfully proved that cooperative MAC protocols offer much higher throughput.

  11. EAR Protocol-Towards Fair Optimistic Non-Repudiation Exchange

    Institute of Scientific and Technical Information of China (English)

    WANG Hai-yan; WANG Ru-chuan

    2005-01-01

    Fairness is of crucial importance for the exchange protocols via Internet. Non-repudiation therefore becomes one of the vital premises, which are essential in the exchange of sensitive and important messages. This paper is to propose a new exchange protocol, termed "EAR" Exchange Protocol as it consists of three sub-protocols: Exchange sub-protocol, Abort sub-protocol and Recovery sub-protocol. It is to be argued that the incorporation of these three sub-protocols may effectively enables EAR to assure non-repudiation, strong fairness, timeliness, confidentiality and the minimized involvement of the Trusted Third Party (TTP).

  12. Security Analysis of Broadcaster Group Key Exchange Protocols

    Institute of Scientific and Technical Information of China (English)

    LI Li; ZHANG Huanguo

    2006-01-01

    Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.

  13. Field validation of protocols developed to evaluate in-line mastitis detection systems.

    Science.gov (United States)

    Kamphuis, C; Dela Rue, B T; Eastwood, C R

    2016-02-01

    This paper reports on a field validation of previously developed protocols for evaluating the performance of in-line mastitis-detection systems. The protocols outlined 2 requirements of these systems: (1) to detect cows with clinical mastitis (CM) promptly and accurately to enable timely and appropriate treatment and (2) to identify cows with high somatic cell count (SCC) to manage bulk milk SCC levels. Gold standard measures, evaluation tests, performance measures, and performance targets were proposed. The current study validated the protocols on commercial dairy farms with automated in-line mastitis-detection systems using both electrical conductivity (EC) and SCC sensor systems that both monitor at whole-udder level. The protocol for requirement 1 was applied on 3 commercial farms. For requirement 2, the protocol was applied on 6 farms; 3 of them had low bulk milk SCC (128×10(3) cells/mL) and were the same farms as used for field evaluation of requirement 1. Three farms with high bulk milk SCC (270×10(3) cells/mL) were additionally enrolled. The field evaluation methodology and results were presented at a workshop including representation from 7 international suppliers of in-line mastitis-detection systems. Feedback was sought on the acceptance of standardized performance evaluation protocols and recommended refinements to the protocols. Although the methodology for requirement 1 was relatively labor intensive and required organizational skills over an extended period, no major issues were encountered during the field validation of both protocols. The validation, thus, proved the protocols to be practical. Also, no changes to the data collection process were recommended by the technology supplier representatives. However, 4 recommendations were made to refine the protocols: inclusion of an additional analysis that ignores small (low-density) clot observations in the definition of CM, extension of the time window from 4 to 5 milkings for timely alerts for CM

  14. What parental characteristics can predict child maltreatment at the Emergency Department? Considering expansion of the Hague Protocol

    NARCIS (Netherlands)

    Diderich, H.M.; Dechesne, M.; Fekkes, M.; Verkerk, P.H.; Buitendijk, S.E.; Oudesluys-Murphy, A.M.

    2015-01-01

    The Hague Protocol considers three parental characteristics of Emergency Department adult patients to identify child abuse: (a) domestic violence, (b) intoxication, and (c) suicide attempt or auto mutilation. This study investigated whether additional parental characteristics could be included to im

  15. Chain-Chain Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Samia A Ali

    2011-05-01

    Full Text Available Wireless sensor network (WSN is an emerging technology for monitoring physical world. WSNs consist of large numbers of sensor nodes operated by battery mostly in harsh environment. Thus energy conservation is a primary issue for organization of these sensor nodes. Another crucial issue is the data delivery time by sensor nodes to the sink node, especially in Military, medical fields, and security monitoring systems where minimum delay is desirable. Number of protocols has been proposed in the literature for routing. One of such protocols is the cluster based routing protocol LEACH (low energy adaptive clustering hierarchy. LEACH protocol organizes WSN into a set of clusters and a periodic voting for cluster head is performed in order to be evenly distributed among all the sensors of the WSN. This periodical cluster head voting in LEACH, however, consumes an amount of non-negligible energy and other resources. For energy conservation, PEGASIS (power efficient gathering in sensor information systems a near optimal chain-based protocol has been proposed, however, it is faced with the challenge of long delay for the transmitted data. Another routing protocol called CCM (Chain-Cluster based Mixed routing, which is mainly a hybrid of LEACH and PEGASIS is proposed, the consumed energy increases as network size increases. In this paper, we propose an efficient routing protocol called CCBRP (Chain-Chain based routing protocol, it achieves both minimum energy consumption and minimum delay. The CCBRP protocol mainly divides a WSN into a number of chains (Greedy algorithm is used to form each chain as in PEGSIS protocol and runs in two phases. In the first phase, sensor nodes in each chain transmit data to their chain leader nodes in parallel. In the second phase, all chain leader nodes form a chain (also, using Greedy algorithm and choose randomly a leader node then all chain leader nodes send their data to this chosen leader node. This chosen leader node

