WorldWideScience

Sample records for additional protocol ratification

  1. Law project adopted by the Senate and authorizing the ratification of the additional protocol to the agreement between France, the European atomic energy community and the international atomic energy agency relative to the application of warranties in France

    International Nuclear Information System (INIS)

    2002-10-01

    This project of law concerns an additional protocol to the agreement of warranties signed on September 22, 1998 between France, the European atomic energy community and the IAEA. This agreement concerns the declaration of all information relative to the R and D activities linked with the fuel cycle and involving the cooperation with a foreign country non endowed with nuclear weapons. These information include the trade and processing of nuclear and non-nuclear materials and equipments devoted to nuclear reactors (pressure vessels, fuel loading/unloading systems, control rods, force and zirconium tubes, primary coolant pumps, deuterium and heavy water, nuclear-grade graphite), to fuel reprocessing plants, to isotope separation plants (gaseous diffusion, laser enrichment, plasma separation, electromagnetic enrichment), to heavy water and deuterium production plants, and to uranium conversion plants. (J.S.)

  2. Additional protocol between France, EURATOM and IAEA. 2001-2002 ordinary session. Project of law authorizing the ratification of the additional protocol to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency relative to the application of warranties in France

    International Nuclear Information System (INIS)

    2002-01-01

    This additional protocol to the agreement between France, EURATOM and the IAEA aims at reinforcing the nuclear weapons non-proliferation regime. This protocol widens the field of competences of the IAEA with the supply of new information relative to: the civil nuclear cooperation between France and countries having no nuclear weapons in the domain of fuel cycle; the regular inspection of French nuclear facilities; the trade (import and export) of medium- or high-level radioactive wastes containing plutonium, highly enriched uranium or 233 U, and the trade of some non-nuclear equipments or materials with countries having no nuclear weapons. The protocol defines also some practical dispositions relative to the delays and periodicity of controls, to the transmission of data, to the appointment of IAEA inspectors and their access to the facilities and sites considered. The list of the activities and equipments covered by the protocol are given in appendixes. (J.S.)

  3. Additional protocol between France, EURATOM and IAEA. 2001-2002 ordinary session. Project of law authorizing the ratification of the additional protocol to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency relative to the application of warranties in France; Protocole additionnel entre la France, Euratom et l'AIEA. Session ordinaire de 2001-2002. Projet de loi autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-07-01

    This additional protocol to the agreement between France, EURATOM and the IAEA aims at reinforcing the nuclear weapons non-proliferation regime. This protocol widens the field of competences of the IAEA with the supply of new information relative to: the civil nuclear cooperation between France and countries having no nuclear weapons in the domain of fuel cycle; the regular inspection of French nuclear facilities; the trade (import and export) of medium- or high-level radioactive wastes containing plutonium, highly enriched uranium or {sup 233}U, and the trade of some non-nuclear equipments or materials with countries having no nuclear weapons. The protocol defines also some practical dispositions relative to the delays and periodicity of controls, to the transmission of data, to the appointment of IAEA inspectors and their access to the facilities and sites considered. The list of the activities and equipments covered by the protocol are given in appendixes. (J.S.)

  4. Climate change ratification of the Kyoto Protocol : clearing the air on the debate

    International Nuclear Information System (INIS)

    2002-01-01

    The Kyoto Protocol on Climate Change would commit Canada to limit emissions of greenhouse gases to 6 per cent below 1990 levels by 2008-2012. The Canadian Chamber of Commerce has outlined the following 3 key prerequisites that the federal government should and will have in place before any decision on ratification is made: (1) a detailed plan for achieving the Kyoto reductions, (2) a detailed analysis of environmental and economic impacts associated with Kyoto implementation, and (3) consultations with all stakeholder and the Canadian public once the plan has been released. Currently, Canadian businesses are taking voluntary actions to reduce industrial sector emissions through programs such as the Canadian Industry Program for Energy Conservation. Between 1990 and 1999, industrial sector emissions fell by 6 per cent. However, it was emphasized that despite these efforts, the gap between Canada's Kyoto target and its current greenhouse gas emissions continues to grow because of population and economic growth and rising exports. At the current rate of growth, it is estimated that meeting the Kyoto target could cost the economy up to $30 billion in 2010. The paper also discusses the implementation of key flexibility mechanisms such as carbon sinks, Joint Implementation, the Clean Development Mechanism and credits for export of cleaner energy to the United States, a non-Kyoto country. It is argued that ratification of Kyoto could hurt investments and impact jobs in Canada by making Canadian industries uncompetitive relative to their American counterparts. It is emphasized that full participation by the Canadian public is required in adapting to major lifestyle changes to reduce the use of fossil fuels and other sources of greenhouse gases. In conclusion, the Canadian Chamber of Commerce does not believe that the Kyoto Protocol is the most effective and efficient way of moving forward on the climate change issue and recommends that the federal government develop a made

  5. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  6. Ratification of the Kyoto Protocol: a citizen's guide to the Canadian climate change policy process

    International Nuclear Information System (INIS)

    Macdonald, D.; Bjorn, A.; Duminuco, S.

    2002-01-01

    Canada is faced with the important decision of whether it should ratify the Kyoto Protocol. A reference for stakeholders and non-expert interested parties, this document is a guide into the Canadian Climate Change Policy Process. An understanding of climate science is required for climate policy, as is a knowledge of policy options available to overcome the challenges posed by climate change. The situation is further complicated by international and federal-provincial negotiations over the measures that should be implemented, if any. Climate policy affects all aspects of our lives, especially how we produce and use energy. An overview of climate science is provided in the first section, and the relationship between climate and rising temperatures due to greenhouse gas emissions is established. The sources of greenhouse gases in Canada are identified, with a closer look at the current trends. The Kyoto Protocol, if ratified, calls for Canada to reduce its emissions of greenhouse gases to six per cent below 1990 levels. It is noted that to date, Canada's emissions have risen 19.7 per cent above 1990 levels. The process underlying the international negotiations associated with the Kyoto Protocol, and especially Canada's role in it, are discussed. Flexibility mechanisms are strongly supported by Canada, such as credits for sinks, international carbon trading and credits for Clean Energy Exports. By approving such measures, the integrity of the Protocol would be considerably weakened. The domestic policy-making environment is examined, presenting key federal, provincial business and environmental players. In addition, the policy process in Canada is described, as well as the decisions made up to September 2002. Bibliographic and contact information is added in the last section of the document. 89 refs., 7 tabs., 7 figs

  7. Decree No. 33/77 of 11 March approving ratification of the Convention on Third Party Liability in the Field of Nuclear Energy, signed in Paris on 29 July 1960 and amended by the Additional Protocol, signed in Paris on 29 January 1964

    International Nuclear Information System (INIS)

    1977-01-01

    This Decree, promulgated on 21 February 1977, approves ratification of the Paris Convention and reproduces the full text of the Convention in French, followed by its translation into Portuguese. The Paris Convention provides an exceptional nuclear liability system and its scope is limited to risks of an exceptional character for which common law rules and practice are not suitable. Under the Convention, liability is absolute, channelled onto the nuclear operator and limited in amount. (NEA) [fr

  8. Report realized on behalf of the Foreign Affairs Commission, of Defense and Armed Forces on the law project allowing the additional protocol ratification to the agreement between France, European Community of the atomic energy and the International Atomic Energy Agency relative to the guaranties application in France

    International Nuclear Information System (INIS)

    2002-01-01

    In a first part the author presents the International Atomic Energy Agency and its missions in the nuclear non proliferation policy especially in the agreements with the states of the TNP (Treaty of Nuclear non Proliferation). the today position of France is then analyzed towards the IAEA and the novations added by the additional protocol. (A.L.B.)

  9. Law project adopted by the Senate and authorizing the ratification of the additional protocol to the agreement between France, the European atomic energy community and the international atomic energy agency relative to the application of warranties in France; Projet de loi adopte par le Senat autorisant la ratification du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en Franc

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    This project of law concerns an additional protocol to the agreement of warranties signed on September 22, 1998 between France, the European atomic energy community and the IAEA. This agreement concerns the declaration of all information relative to the R and D activities linked with the fuel cycle and involving the cooperation with a foreign country non endowed with nuclear weapons. These information include the trade and processing of nuclear and non-nuclear materials and equipments devoted to nuclear reactors (pressure vessels, fuel loading/unloading systems, control rods, force and zirconium tubes, primary coolant pumps, deuterium and heavy water, nuclear-grade graphite), to fuel reprocessing plants, to isotope separation plants (gaseous diffusion, laser enrichment, plasma separation, electromagnetic enrichment), to heavy water and deuterium production plants, and to uranium conversion plants. (J.S.)

  10. Bill authorizing the ratification of the protocol amending the Protocol on transitional provisions annexed to the Treaty on European Union, to the Treaty on the Functioning of the European Union and to the Treaty establishing the European Atomic Energy Community

    International Nuclear Information System (INIS)

    2010-01-01

    After an indication of the European Parliament composition, this text describes the transitional provisions adopted as the Lisbon Treaty did not come into effect before the European elections held in June 2009. The document also provides the protocol text signed by the Members States and which amended the protocol on transitional provisions annexed to the Treaty on the European Union, to the Treaty on the Functioning of the European Union and to the Treaty establishing the European Atomic Energy Community. The last part of the document discusses the administrative and legal consequences of this protocol. It also recalls the history of the negotiations and indicates the present status of signatures and ratifications

  11. The activities of the Republic of Serbia in achieving the objectives given by the ratification of the Protocol on water and health

    Directory of Open Access Journals (Sweden)

    Jovanović Ljiljana M.

    2015-01-01

    Full Text Available By the ratification of the Protocol on water and health, the Republic of Serbia accepted the obligations of that international treaty, which is also the key instrument in advancing the water-and-sanitation- realted goal of the Commitment to Act of the Parma Declaration on Environment and Health. For the purpose of the achieving and maintaining the established and validated Protocol on Watwr and Health targets, and in order to obtain the high level of protection against water-related diseases, the continuous cooperation between ministries and institutions of health and environment is needed, as well as the mobilization on local and regional level, which will contribute to awareness raising in each individual of the necessity of the water resources and environmental protection, as well as of the hygienic promotion and health protection.

  12. Workshop to promote the ratification of the protocol on heavy metals across the entire UN ECE region

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-12-15

    Within the workshop of the German Federal Environment Agency (Dessau-Rosslau, Federal Republic of Germany) at 14th to 16th May, 2008 in Yerevan (Armenia), the following lectures were held: (1) The convention and its protocols - framework and requirements (Tea Aulavuo); (2) Development of the heavy metals protocol up to now (D. Jost); (3) Experiences in transposing the obligations of the HM protocol into national law (Ivan Angelov); (4) Evaluation of concentrations of air pollutants and depositions of HM over the EECCA region (Ilia Ilyin); (5) The effectiveness of the HM protocol - emission reductions and costs (TNO-study) (M. van het Bolscher); (6) Technologies and techniques and their emission reduction potential and costs (Andre Peeters Weem); (7) Synergies of reduction of HM and particulate matter (Katja Kraus); (8) Critical loads / critical levels and effects of HM - integrated assessment (Jean-Paul Hettelingh); (9) Additional technical measures / options and their reduction potential (M. van het Bolscher); (10) Overview of the situation in the EECCA region - evaluation of a questionnaire of the Secretariat of the LRTAP Convention and ideas on revising the protocol and its annexes (Johan Sliggers); (11) Future aims of the TF (Katja Kraus).

  13. Intelligence and treaty ratification

    International Nuclear Information System (INIS)

    Cahn, A.H.

    1990-01-01

    This paper reports that there are two sets of questions applicable to the ratification phase: what is the role of intelligence in the ratification process? What effect did intelligence have on that process. The author attempts to answer these and other questions

  14. Protocol for ADDITION-PRO

    DEFF Research Database (Denmark)

    Johansen, Nanna Borup; Hansen, Anne-Louise Smidt; Jensen, Troels M

    2012-01-01

    BACKGROUND: Screening programmes for type 2 diabetes inevitably find more individuals at high risk for diabetes than people with undiagnosed prevalent disease. While well established guidelines for the treatment of diabetes exist, less is known about treatment or prevention strategies...... for individuals found at high risk following screening. In order to make better use of the opportunities for primary prevention of diabetes and its complications among this high risk group, it is important to quantify diabetes progression rates and to examine the development of early markers of cardiovascular...... disease and microvascular diabetic complications. We also require a better understanding of the mechanisms that underlie and drive early changes in cardiometabolic physiology. The ADDITION-PRO study was designed to address these issues among individuals at different levels of diabetes risk recruited from...

  15. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  16. The challenges of additional protocol implementation

    International Nuclear Information System (INIS)

    Renis, Therese

    2001-01-01

    Full text: The IAEA Board of Governors approved the Model Protocol Additional to Safeguards Agreements, INFCIRC/540, (referred to as the Additional Protocol) in May 1997. The Additional Protocol provides for new mechanisms that include expanded information on State's nuclear activities to be declared to the IAEA and increased physical access to locations for IAEA inspectors. The objective is to provide the basis for gaining assurance of the absence of undeclared nuclear material and activities in a State. Although the Agency conducted field trials of various aspects of implementation of the Additional Protocol, the first actual implementation experience began with the entry into force of Australia's additional protocol in December of 1997. As of late August 2001,21 states have entered into force an additional protocol and another 35 states have signed the additional protocol but not yet entered the agreement into force. Because implementation of the Additional Protocol requires new activities to be carried out by the IAEA, new procedures, guidelines and training have been developed to support these activities. As more experience is gained these documents are being refined and additional ones developed to meet unforeseen needs. In addition, evaluation and follow-up of the expanded information and the results of increased access has required the Safeguards Department to expand and adapt its procedures and mode of operation. The challenge has been in establishing sufficient measures and the necessary infrastructure for consistent application of the additional protocol in such a way that they can be adapted as needed based on Agency experience. Initial development focused on the logistical aspects of implementing these new activities. These activities include the processing, handling and review of additional protocol declarations; planning, conducting and reporting on complementary access activities; and follow-up activities arising from information review or

  17. Intelligence and treaty ratification

    International Nuclear Information System (INIS)

    Sojka, G.L.

    1990-01-01

    What did the intelligence community and the Intelligence Committee di poorly in regard to the treaty ratification process for arms control? We failed to solve the compartmentalization problem/ This is a second-order problem, and, in general, analysts try to be very open; but there are problems nevertheless. There are very few, if any, people within the intelligence community who are cleared for everything relevant to our monitoring capability emdash short of probably the Director of Central Intelligence and the president emdash and this is a major problem. The formal monitoring estimates are drawn up by individuals who do not have access to all the information to make the monitoring judgements. This paper reports that the intelligence community did not present a formal document on either Soviet incentives of disincentives to cheat or on the possibility of cheating scenarios, and that was a mistake. However, the intelligence community was very responsive in producing those types of estimates, and, ultimately, the evidence behind them in response to questions. Nevertheless, the author thinks the intelligence community would do well to address this issue up front before a treaty is submitted to the Senate for advice and consent

  18. IAEA to implement Safeguards Additional Protocols in the EU

    International Nuclear Information System (INIS)

    2004-01-01

    Full text: IAEA Director General Mohamed ElBaradei welcomed the entry into force today of the Additional Protocols for 15 States of the European Union - France, the United Kingdom and the 13 non-nuclear weapon States of the EU - and the European Atomic Energy Community (EURATOM). The Protocols, which provide the Agency with better tools to verify compliance with nuclear non-proliferation commitments, entered into force when the European Commission informed the Agency that EURATOM's own requirements for entry into force had been met. The 15 States had provided similar notifications over the past years since signing the Protocols in 1998. The simultaneous entry into force of Additional Protocols for the 15 EU States is 'a very positive development and a milestone in our efforts to strengthen the verification regime', said Dr. ElBaradei. 'In my view, the Additional Protocol should become the standard for verification under the Treaty on the Non-Proliferation of Nuclear Weapons (NPT).' He added that the Agency had been preparing for the entry into force of the EU protocols and was confident that, in co-operation with the 15 States and EURATOM, it would be able to ensure effective and efficient implementation in the EU States. The Model Additional Protocol was developed following the discovery of Iraq's clandestine nuclear weapons programme to ensure that the IAEA is given the information and access it needs for timely discovery of any similar activities in States that have pledged not to use nuclear material and activities for weapons purposes. In the past year, Additional Protocols entered into force for 22 countries, and the Agency will now implement Additional Protocols in 58 States, which includes the 15 EU States. The 10 countries joining the EU on 1 May 2004 - seven of which already have brought into force Additional Protocols to their respective safeguards agreements - are expected to gradually accede to the Safeguards Agreement and Additional Protocol covering

  19. Fingerprinting protocol for images based on additive homomorphic property.

    Science.gov (United States)

    Kuribayashi, Minoru; Tanaka, Hatsukazu

    2005-12-01

    Homomorphic property of public-key cryptosystems is applied for several cryptographic protocols, such as electronic cash, voting system, bidding protocols, etc. Several fingerprinting protocols also exploit the property to achieve an asymmetric system. However, their enciphering rate is extremely low and the implementation of watermarking technique is difficult. In this paper, we propose a new fingerprinting protocol applying additive homomorphic property of Okamoto-Uchiyama encryption scheme. Exploiting the property ingenuously, the enciphering rate of our fingerprinting scheme can be close to the corresponding cryptosystem. We study the problem of implementation of watermarking technique and propose a successful method to embed an encrypted information without knowing the plain value. The security can also be protected for both a buyer and a merchant in our scheme.

  20. New START: The Contentious Road to Ratification

    Directory of Open Access Journals (Sweden)

    Elizabeth Zolotukhina

    2011-01-01

    Full Text Available Senate ratification of the New START treaty re-established effective bilateral inspection and monitoring of American and Russian nuclear holdings and has the potential to further enhance U.S.-Russian cooperation on key issues, including containing the Iranian nuclear program, and further reductions in the two countries' arsenals. Although the accord was widely heralded as a foreign policy success of the Obama administration, the contentious Senate ratification may impede future progress on arms control.

  1. Report on July 2015 Additional Protocol Coordinators Best Practices Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Gitau, Ernest T.N. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Burbank, Roberta L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Finch, Valerie A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-07-31

    After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old), identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.

  2. Department of Energy Efforts to Promote Universal Adherence to the IAEA Additional Protocol

    International Nuclear Information System (INIS)

    Killinger, Mark H.; Hansen, Linda H.; Kovacic, Don N.; VanSickle, Matthew; Apt, Kenneth E.

    2009-01-01

    Entry-into-force of the U.S. Additional Protocol (AP) in January 2009 continues to demonstrate the ongoing commitment by the United States to promote universal adherence to the AP. The AP is a critical tool for improving the International Atomic Energy Agency's (IAEA) capabilities to detect undeclared activities that indicate a clandestine nuclear weapons program. This is because States Parties are required to provide information about, and access to, nuclear fuel cycle activities beyond their traditional safeguards reporting requirements. As part of the U.S. AP Implementation Act and Senate Resolution of Ratification, the Administration is required to report annually to Congress on measures taken to achieve the adoption of the AP in non-nuclear weapon states, as well as assistance to the IAEA to promote the effective implementation of APs in those states. A key U.S. effort in this area is being managed by the International Nuclear Safeguards and Engagement Program (INSEP) of the U.S. Department of Energy (DOE). Through new and existing bilateral cooperation agreements, INSEP has initiated technical assistance projects for AP implementation with selected non-weapon states. States with which INSEP is currently cooperating include Vietnam and Thailand, with Indonesia, Algeria, Morocco, and other countries as possible future collaborators in the area of AP implementation. The INSEP collaborative model begins with a joint assessment with our partners to identify specific needs they may have regarding entering the AP into force and any impediments to successful implementation. An action plan is then developed detailing and prioritizing the necessary joint activities. Such assistance may include: advice on developing legal frameworks and regulatory documents; workshops to promote understanding of AP requirements; training to determine possible declarable activities; assistance in developing a system to collect and submit declarations; performing industry outreach to

  3. Development of the strengthened safeguards system and the Additional Protocol

    International Nuclear Information System (INIS)