  16. Comparison of three detergent-free protein extraction protocols for white adipose tissue.

    Science.gov (United States)

    Sajic, Tatjana; Hopfgartner, Gérard; Szanto, Ildiko; Varesio, Emmanuel

    2011-08-15

    A comparative study of three detergent-free protein extraction protocols--a differential centrifugal fractionation, a delipidation protocol based on the Bligh and Dyer method, and the trifluoroethanol addition as cosolvent to an aqueous buffer--was performed on white adipose tissue. The performance of the protocols directly compatible with liquid chromatography-electrospray ionization-mass spectrometry (LC-ESI-MS) was evaluated based on the total protein extraction yield and the protein recovery from different functional and cellular compartments. The most suitable method for the extraction of white adipose tissue proteins from a wide range of cellular and structural compartments was the delipidation protocol based on the Bligh and Dyer method. PMID:21565151

  17. Protocol for the application of cooperative MIMO based on clustering in sparse wireless sensor networks

    Institute of Scientific and Technical Information of China (English)

    WANG Qing-hua; QU Yu-gui; LIN Zhi-ting; BAI Rong-gang; ZHAO Bao-hua; PAN Quan-ke

    2007-01-01

    Wireless sensor networks (WSN) using cooperative multiple-input multiple-output (MIMO) communication are effective tools to collect data in several environments. However, how to apply cooperative MIMO in WSN remains a critical challenge, especially in sparse WSN. In this article, a novel clustering scheme is proposed for the application of cooperative MIMO in sparse WSN by extending the traditional low-energy adaptive clustering hierarchy (LEACH) protocol. This clustering scheme solves the problem that the cluster heads (CH) cannot find enough secondary cluster heads (SCH), which are used to cooperate and inform multiple-antenna transmitters with CHs. On the basis of this protocol, the overall energy consumption of the networks model is developed, and the optimal number of CHs is obtained. The simulation results show that this protocol is feasible for the sparse WSN. The simulation results also illustrate that this protocol provides significant energy efficiencies, even after allowing for additional overheads.

  18. A Novel Mutual RFID Authentication Protocol with Low Complexity and High Security

    Directory of Open Access Journals (Sweden)

    Samad Rostampour

    2014-02-01

    Full Text Available Radio Frequency Identification (RFID is a method for automated identifying objects. One of the problems of this technology is its security. RFID tags include resource limitation; therefore, the system designers cannot implement complex circuits to enhance their security. Usually the symmetric and asymmetric encryption methods increase resources and cost. Because it is believed to increasing security is inconsistent with the simplicity, the researchers mostly use one-way encryption methods. In this paper, we propose a mutual authentication protocol based on public key cryptography. The used encryption method includes high security and low complexity. This protocol performs in few steps and is suitable for portable devices with power limitation. In terms of security, the proposed protocol is robust against known attacks. In addition, we prove the protocol is secure by an analytical method.

  19. Microwave Protocols for Paraffin Microtechnique and In Situ Localization in Plants

    Science.gov (United States)

    Schichnes, Denise; Nemson, Jeff; Sohlberg, Lorraine; Ruzin, Steven E.

    1998-10-01

    : We have developed a microwave protocol for a paraffin-embedding microtechnique of the shoot apical meristem of ZEA MAYS and have successfully applied this protocol to other plant tissues. This protocol decreases the time required for all aspects of microtechnique tissue processing, including fixation (24 hr to 15 min), dehydration (73 hr to 10 min), and infiltration (96 hr to 3 hr). Additionally, the time required to adhere paraffin ribbons to gelatin-coated slides and for the Johanson's safranin O, fast green FCF staining protocol has been significantly decreased. Using this technique, the quality of tissue preservation and subsequent in situ localization of KNOTTED mRNA was increased by using microwaves.

  20. RMAC: A Reliable MAC Protocol Supporting Multicast for Wireless Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    Wei-Sheng Si; Cheng-Zhi Li

    2005-01-01

    This paper presents a new reliable MAC protocol called "RMAC" supporting reliable multicast for wireless ad hoc networks. By utilizing the busy tones to realize the multicast reliability, RMAC has three novelties: (1) it uses a variablelength control frame to stipulate an order for the receivers to respond, thus solving the feedback collision problem; (2) it extends the usage of busy tone for preventing data frame collisions into the multicast scenario; and (3) it introduces a new usage of busy tone for acknowledging data frames positively. In addition, RMAC is generalized into a comprehensive MAC protocol that provides both reliable and unreliable services for all the three modes of communications: unicast, multicast,and broadcast, making it capable of supporting various upper-layer protocols. The evaluation shows that RMAC achieves high reliability with very limited overhead. RMAC is also compared with other reliable MAC protocols, showing that RMAC not only provides higher reliability but also involves lower cost.