    Vidaurre-Henry, Jaime

    2001-01-01

    For the past 30 years, the IAEA's safeguards system has contributed to the international non-proliferation regime by providing, inter alia, assurances regarding the peaceful uses of declared nuclear material. However, the discovery of a clandestine nuclear weapons program in Iraq in 1991 drew world-wide attention to the need to strengthen the system to address the absence of undeclared nuclear material and activities. Efforts to strengthen the IAEA's safeguards system began in 1991 and culminated in 1997 when the IAEA's Board of Governors approved a Model Protocol Additional to IAEA Safeguards Agreements which greatly expands the legal basis and scope of IAEA safeguards. Within this strengthened system it is expected that the IAEA be able to provide assurance not only of the absence of diversion of declared nuclear material but also on the absence of undeclared nuclear material and activities. This is to be done within a safeguards system that uses an optimal combination of all safeguards measures available, thereby achieving maximum effectiveness and efficiency within the available resources. The paper summarizes the evolution of the safeguards system, describes strengthened safeguards, reports on the status of implementing the strengthening measures, and outlines plans for integrating all available safeguards measures. (author)

  4. Recommended Protocol for Round Robin Studies in Additive Manufacturing.

    Science.gov (United States)

    Moylan, Shawn; Brown, Christopher U; Slotwinski, John

    2016-03-01

    One way to improve confidence and encourage proliferation of additive manufacturing (AM) technologies and parts is by generating more high quality data describing the performance of AM processes and parts. Many in the AM community see round robin studies as a way to generate large data sets while distributing the cost among the participants, thereby reducing the cost to individual users. The National Institute of Standards and Technology (NIST) has conducted and participated in several of these AM round robin studies. While the results of these studies are interesting and informative, many of the lessons learned in conducting these studies concern the logistics and methods of the study and unique issues presented by AM. Existing standards for conducting interlaboratory studies of measurement methods, along with NIST's experience, form the basis for recommended protocols for conducting AM round robin studies. The role of round robin studies in AM qualification, some of the limitations of round robin studies, and the potential benefit of less formal collaborative experiments where multiple factors, AM machine being only one, are varied simultaneously are also discussed.

  5. French future: exploring the future ratification hypothesis

    OpenAIRE

    Mari, Alda

    2015-01-01

    International audience; The paper proposes a unified account of the systematic polysemy of French future (FUT) that does not uniquely rely on Aktionsart. It explains the predominant preference for the temporal interpretation of FUT, appealing to the ‘future ratification hypothesis’. This is a felicity condition that can be satisfied to different degrees and among competing interpretations the one that satisfies it to the highest degree is preferred. The paper also shows that FUT does not conv...

  6. The additional protocol to the African Charter on Human and ...

    African Journals Online (AJOL)

    Aniekwu Nkolika Ijeoma notes that, in July 2003, the African Union adopted a landmark treaty, the Protocol on the Rights of Women in Africa, which significantly advances human rights protections to better reflect and incorporate women's experiences. It presents a tremendous opportunity for women's rights advocates in ...

  7. The politics of arms control treaty ratification

    International Nuclear Information System (INIS)

    Krepon, M.; Caldwell, D.

    1991-01-01

    This book presents a critical examination of executive-congressional relations and the domestic politics of arms control treaty ratification within the United States during the twentieth century. The staring point of this study is the hypothesis that the politics of treaty ratification can be as important as the negotiations leading up to agreements. Benefits to international peace and security sought in years of painstaking diplomatic effort can be lost without Senate consent, as was the case with the Treaty of Versailles and the second treaty arising from the Strategic Arms Limitation Talks (SALT II). The authors of the case studies were requested to present first a brief, historical introduction to the case indicating why the case was important, the background concerning the origins of the treaty, and the treaty's major provisions. The purpose of the introduction to the case was not to provide a complete picture of the negotiating record but to set the stage for a more in-depth discussion of the events that followed after the treaty was signed. The authors address five substantive areas: the international political context of the treaty, the domestic political context, the role of the president, executive-congressional relations, and public opinion and the role of interest groups. The questions and issues concerning each of these areas are briefly summarized

  8. Report made on the behalf of the Foreign Affairs Commission on the bill project nr 2932 authorizing the ratification of the protocol modifying the protocol on transitory dispositions attached to the Treaty on the European Union, to the Treaty on the functioning of the European Union, and to the Treaty establishing the European Atomic Energy Community

    International Nuclear Information System (INIS)

    2011-01-01

    This report first describes and comments the consequences of the Lisbon Treaty in terms of composition for the European Parliament, and more particularly the debate about the design of an efficient and representative parliament, the election mode and the seat distribution. Then, it describes how the modification protocol has been elaborated, its content (general architecture, eighteen additional seats for twelve member States and their election modalities), and its implementation (agenda and method)

  9. State system of accounting for and control of nuclear materials and Protocol Additional in the Slovak Republic

    International Nuclear Information System (INIS)

    Bencova, A.

    2001-01-01

    proposed procedures at the facility for nuclear materials accountancy and control with special reference to material balance areas and key measurement points, measurements of flow and procedures for physical inventory taking. This document is prepared by the IAEA using the Design Information Questionnaire supplied by the facility operator. The Nuclear Regulatory Authority of the Slovak Republic uses computerised system for SSAC - Code ZARUKY 3.00. This code should be able to communicate with the database of operators, which are allowed to handle nuclear material and it should reflect all limitations specified in theirs permissions. It is created on a system with fully satisfactory safety, strictly defined confidentiality and in a system, which allows the access of several users in parallel. As a new component of the code the system for reporting in accordance with the requirements of the Additional Protocol will be incorporated. Starting after political changes in the Central Europe in the beginning of nineties the Slovak Republic is facing a new type of crime illicit trafficking of nuclear and radioactive materials. Direct economical losses in this case are not comparable with the impact on proliferation and radiation safety risk. The government of the Slovak Republic is aware of the situation and has prepared some measures, which may help us to cope with this problem. These measures were mostly concentrated on detection on the state border as well as inside the state. However, the most important is a state system of measures how to prevent removal of material into illegal use. The Protocol Additional was signed by the government of the Slovak Republic in September 1999. However, The Protocol cannot be ratified, as the laws now in effect in the Slovak Republic do not make it possible to meet all requirements resulting from the Protocol. To enable the ratification of the Protocol Additional, first of all it is necessary to amend the Atomic Law and associated regulations

  10. Diffusion of innovations theory applied to global tobacco control treaty ratification.

    Science.gov (United States)

    Valente, Thomas W; Dyal, Stephanie R; Chu, Kar-Hai; Wipfli, Heather; Fujimoto, Kayo

    2015-11-01

    This study applies diffusion of innovations theory to understand network influences on country ratification of an international health treaty, the Framework Convention for Tobacco Control (FCTC). From 2003 to 2014 approximately 90% of United Nations member countries ratified the FCTC. We hypothesized that communication between tobacco control advocates on GLOBALink, a 7000-member online communication forum in existence from 1992 to 2012, would be associated with the timing of treaty ratification. We further hypothesized dynamic network influences such that external influence decreased over time, internal influence increased over time, and the role of opinion leader countries varied over time. In addition we develop two concepts: Susceptibility and influence that uncover the micro-level dynamics of network influence. Statistical analyses lend support to the influence of co-subscriptions on GLOBALink providing a conduit for inter-country influences on treaty ratification and some support for the dynamic hypotheses. Analyses of susceptibility and infection indicated particularly influential countries. These results have implications for the study of policy diffusion as well as dynamic models of behavior change. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  11. Verifying compliance with nuclear non-proliferation undertakings: IAEA safeguards agreements and additional protocols

    International Nuclear Information System (INIS)

    2008-06-01

    This report provides background information on safeguards and explains procedures for States to conclude Additional Protocols to comprehensive Safeguards Agreements with the IAEA. Since the IAEA was founded in 1957, its safeguards system has been an indispensable component of the nuclear non-proliferation regime and has facilitated peaceful nuclear cooperation. In recognition of this, the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) makes it mandatory for all non-nuclear-weapon States (NNWS) party to the Treaty to conclude comprehensive safeguards agreements with the IAEA, and thus allow for the application of safeguards to all their nuclear material. Under Article III of the NPT, all NNWS undertake to accept safeguards, as set forth in agreements to be negotiated and concluded with the IAEA, for the exclusive purpose of verification of the fulfilment of the States' obligations under the NPT. In May 1997, the IAEA Board of Governors approved the Model Additional Protocol to Safeguards Agreements (reproduced in INFCIRC/540(Corr.)) which provided for an additional legal authority. In States that have both a comprehensive safeguards agreement and an additional protocol in force, the IAEA is able to optimize the implementation of all safeguards measures available. In order to simplify certain procedures under comprehensive safeguards agreements for States with little or no nuclear material and no nuclear material in a facility, the IAEA began making available, in 1971, a 'small quantities protocol' (SQP), which held in abeyance the implementation of most of the detailed provisions of comprehensive safeguards agreements for so long as the State concerned satisfied these criteria. The safeguards system aims at detecting and deterring the diversion of nuclear material. Such material includes enriched uranium, plutonium and uranium-233, which could be used directly in nuclear weapons. It also includes natural uranium and depleted uranium, the latter of which is

  12. 25 CFR 81.7 - Adoption, ratification, or revocation by majority vote.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Adoption, ratification, or revocation by majority vote... TRIBAL REORGANIZATION UNDER A FEDERAL STATUTE § 81.7 Adoption, ratification, or revocation by majority... those actually voting are in favor of adoption, ratification, or revocation. The total vote cast...

  13. Declarations pursuant to the Articles 2 and 3 of the Model Additional Protocol

    International Nuclear Information System (INIS)

    Fernandez Moreno, Sonia

    2001-01-01

    Articles 2 and 3 of the Model Additional Protocol specify the content and the time limits of the information to be provided by the States into the framework of the Safeguard Agreements. To standardize the presentation of this information the IAEA has prepared guidelines for the preparation of the documents. A detailed explanation of the guidelines is given in the paper

  14. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  15. Effect of Tax Ratification Elections on Student Achievement

    Science.gov (United States)

    Groppel, Lance

    2013-01-01

    This dissertation examines the impact a Tax Ratification Election has on student achievement in Texas. Texas schools continue to struggle with shrinking budgets and increasing standards of student achievement (Equity Center, 2011). This study will provide greater insight into whether school districts that have completed a TRE have created a…

  16. The Additional Protocol as an important tool for the strengthening of the safeguards system

    International Nuclear Information System (INIS)

    Loosch, Reinhard

    2001-01-01

    Full text: The following main points will be dealt with and underlined by illustrative examples: 0. A preliminary clarification: Contrary to the title's short-hand language, it is of course, not the Additional Protocols entered into by the Agency and States and other Parties to Safeguards Agreements since 1997 nor the Model Additional Protocol adopted by the Board of Governors and endorsed by the General Conference in 1997 that are, by themselves, an important tool for the strengthening of the Agency's safeguards system. They are, however, the necessary legal prerequisite as well as a strong political and moral boost for enabling the Agency to develop and apply additional tools in order to make the international nuclear non-proliferation regime more effective and, therefore, more reassuring and at the same time, more efficient and therefore, more widely accepted. 1. The importance of the new tools cannot be assessed yet. Hopefully, it will grow quickly and consistently. This will depend primarily on two factors: - The extent to which Additional Protocols are entered into force and at what speed this is achieved, and the extent to which these Protocols cover all important peaceful nuclear activities and resources, whether these exist in states with comprehensive safeguards agreements or not; - The extent to which the Agency succeeds in merging the new measures with those applicable before into an optimized, integrated toolbox. 2. The first factor tends to increase effectiveness by permitting the collection of safeguards- relevant data provided not only in reports from countries in which such activities are conducted or such resources exist but also in information coming from other sources such as publications in. or intelligence made available by, other countries. Cross-checking all those data against each other may, in the best case, reinforce their credibility or, in the worst case, reveal gaps and inconsistencies, but will at any rate, in one way or other, help

  17. Making sense of site declarations: Canadian declarations under article 2.a. (iii) of the Additional Protocol

    International Nuclear Information System (INIS)

    Cameron, J.K.; Benjamin, R.; Ghosh, A.

    2001-01-01

    Full text: While this paper will provide an overview of Additional Protocol implementation activities in Canada, this paper will also deal with a specific, albeit important, component of Canada's initial declaration under the Additional Protocol: site definitions and declarations. A clear description of the problems, solutions and compromises in making site declarations across a variety of sites in Canada would provide a useful insight into the process as other States prepare to do the same. Through the Model Protocol Additional to Safeguards Agreements Between Member States and the International Atomic Energy Agency, provisions exist to fulfil a longstanding gap in the coverage of international safeguards. The success of these new provisions are dependent on the extent to which declarations balance the intent of expanded declarations and the practical difficulties in making such declarations. The prerogative to delineate site boundaries lies with the Member State. In doing so, four factors merit careful consideration. First, Article 18.b of the Additional Protocol draws connections between facility definition and site delineation. Under comprehensive safeguards, information on facilities has already been submitted to the IAEA specifying site layouts in the design information questionnaire. Consistency between the site layouts specifications of the design information and site definition under the Additional Protocol is important, as differences will lead to inconsistencies, which will have to be resolved during implementation. Second, while Article 18.b specified that specific essential services, co-located in close geographic proximity, should be considered as part of the same site, there are instances where site definition is complicated by close proximity of other, but separate, safeguarded facilities and the existence of services related, but not essentials according to the definitions of the Additional Protocol, to the site. Third, practical limitations come

  18. An argument for South Africa's Accession to the Optional Protocol to ...

    African Journals Online (AJOL)

    Tina

    Law. Email: nicholasorago@gmail.com. The article is based in part on a paper written for the. Ratification Campaign for South Africa's Ratification of the International Covenant on Economic,. Social and Cultural Rights and its Optional Protocol. 1. Final Act of the International Conference on Human Rights (1968) para 13, ...

  19. Approach to integrate current safeguards measures with additional protocol requirements at national level

    International Nuclear Information System (INIS)

    Ramirez, R.

    2001-01-01

    Peru adhered to the Additional Protocol in March 2000 which was also approved by the Congress in May 2001. After approval by law the obligations derived from this Additional Protocol will be in force after 180 days. After the signing of the Protocol an approach was designed to help better fulfill these requirements in an integrated way with the previous measures. As first stage, a review of the current state of safeguards was undertaken. Under the current agreement (an INFCIRC/153 type agreement) the reporting is less complicated and inexpensive to be carried out because these reports include only the declared nuclear material and the features of declared facilities where the nuclear material is used. No other related facility or material or activity needs to be declared. In Peru there are only two MBAs where low enriched uranium (LEU) is used and the record system includes general ledgers, inventory records and operational books. The results of national inspections and copies of reports and communications sent to the IAEA are also kept in this system. Under the agreement and subsidiary arrangements material balance reports (MBR), physical inventory listings (PIL) and inventory change reports (ICR) are prepared and submitted to the IAEA at scheduled periods. The MBR and PIL reports are sent after yearly regular inspections carried out by the IAEA. The ICR is sent just every time when an import or export of nuclear material is made. The time devoted to carry out all of these activities is not so extensive for both the State System for Accountability and Control (SSAC) and the users because of the limited nuclear activities in the country. Because of the characteristics and limited quantities of nuclear material the efforts for inspection and reporting activities are few. Another subject under review was the procedure for controlling the imports of nuclear material. Under the current agreement this subject was not a problem, as all of the radioactive and nuclear

  20. Implications of Export/Import Reporting Requirements in the United States - International Atomic Energy Agency Safeguards Additional Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Killinger, Mark H.; Benjamin, Eugene L.; McNair, Gary W.

    2001-02-20

    The United States has signed but not ratified the US/IAEA Safeguards Additional Protocol. If ratified, the Additional Protocol will require the US to report to the IAEA certain nuclear-related exports and imports to the IAEA. This document identifies and assesses the issues associated with the US making those reports. For example, some regulatory changes appear to be necessary. The document also attempts to predict the impact on the DOE Complex by assessing the historical flow of exports and imports that would be reportable if the Additional Protocol were in force.

  1. Vienna convention on civil liability for nuclear damage and optional protocol concerning the compulsory settlement of disputes. Status lists as of 12 September 2000. Signature, ratification, accession, or succession. Declarations/reservations made upon expressing consent to be bound and objections thereto. Declarations/reservations made upon signature

    International Nuclear Information System (INIS)

    2000-01-01

    The document provides the status list to the Protocol to Amend the Vienna Convention on Civil Liability for Nuclear Damage and optional protocol concerning the compulsory settlement of disputes as of 12 September 2000

  2. Does ratification of human-rights treaties have effects on population health?

    Science.gov (United States)

    Palmer, Alexis; Tomkinson, Jocelyn; Phung, Charlene; Ford, Nathan; Joffres, Michel; Fernandes, Kimberly A; Zeng, Leilei; Lima, Viviane; Montaner, Julio S G; Guyatt, Gordon H; Mills, Edward J

    2009-06-06

    Human-rights treaties indicate a country's commitment to human rights. Here, we assess whether ratification of human-rights treaties is associated with improved health and social indicators. Data for health (including HIV prevalence, and maternal, infant, and child [corruption index), gathered from 170 countries, showed no consistent associations between ratification of human-rights treaties and health or social outcomes. Established market economy states had consistently improved health compared with less wealthy settings, but this was not associated with treaty ratification. The status of treaty ratification alone is not a good indicator of the realisation of the right to health. We suggest the need for stringent requirements for ratification of treaties, improved accountability mechanisms to monitor compliance of states with treaty obligations, and financial assistance to support the realisation of the right to health.

  3. Law project (no. 1329) adopted by the Senate and authorizing the ratification of the agreement between the French Republic, the European Atomic Energy Community and the International Atomic Energy Agency relative to the enforcement of warranties in the framework of the treaty of nuclear weapons prohibition in South America and the Caribbeans area (two protocols together); Projet de loi (no. 1329) adopte par le Senat autorisant la ratification de l'accord entre la Republique francaise, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties dans le cadre du traite visant l'interdiction des armes nucleraires en Amerique latine et dans les Caraibes (ensemble deux protocoles)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-01-01

    The French Senate adopted on January 6, 2004 the project of law which authorizes the ratification of the agreement between France, the European atomic energy community and the IAEA about the enforcement of warranties in the framework of the treaty of interdiction of nuclear weapons in South America and in the Caribbean area signed in Vienna (Austria) on March 21, 2000. The text of this treaty is attached to this law. (J.S.)

  4. Non-proliferation of nuclear weapons and nuclear security. IAEA safeguards agreements and additional protocols

    International Nuclear Information System (INIS)

    Lodding, Jan; Kinley, David III

    2002-09-01

    One of the most urgent challenges facing the International Atomic Energy Agency (IAEA) is to strengthen the Agency's safeguards system for verification in order to increase the likelihood of detecting any clandestine nuclear weapons programme in breach of international obligations. The IAEA should be able to provide credible assurance not only about declared nuclear material in a State but also about the absence of undeclared material and activities. Realising the full potential of the strengthened system will require that all States bring into force their relevant safeguards agreements, as well as additional protocols thereto. Today, 45 years after the Agency's foundation, its verification mission is as relevant as ever. This is illustrated by the special challenges encountered with regard to verification in Iraq and North Korea in the past decade. Moreover, the horrifying events of 11 September 2001 demonstrated all too well the urgent need to strengthen worldwide control of nuclear and other radioactive material. The IAEA will continue to assist States in their efforts to counter the spread of nuclear weapons and to prevent, detect and respond to illegal uses of nuclear and radioactive material. Adherence by as many States as possible to the strengthened safeguards system is a crucial component in this endeavour

  5. Implementation of the IAEA Additional Protocol in the Philippines: USDOE/PNRI Cooperation

    Energy Technology Data Exchange (ETDEWEB)

    Sequis, Julietta E.; Cain, Ronald A.; Burbank, Roberta L.; Hansen, Linda H.; VanSickle, Matthew; Killinger, Mark H.; Elkhamri, Oksana O.

    2011-07-19

    The Philippines entered into force the International Atomic Energy Agency (IAEA) Additional Protocol (AP) in February 2010. The Philippine Nuclear Research Institute (PNRI) is the government agency responsible for implementing the AP. In June 2010 the IAEA invited the U.S. Department of Energy (DOE) to help conduct a joint national training seminar on the AP. DOE presented to PNRI its AP international technical assistance program, administered by the International Nuclear Safeguards and Engagement Program (INSEP), which helps partner countries implement the AP. In coordination with the IAEA, DOE established this program in 2008 to complement IAEA AP seminars with long-term country-specific cooperation from the perspective of a Member State. The US version of the AP is the same version as that of non-nuclear weapon states except for the addition of a national security exclusion. Due to this, DOE cooperation with other countries enables the sharing of valuable lessons learned in implementing the AP. DOE/INSEP described to PNRI the various areas of cooperation it offers to interested countries, whether they are preparing for entry into force or already implementing the AP. Even countries that have entered the AP into force are sometimes not fully prepared to implement it well, and welcome cooperation to improve their implementation process. PNRI and DOE/INSEP subsequently agreed to cooperate in several areas to enhance the efficiency and effectiveness of the Philippines AP implementation. These areas include providing working-level training to PNRI staff and preparing an information document that details that training for future reference, assisting with the development of an outreach program and procedures for AP reporting and complementary access, and identifying Annex II equipment and non-nuclear materials whose export must be reported under the AP. DOE laboratory representatives, funded by INSEP, met again with PNRI in February 2011 to provide training for PNRI AP

  6. Report made on behalf of the commission of foreign affairs about the law project, adopted by the Senate, authorizing the ratification of the agreement between the French Republic, the European Atomic Energy Community and the International Atomic Energy Agency relative to the enforcement of warranties in the framework of the treaty of nuclear weapons prohibition in South America and the Caribbeans area (two protocols together)

    International Nuclear Information System (INIS)

    2004-01-01

    This report comments the reasons of the signature of the agreement between France, EURATOM and the IAEA for the reinforcement of IAEA's non-proliferation controls in the South America and Caribbean areas (law project no. 1329). The ratification of this agreement will have only few concrete consequences but will contribute to the promotion of non-proliferation and to the enforcement of warranties in the framework of the treaty of interdiction of nuclear weapons in South America and in the Caribbean area (signed in Vienna, Austria, on March 21, 2000). The commission of foreign affairs adopted this law project on March 3, 2004. (J.S.)

  7. Whither the TPP? Political Economy of Ratification and Effect on Trade Architecture in East Asia

    Directory of Open Access Journals (Sweden)

    Byung-il Choi

    2016-09-01

    Full Text Available In the race for establishing trading architecture consistent with new landscape of the global economy, the US is ahead of the game by concluding the Trans Pacific Partnership Agreement with 11 countries. To make it reality, the ratification is essential. In the battle for ratification in the US, declining globalism confronts rising protectionism. This paper models the ratification process as contest between globalism and protectionism, and analyzes the optimal timing for ratification. Based on this framework, various ratification scenarios are analyzed. The paper argues less likelihood for the lame-duck session passage and more likelihood for prolonged and protracted delay, due to changing political dynamics and declining intellectual support for globalism. Hence, the future of Trans Pacific Partnership Agreement may prove different, compared to the North American Free Trade Agreement and the Korea-US Free Trade Agreement, both of which were renegotiated and ratified eventually. Then, the US would lose the first move advantage. The paper also discusses strategic implications of delayed ratification on the evolution of trading architecture in East Asia.

  8. Comparison of Channel Estimation Protocols for Coherent AF Relaying Networks in the Presence of Additive Noise and LO Phase Noise

    Directory of Open Access Journals (Sweden)

    Stefan Berger

    2010-01-01

    Full Text Available Channel estimation protocols for wireless two-hop networks with amplify-and-forward (AF relays are compared. We consider multiuser relaying networks, where the gain factors are chosen such that the signals from all relays add up coherently at the destinations. While the destinations require channel knowledge in order to decode, our focus lies on the channel estimates that are used to calculate the relay gains. Since knowledge of the compound two-hop channels is generally not sufficient to do this, the protocols considered here measure all single-hop coefficients in the network. We start from the observation that the direction in which the channels are measured determines (1 the number of channel uses required to estimate all coefficient and (2 the need for global carrier phase reference. Four protocols are identified that differ in the direction in which the first-hop and the second-hop channels are measured. We derive a sensible measure for the accuracy of the channel estimates in the presence of additive noise and phase noise and compare the protocols based on this measure. Finally, we provide a quantitative performance comparison for a simple single-user application example. It is important to note that the results can be used to compare the channel estimation protocols for any two-hop network configuration and gain allocation scheme.

  9. Implementation of the Additional Protocol: Verification activities at uranium mines and mills

    International Nuclear Information System (INIS)

    Bragin, V.; Carlson, J.; Leslie, R.

    2001-01-01

    Full text: The mining and milling of uranium is the first in a long chain of processes required to produce nuclear materials in a form suitable for use in nuclear weapons. Misuse of a declared uranium mining/milling facility, in the form of understatement of production, would be hard to detect with the same high level of confidence as afforded by classical safeguards on other parts of the nuclear fuel cycle. For these reasons, it would not be cost-effective to apply verification techniques based on classical safeguards concepts to a mining/milling facility in order to derive assurance of the absence of misuse. Indeed, these observations have been recognised in the Model Protocol (INFCIRC/540): 'the Agency shall not mechanistically or systematically seek to verify' information provided to it by States (Article 4.a.). Nevertheless, complementary access to uranium mining/milling sites 'on a selective basis in order to assure the absence of undeclared nuclear material and activities' (Article 4.a.(i)) is provided for. On this basis, therefore, this paper will focus predominantly on options other than site access, which are available to the Agency for deriving assurance that declared mining/milling operations are not misused. Such options entail the interpretation and analysis of information provided to the Agency including, for example, from declarations, monitoring import/export data, open source reports, commercial satellite imagery, aerial photographs, and information provided by Member States. Uranium mining techniques are diverse, and the inventories, flows and uranium assays which arise at various points in the process will vary considerably between mines, and over the operating cycle of an individual mine. Thus it is essentially impossible to infer any information, which can be used precisely to confirm, or otherwise, declared production by measuring or estimating any of those parameters at points within the mining/milling process. The task of attempting to

  10. The Additional Protocol in the European Union: A EURATOM Safeguards View on the Status of Preparation and Specific EU Issues

    Energy Technology Data Exchange (ETDEWEB)

    Nackaerts, H.; Blohm-Hieber, U. [EC Directorate General for Energy and Transport (Luxembourg). Safeguards and Non-Proliferation

    2003-05-01

    Three Additional Protocols will soon enter into force in the European Union. Their application will present a number of challenges because of the nature of the nuclear fuel cycle in Europe. This fuel cycle was established in the late fifties at a time when nuclear energy was seen as the main energy source for the future. The EURATOM Treaty of 1957 set up the European Atomic Energy Community and required the Community to create the conditions for the establishment and growth of nuclear industries. Far-reaching responsibilities were given to the European Commission in the areas of supply, safeguards and ownership of material. Over the years the nuclear technology became mature and many technological options that were investigated in nuclear research centres of the Member States or the Community were abandoned. Nuclear research programmes were phased out and entire nuclear centres were re-orientated towards non-nuclear technology. This evolution took place in an open, transparent and democratically controlled way, so that any clandestine activities, by states or sub-state groups, could not have gone un-noticed. The implementation of the Additional Protocol in the European Union is being prepared within the Institutional and technical environment as described above. Genuine concerns exist in many places that if the Additional Protocol is implemented to the letter, rather than to the spirit, a lot of unnecessary burden will be put upon the IAEA, the national and regional authorities and the operators. The paper describes how the preparation for the implementation of the additional protocol is being pursued in the EU and what solutions have been found to some of these specific European Union issues.

  11. The entry into force of the Additional Protocol in the European Union: The new dimension of safeguards in Europe

    Energy Technology Data Exchange (ETDEWEB)

    Recio, M. [Deputy Direction General for Nuclear Energy, Direction General for Energy Policy and Mines Ministry of Industry, Tourism and Trade, Paseo de la Castellana, 160 Madrid 28046 (Spain)]. E-mail: MRecio@mityc.es; Prieto, N. [Asesoria Juridica, Direccion de Division Administracion, Enresa, c/Emilio Vargas, 7, Madrid 28043 (Spain)]. E-mail: nprs@enresa.es

    2006-07-01

    The Additional Protocol to the Safeguards Agreement with the International Atomic Energy Agency (IAEA) has entered into force on 30 April 2004. This completes the implementation in the EU of what undoubtedly represents the most ambitious project undertaken by the IAEA, designed to reinforce its current safeguards system, a project that the international community considers to be a key component strengthening the fight against one of the most serious threats for world security: nuclear proliferation. (author)

  12. The entry into force of the Additional Protocol in the European Union: The new dimension of safeguards in Europe

    International Nuclear Information System (INIS)

    Recio, M.; Prieto, N.

    2006-01-01

    The Additional Protocol to the Safeguards Agreement with the International Atomic Energy Agency (IAEA) has entered into force on 30 April 2004. This completes the implementation in the EU of what undoubtedly represents the most ambitious project undertaken by the IAEA, designed to reinforce its current safeguards system, a project that the international community considers to be a key component strengthening the fight against one of the most serious threats for world security: nuclear proliferation. (author)

  13. Safeguards agreement and additional protocol - IAEA instruments for control of nuclear materials distribution and their application in Tajikistan

    International Nuclear Information System (INIS)

    Nasrulloev, Kh.; Mirsaidov, U.

    2010-01-01

    Full text: It is known that IAEA plays an important role in facilitation of nuclear non-proliferation as international authority which carries out nuclear inspections. Republic of Tajikistan in 1997 signed nuclear weapon non-proliferation treaty. Then in 2004 Safeguards agreement, additional protocol and small quantity protocol were signed. During 5 years Republic of Tajikistan submits information on its nuclear activity as declarations, foreseen in article 2.3 of Additional protocol to Safeguards agreement. Currently 66 declarations are submitted. Information required in accordance with Safeguards agreement and Additional Protocol is figured on that IAEA could compile more detailed and exact conception about nuclear activity in Tajikistan and it has the following purpose: information will lead to more transparency, and make it possible to IAEA to ensure with high extent of confidence that in the framework of declared program, any unstated nuclear activity is concealed; the more exact and comprehensive information, the rare is questions and discrepancies are originating; required information is the basis for effective planning and IAEA activity realization, related not only with safeguards implementation in regard to declared nuclear material but also ensuring of confidence in absence of undeclared nuclear activity in Tajikistan. IAEA inspection mission consisting of Messrs. N.Lazarev and F. Coillou visited Dushanbe in 2008 for verification of republic’s declarations on account for and control of nuclear materials under Additional protocol and Small quantity protocol, as well as consultations were provided on correct declaration completing and providing information on all nuclear materials. Besides, in 2006, the training course was conducted in Chkalovsk with participation of Commonwealth of Independent States countries on Safeguards agreement and Additional protocol. These visits and events will facilitate to strengthening of weapons of mass destruction non

  14. Additionality and permanence standards in California's Forest Offset Protocol: A review of project and program level implications.

    Science.gov (United States)

    Ruseva, T; Marland, E; Szymanski, C; Hoyle, J; Marland, G; Kowalczyk, T

    2017-08-01

    A key component of California's cap-and-trade program is the use of carbon offsets as compliance instruments for reducing statewide GHG emissions. Under this program, offsets are tradable credits representing real, verifiable, quantifiable, enforceable, permanent, and additional reductions or removals of GHG emissions. This paper focuses on the permanence and additionality standards for offset credits as defined and operationalized in California's Compliance Offset Protocol for U.S. Forest Projects. Drawing on a review of the protocol, interviews, current offset projects, and existing literature, we discuss how additionality and permanence standards relate to project participation and overall program effectiveness. Specifically, we provide an overview of offset credits as compliance instruments in California's cap-and-trade program, the timeline for a forest offset project, and the factors shaping participation in offset projects. We then discuss the implications of permanence and additionality at both the project and program levels. Largely consistent with previous work, we find that stringent standards for permanent and additional project activities can present barriers to participation, but also, that there may be a trade-off between project quality and quantity (i.e. levels of participation) when considering overall program effectiveness. We summarize what this implies for California's forest offset program and provide suggestions for improvements in light of potential program diffusion and policy learning. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. Protocol Additional to the agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the application of safeguards in France

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between France, the European Atomic Energy Community and the International Atomic Energy Agency for the Application of Safeguards in France is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998. Pursuant to Article 16 of the Additional Protocol, the Protocol entered into force on 30 April 2004, the date on which the Agency received written notification that the European Atomic Energy Community and France had met their respective internal requirements for entry into force

  16. Protocol Additional to the Agreement between the People's Republic of China and the International Atomic Energy Agency for the Application of Safeguards in China

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of China and the International Atomic Energy Agency for the application of safeguards in China is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 31 December 1998. Pursuant to Article 10 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from China written notification that China's statutory and constitutional requirements for entry into force have been met, i.e. on 28 March 2002

  17. A simple protocol for the michael addition of indoles with electron ...

    Indian Academy of Sciences (India)

    Tetrabutylammonium hydrogen sulfate catalysed addition of indoles to electron deficient olefins in water generated the corresponding Michael adducts in good to excellent yield. The Michael addition of indole occurred regioselectively at position 3 and the -alkylated products have not been observed. The synthesized ...

  18. Protocol Additional to the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America

    International Nuclear Information System (INIS)

    2009-01-01

    The text of the Protocol Additional to the Agreement between the United States of America and the International Atomic Energy Agency for the Application of Safeguards in the United States of America is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 11 June 1998. It was signed in Vienna on 12 June 1998

  19. A comparison of the additional protocols of the five nuclear weapon states and the ensuing safeguards benefits to international nonproliferation efforts

    Energy Technology Data Exchange (ETDEWEB)

    Uribe, Eva C [Los Alamos National Laboratory; Sandoval, M Analisa [Los Alamos National Laboratory; Sandoval, Marisa N [Los Alamos National Laboratory; Boyer, Brian D [Los Alamos National Laboratory; Leitch, Rosalyn M [Los Alamos National Laboratory

    2009-01-01

    With the 6 January 2009 entry into force of the Additional Protocol by the United States of America, all five declared Nuclear Weapon States that are part of the Nonproliferation Treaty have signed, ratified, and put into force the Additional Protocol. This paper makes a comparison of the strengths and weaknesses of the five Additional Protocols in force by the five Nuclear Weapon States with respect to the benefits to international nonproliferation aims. This paper also documents the added safeguards burden to the five declared Nuclear Weapon States that these Additional Protocols put on the states with respect to access to their civilian nuclear programs and the hosting of complementary access activities as part of the Additional Protocol.

  20. A simple protocol for the michael addition of indoles with electron ...

    Indian Academy of Sciences (India)

    Administrator

    alkylated indoles involves the conjugate addition of indoles to α, β-unsaturated compounds in the presence of either protic or Lewis acids. The Lewis acids employed include InCl3,. 9. Zr(OTf)2,. 10. SmI3,. 11. CeCl3⋅7H2O–NaI. 12. However, most ...

  1. 76 FR 24854 - Proposed Information Collection; Comment Request; Additional Protocol Report Forms

    Science.gov (United States)

    2011-05-03

    ... commercial nuclear and nuclear-related items, materials, and activities that may be used for peaceful nuclear purposes, but also would be necessary elements for a nuclear weapons program. These forms provides the IAEA with information about additional aspects of the U.S. commercial nuclear fuel cycle, including: Mining...

  2. Protocol to amend the convention on third party liability in the field of nuclear energy of 29 July 1960, as amended by the additional protocol of 28 January 1964 and by the protocol of 16 November 1982

    International Nuclear Information System (INIS)

    Johnston, Donald; )

    2004-01-01

    The governments of Germany, Belgium, Denmark, Spain, Finland, France, Greece, Italy, Norway, Netherlands, Portugal, United Kingdom, Slovenia, Sweden, Switzerland and Turkey; considering that it is desirable to amend the Convention on Third Party Liability in the Field of Nuclear Energy, concluded at Paris on 29 July 1960 within the framework of the Organisation for European Economic Co-operation, now the Organisation for Economic Co-operation and Development, as amended by the Additional Protocol signed at Paris on 28 January 1964 and by the Protocol signed at Paris on 16 November 1982; have agreed that the Convention shall be amended again. This document presents the modifications given to the text in 6 different languages

  3. PRECISE - pregabalin in addition to usual care for sciatica: study protocol for a randomised controlled trial.

    Science.gov (United States)

    Mathieson, Stephanie; Maher, Christopher G; McLachlan, Andrew J; Latimer, Jane; Koes, Bart W; Hancock, Mark J; Harris, Ian; Day, Richard O; Pik, Justin; Jan, Stephen; Billot, Laurent; Lin, Chung-Wei Christine

    2013-07-11

    Sciatica is a type of neuropathic pain that is characterised by pain radiating into the leg. It is often accompanied by low back pain and neurological deficits in the lower limb. While this condition may cause significant suffering for the individual, the lack of evidence supporting effective treatments for sciatica makes clinical management difficult. Our objectives are to determine the efficacy of pregabalin on reducing leg pain intensity and its cost-effectiveness in patients with sciatica. PRECISE is a prospectively registered, double-blind, randomised placebo-controlled trial of pregabalin compared to placebo, in addition to usual care. Inclusion criteria include moderate to severe leg pain below the knee with evidence of nerve root/spinal nerve involvement. Participants will be randomised to receive either pregabalin with usual care (n = 102) or placebo with usual care (n = 102) for 8 weeks. The medicine dosage will be titrated up to the participant's optimal dose, to a maximum 600 mg per day. Follow up consultations will monitor individual progress, tolerability and adverse events. Usual care, if deemed appropriate by the study doctor, may include a referral for physical or manual therapy and/or prescription of analgesic medication. Participants, doctors and researchers collecting participant data will be blinded to treatment allocation. Participants will be assessed at baseline and at weeks 2, 4, 8, 12, 26 and 52. The primary outcome will determine the efficacy of pregabalin in reducing leg pain intensity. Secondary outcomes will include back pain intensity, disability and quality of life. Data analysis will be blinded and by intention-to-treat. A parallel economic evaluation will be conducted from health sector and societal perspectives. This study will establish the efficacy of pregabalin in reducing leg pain intensity in patients with sciatica and provide important information regarding the effect of pregabalin treatment on disability and quality of life

  4. Improving a mother to child HIV transmission programme through health system redesign: quality improvement, protocol adjustment and resource addition.

    Directory of Open Access Journals (Sweden)

    Michele S Youngleson

    Full Text Available BACKGROUND: Health systems that deliver prevention of mother to child transmission (PMTCT services in low and middle income countries continue to underperform, resulting in thousands of unnecessary HIV infections of newborns each year. We used a combination of approaches to health systems strengthening to reduce transmission of HIV from mother to infant in a multi-facility public health system in South Africa. METHODOLOGY/PRINCIPAL FINDINGS: All primary care sites and specialized birthing centers in a resource constrained sub-district of Cape Metro District, South Africa, were enrolled in a quality improvement (QI programme. All pregnant women receiving antenatal, intrapartum and postnatal infant care in the sub-district between January 2006 and March 2009 were included in the intervention that had a prototype-innovation phase and a rapid spread phase. System changes were introduced to help frontline healthcare workers to identify and improve performance gaps at each step of the PMTCT pathway. Improvement was facilitated and spread through the use of a Breakthrough Series Collaborative that accelerated learning and the spread of successful changes. Protocol changes and additional resources were introduced by provincial and municipal government. The proportion of HIV-exposed infants testing positive declined from 7.6% to 5%. Key intermediate PMTCT processes improved (antenatal AZT increased from 74% to 86%, PMTCT clients on HAART at the time of labour increased from 10% to 25%, intrapartum AZT increased from 43% to 84%, and postnatal HIV testing from 79% to 95% compared to baseline. CONCLUSIONS/SIGNIFICANCE: System improvement methods, protocol changes and addition/reallocation of resources contributed to improved PMTCT processes and outcomes in a resource constrained setting. The intervention requires a clear design, leadership buy-in, building local capacity to use systems improvement methods, and a reliable data system. A systems improvement

  5. The Fiscal Pact and the Problem of its Ratification - Selected Aspects

    Directory of Open Access Journals (Sweden)

    Andrzej Borodo

    2013-12-01

    Full Text Available The treaty on Stability, Coordination and Governance in the Economic and Monetary Union dated 2 March 2012 (called the fiscal act is the law rela-ting to the economic and budgetary matters of the Member States of the European Union, mainly to the deficit and public debt. The treaty in focus encroaches on the budgetary powers of the Parliament and the government. On February 2012, the Parliament passed the act of law entitling the President of the Republic of Poland to ratify the treaty. The procedure for the ratification of the treaty appears to be questionable. A question arises whether the content of the treaty justifies the adoption of the law authorizing the ratification by ordinary or qualified majority (in accordance with Article 89, paragraph 1 of the Constitution, or paragraph 1 and 2 of Article 90 of the Constitution.

  6. Pre-Ratification Judicial Review of International Agreements to be Concluded by the European Union

    DEFF Research Database (Denmark)

    Butler, Graham

    2018-01-01

    incrementally shaping the law of EU external relations, and determining the manner in which the Union may enter into formal international relations. Understanding the Court’s importance in this field has been done time and again, but yet, consideration of the pre-ratification judicial review option, available...... for how ex ante judicial review can work in developing the Union into an even more enhanced global actor, through its own unique judicial order....

  7. Convention on nuclear safety. Signature, ratification, acceptance, approval or accession. Status as of 17 March 1997

    International Nuclear Information System (INIS)

    1997-01-01

    The document presents the status as of 17 March 1997 of signature, ratification, acceptance, approval or accession by Member States of the Convention on Nuclear Safety adopted on 17 June 1994 by the Diplomatic Conference convened by the IAEA at its Headquarters between 14-17 June 1994. The Convention entered into force on 24 October 1996. There are 65 signatories and 35 parties. Reservations/declarations deposited upon signature are also included

  8. U.S. Ratification of the Chemical Weapons Convention

    Science.gov (United States)

    2011-12-01

    given their opposing political views, the two senators had good personal chemistry and managed to reach agreement on an additional half-dozen...senators explaining various aspects of the CWC and clarifying misconceptions . Augmenting the official public relations campaign, a group of

  9. Model protocol additional to the agreement(s) between state(s) and the International Atomic Energy Agency for the application of safeguards

    International Nuclear Information System (INIS)

    1997-09-01

    This document is a model Additional Protocol designed for States having a Safeguards Agreement with the Agency, in order to strengthen the effectiveness and improve the efficiency of the safeguard system as a contribution to global nuclear non-proliferation objectives

  10. Model Protocol Additional to the Agreement(s) between State(s) and the International Atomic Energy Agency for the application of safeguards

    International Nuclear Information System (INIS)

    1998-12-01

    This document is a model Additional Protocol designed for States having a Safeguards Agreement with the Agency, in order to strengthen the effectiveness and improve the efficiency of the safeguards system as a contribution to global nuclear non-proliferation objectives

  11. Guidelines and format for preparation and submission of declarations pursuant to Articles 2 and 3 of the Model Protocol Additional to Safeguards Agreements

    International Nuclear Information System (INIS)

    2004-01-01

    The information to be provided to the International Atomic Energy Agency (hereinafter referred to as 'the Agency') by States under an additional protocol (INFCIRC/540) is identified in Article 2. The timing with which the information is to be provided is specified in Article 3. It was widely recognized during the negotiation of the additional protocol that States and the Agency would need explanation and guidance, regarding the information to be declared, beyond that possible to incorporate in the language of the protocol itself. The Board of Governors, meeting in special session on 15 May 1997 to approve the additional protocol, was assured that such guidance would be quickly available to States. The initial Additional Protocol Reporting Guidelines, drawing from Programme 93+2 documentation and the negotiating record of Committee 24, were published in August 1997. A simplified set of Guidelines was subsequently produced for States whose safeguards agreement includes a small quantities protocol. The Guidelines serve two purposes. First, they provide specificity as to what information is required and at what level of detail. Second, the Guidelines provide a consistent reporting format. The Guidelines have been supplemented with Agency developed software, the PROTOCOL REPORTER, which simplifies the process through which States can prepare and submit their declarations electronically. There is no legal requirement that States follow the Guidelines in preparing and submitting their Article 2 declarations. However, if States submit declarations prepared according to these Guidelines, it will reduce greatly the Agency's workload in processing, reviewing and storing the information provided. With minor exceptions, all States that have submitted declarations prior to 2004 have followed the Guidelines. The process of improving the Guidelines, based on the cumulative experience of States and the Agency, began in mid-2002. The process involved the development of a detailed

  12. Guidelines and format for preparation and submission of declarations pursuant to Articles 2 and 3 of the Model Protocol Additional to Safeguards Agreements

    International Nuclear Information System (INIS)

    2005-01-01

    The information to be provided to the International Atomic Energy Agency (hereinafter referred to as 'the Agency') by States under an additional protocol (INFCIRC/540) is identified in Article 2. The timing with which the information is to be provided is specified in Article 3. It was widely recognized during the negotiation of the additional protocol that States and the Agency would need explanation and guidance, regarding the information to be declared, beyond that possible to incorporate in the language of the protocol itself. The Board of Governors, meeting in special session on 15 May 1997 to approve the additional protocol, was assured that such guidance would be quickly available to States. The initial Additional Protocol Reporting Guidelines, drawing from Programme 93+2 documentation and the negotiating record of Committee 24, were published in August 1997. A simplified set of Guidelines was subsequently produced for States whose safeguards agreement includes a small quantities protocol. The Guidelines serve two purposes. First, they provide specificity as to what information is required and at what level of detail. Second, the Guidelines provide a consistent reporting format. The Guidelines have been supplemented with Agency developed software, the PROTOCOL REPORTER, which simplifies the process through which States can prepare and submit their declarations electronically. There is no legal requirement that States follow the Guidelines in preparing and submitting their Article 2 declarations. However, if States submit declarations prepared according to these Guidelines, it will reduce greatly the Agency's workload in processing, reviewing and storing the information provided. With minor exceptions, all States that have submitted declarations prior to 2004 have followed the Guidelines. The process of improving the Guidelines, based on the cumulative experience of States and the Agency, began in mid-2002. The process involved the development of a detailed

  13. Global warming and environmental production efficiency ranking of the Kyoto Protocol nations.

    Science.gov (United States)

    Feroz, Ehsan H; Raab, Raymond L; Ulleberg, Gerald T; Alsharif, Kamal

    2009-02-01

    This paper analyzes the United Nations Organization's Kyoto Protocol nations to address two questions. First, what are the environmental production efficiency rankings of these nations? Second, is there a relationship between a nation's ratification status and its environmental production efficiency ranking? Our findings suggest that the nations that have ratified the Kyoto Protocol are more likely to be environmentally production efficient as compared to the nations that have not ratified the Protocol.

  14. Remote Sensing and the Kyoto Protocol: A Workshop Summary

    Science.gov (United States)

    Rosenqvist, Ake; Imhoff, Marc; Milne, Anthony; Dobson, Craig

    2000-01-01

    The Kyoto Protocol to the United Nations Framework Convention on Climate Change contains quantified, legally binding commitments to limit or reduce greenhouse gas emissions to 1990 levels and allows carbon emissions to be balanced by carbon sinks represented by vegetation. The issue of using vegetation cover as an emission offset raises a debate about the adequacy of current remote sensing systems and data archives to both assess carbon stocks/sinks at 1990 levels, and monitor the current and future global status of those stocks. These concerns and the potential ratification of the Protocol among participating countries is stimulating policy debates and underscoring a need for the exchange of information between the international legal community and the remote sensing community. On October 20-22 1999, two working groups of the International Society for Photogrammetry and Remote Sensing (ISPRS) joined with the University of Michigan (Michigan, USA) to convene discussions on how remote sensing technology could contribute to the information requirements raised by implementation of, and compliance with, the Kyoto Protocol. The meeting originated as a joint effort between the Global Monitoring Working Group and the Radar Applications Working Group in Commission VII of the ISPRS, co-sponsored by the University of Michigan. Tile meeting was attended by representatives from national government agencies and international organizations and academic institutions. Some of the key themes addressed were: (1) legal aspects of transnational remote sensing in the context of the Kyoto Protocol; (2) a review of the current and future and remote sensing technologies that could be applied to the Kyoto Protocol; (3) identification of areas where additional research is needed in order to advance and align remote sensing technology with the requirements and expectations of the Protocol; and 94) the bureaucratic and research management approaches needed to align the remote sensing

  15. Protocol additional to the agreement between Australia and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Agreement (INFCIRC/217) concluded between Australia and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons. Conclusion of the Additional Protocol was authorized by the Board of Governors on 23 September 1997 and signed in Vienna on the same date. The Additional Protocol entered into force on 12 December 1997

  16. Vicissitudes of Nagoya Protocol in Colombia

    International Nuclear Information System (INIS)

    Rojas Blanco, Diana Lorena

    2013-01-01

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.

  17. Brazil and the strengthening of safeguard system of the International Atomic Energy Agency: from the four-part agreement to the additional protocol

    International Nuclear Information System (INIS)

    Moura, Carmen Lidia Richter Ribeiro

    2001-01-01

    The main objective of this paper is to analyse the evolution of IAEA verification system, that constitutes one of the main fundaments of the Non-proliferation nuclear weapons regimen, and to point out elements that contribute to inform the Brazilian position related to the Model Protocol additional to agreements for safeguard application: instrument that comprehend the most recent multilateral efforts of the nuclear verification

  18. The Kyoto Protocol: one more stage in the climate change negotiations

    International Nuclear Information System (INIS)

    Maruri Londono, Enrique

    1998-02-01

    This article notices on the internal difficulties that will be generated around the ratification of the Kyoto Protocol in developed countries as United States, Canada and Japan, given the position of industries like the vehicles and the energetic, that try to dilate the commitments assumed in December of 1997. It is emphasized in the North American case, taking into account their contribution in the global greenhouse gases emissions and the importance of their participation in an international agreement on the topic of the climate change, assuming a critical position about the Senate's decision of conditioning the agreement's ratification to the assumption of commitments of developing countries

  19. Protocol Additional to the agreement between the Government of the Republic of South Africa and the International Atomic Energy Agency for the application of safeguards in connection With the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Government of the Republic of South Africa and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002. It was signed in Vienna on 13 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of South Africa and the Agency, i.e. on 13 September 2002

  20. Protocol Additional to the agreement between the Republic of Colombia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America

    International Nuclear Information System (INIS)

    2009-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Colombia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 25 November 2004. It was signed in Vienna on 11 May 2005. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 5 March 2009, the date on which the Agency received from Colombia written notification that Colombia's statutory and constitutional requirements for entry into force had been met

  1. Protocol Additional to the Agreement between Saint Kitts and Nevis and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non‑Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Protocol Additional to the Agreement between Saint Kitts and Nevis and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 10 September 2013. It was signed on 16 April 2014 in Basseterre, Saint Kitts and Nevis, and on 19 May 2014 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 May 2014, upon signature by the representatives of Saint Kitts and Nevis and the Agency

  2. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2013-01-01

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 22 March 2013, upon signature by the representatives of the Denmark and the Agency.

  3. Protocol Additional to the Agreement Between the Republic of Burundi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Burundi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 13 June 2007. It was signed in Vienna on 27 September 2007. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 27 September 2007, upon signature by the representatives of Burundi and the Agency

  4. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met

  5. Protocol additional to the agreement between the Republic of Mali and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Republic of Mali and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 10 September 2002. It was signed in Vienna on 12 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Mali and the Agency, i.e. on 12 September 2002

  6. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met [fr

  7. Protocol additional to the agreement between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2001-01-01

    The text of the Protocol Additional to the Safeguards Agreement' concluded between the People's Republic of Bangladesh and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 September 2000. It was signed in Vienna on 30 March 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Bangladesh and the Agency, i.e. on 30 March 2001

  8. Protocol Additional to the agreement between the Republic of Madagascar and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Madagascar and the Agency, i.e., on 18 September 2003

  9. Protocol Additional to the agreement between the Republic of Malta and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Malta and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 28 November 2002. It was signed on 24 April 2003 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 12 July 2005, the date on which the Agency received from Malta written notification that Malta's statutory and constitutional requirements for entry into force had been met

  10. Protocol Additional to the agreement between the Republic of Palau and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Palau and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 1 March 2005. It was signed on 10 May 2005 in New York and 13 May 2005 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 13 May 2005, upon signature by the representatives of Palau and the Agency

  11. Protocol between the government of the Republic of Latvia and the International Atomic Energy Agency additional to the agreement for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Latvia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 December 2000. It was signed in Vienna on 12 July 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Latvia and the Agency, i.e. on 12 July 2001

  12. Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Botswana and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 20 September 2005. It was signed on 21 July 2006 in Gaborone, Botswana, and on 24 August 2006 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 August 2006, upon signature by the representatives of Botswana and the Agency

  13. Protocol Additional to the agreement between the Government of Iceland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Government of Iceland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 9 September 2003. It was signed in Vienna on 12 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Iceland and the Agency, i.e., on 12 September 2003

  14. Protocol Additional to the agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Afghanistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 1 March 2005. It was signed on 19 July 2005 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 July 2005, upon signature by the representatives of Afghanistan and the Agency

  15. Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Kazakhstan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 18 June 2003. It was signed on 6 February 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 9 May 2007, the date on which the Agency received from Kazakhstan written notification that Kazakhstan's statutory and constitutional requirements for entry into force had been met [es

  16. Protocol Additional to the agreement between Ukraine and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 January 2006, the date on which the Agency received from Ukraine written notification that Ukraine's constitutional requirements for entry into force had been met

  17. REVIEW OF THE NEGOTIATION OF THE MODEL PROTOCOL ADDITIONAL TO THE AGREEMENT(S) BETWEEN STATE(S) AND THE INTERNATIONAL ATOMIC ENERGY AGENCY FOR THE APPLICATION OF SAFEGUARDS, INFCIRC/540 (Corrected) VOLUME II/III IAEA COMMITTEE 24, Major Issues Underlying the Model Additional Protocol (1996-1997).

    Energy Technology Data Exchange (ETDEWEB)

    Rosenthal, M.D.; Saum-Manning, L.; Houck, F.

    2010-01-01

    Volume I of this Review traces the origins of the Model Additional Protocol. It covers the period from 1991, when events in Iraq triggered an intensive review of the safeguards system, until 1996, when the IAEA Board of Governors established Committee 24 to negotiate a new protocol to safeguards agreement. The period from 1991-1996 set the stage for this negotiation and shaped its outcome in important ways. During this 5-year period, many proposals for strengthening safeguards were suggested and reviewed. Some proposals were dropped, for example, the suggestion by the IAEA Secretariat to verify certain imports, and others were refined. A rough consensus was established about the directions in which the international community wanted to go, and this was reflected in the draft of an additional protocol that was submitted to the IAEA Board of Governors on May 6, 1996 in document GOV/2863, Strengthening the Effectiveness and Improving the Efficiency of the Safeguards System - Proposals For Implementation Under Complementary Legal Authority, A Report by the Director General. This document ended with a recommendation that, 'the Board, through an appropriate mechanism, finalize the required legal instrument taking as a basis the draft protocol proposed by the Secretariat and the explanation of the measures contained in this document.'

  18. Vienna convention on civil liability for nuclear damage. Signatures, ratifications, accessions and successions and text of reservations/declarations. Status as of 31 December 1996

    International Nuclear Information System (INIS)

    1997-01-01

    The document refers to the Vienna Convention on Civil Liability for Nuclear Damage (IAEA-INFCIRC-500), giving the status of signatures, ratifications, accessions and successions, and the texts of reservations/declarations as of 31 December 1996

  19. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Entry into Force

    International Nuclear Information System (INIS)

    2012-01-01

    Pursuant to Article 17 of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Additional Protocol), the Additional Protocol, which had been applied provisionally from 17 February 2010, entered into force on 10 October 2012, the date upon which the Agency received written notification from Iraq that Iraq's statutory and/or constitutional requirements for entry into force had been met [es

  20. The decision-making process in Brazil's ratification of the World Health Organization Framework Convention on Tobacco Control.

    Science.gov (United States)

    Rangel, Erica Cavalcanti; Pereira, Andre; Cavalcante, Tania Maria; Oliveira, Egléubia Andrade; Silva, Vera Luiza da Costa E

    2017-09-21

    Tobacco consumption is a leading cause of various types of cancer and other tobacco-related diseases. In 2003, the World Health Assembly adopted the World Health Organization Framework Convention on Tobacco Control (WHO-FCTC), which aims to protect citizens from the health, social, environmental, and economic consequences of tobacco consumption and exposure to tobacco smoke. The Convention was to be ratified by the Member States of the WHO; in Brazil's case, ratification involved the National Congress, which held public hearings in the country's leading tobacco growing communities (municipalities). The current study analyzes this decision-making process according to the different interests, positions, and stakeholders. In methodological terms, this is a qualitative study based on document research, drawing primarily on the shorthand notes from the public hearings. We analyze the interests and arguments for and against ratification. The article shows that although preceded by intense debates, the final decision in favor of ratification was made by a limited group of government stakeholders, characterizing a decision-making process similar to a funnel.

  1. Making a Historical Survey of a State's Nuclear Ambitions. Impact of Historical Developments of a State's National Nuclear Non-Proliferation Policy on Additional Protocol Implementation

    International Nuclear Information System (INIS)

    Jonter, Thomas

    2003-03-01

    In 1998, SKI initiated a project to conduct a historical survey of the Swedish nuclear weapons research for the period 1945-1972. IAEA became interested and accepted it in 2000 as a support program task to increase transparency and to support the implementation of the Additional Protocol in Sweden. The main purpose of the Additional Protocol is to make the IAEA control system more efficient with regard to nuclear material, facilities and research. Other countries have now shown interest to follow the Swedish example and to make their own reviews of their past nuclear energy and nuclear weapons research. The most important aim is to produce basic information for IAEA on the nuclear activities of the past and to refine and strengthen the instruments of the Safeguard System within the Additional Protocol. The first objective of this report is to present a short summary of the Swedish historical survey, as well as similar projects in other countries dealing with nuclear-related and nuclear weapons research reviews. These tasks are dealt with in chapter 2. Secondly, the objective is to present a general model of how a national base survey can be designed. The model is based on the Swedish experiences and it has been designed to also serve as a guideline for other countries to strengthen their safeguards systems within the framework of the Additional Protocol. Since other States declared that they would make similar historical surveys, the SKI decided to work out a model that could be used by other countries intending to conduct such studies. Estonia, Latvia and Lithuania are participating in a co-operation project to carry out such nationally base surveys under the auspices of the Swedish Nuclear Power Inspectorate. Finland is also conducting such a survey, but it is done independently, albeit in close exchange of views between SKI and its Finnish counterpart, STUK. This is described in chapter 3. The third objective is to develop a pedagogic methodology for teaching

  2. Protocol Additional to the Agreement between Mongolia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between Mongolia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 September 2001. It was signed in Vienna on 5 December 2001

  3. Protocol between the Democratic Republic of Congo and the International Atomic Energy Agency Additional to the Agreement for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Zaire and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT)1 is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 28 November 2002. It was signed in Vienna on 9 April 2003

  4. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010

  5. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 9 October 2008 in Vienna

  6. Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 September 1997. It was signed in Vienna on 30 September 1997

  7. Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 9 March 2004. It was signed on 10 March 2004 in Vienna

  8. Protocol Additional to the Agreement between the Republic of Singapore and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Singapore and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 20 September 2005. It was signed in Vienna on 22 September 2005

  9. Protocol Additional to the Agreement between the Republic of Panama and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement 1 concluded between the Republic of Panama and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America (TLATELOLCO) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 29 November 2001. It was signed in the City of Panama on 11 December 2001

  10. Protocol Additional to the Agreement between Mauritius and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol Additional to the Agreement between Mauritius and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 14 September 2004. It was signed on 9 December 2004 in Vienna

  11. Protocol Additional to the Agreement between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1999-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/524) concluded between the Principality of Monaco and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 30 September 1999, and entered into force on the same date

  12. Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 22 April 2010 in Berlin, Germany, and on 26 April 2010 in Vienna, Austria

  13. Protocol Additional to the Agreement between the Government of the Republic of Turkey and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Turkey and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 June 2000. It was signed in Vienna on 6 July 2000

  14. Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed on 5 May 2007 in Lilongwe, Malawi, and on 26 July 2007 in Vienna, Austria

  15. Protocol Additional to the Agreement between Uruguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between Uruguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 23 September 1997. It was signed in Vienna on 29 September 1997

  16. Protocol Additional to the Agreement between the Republic of The Gambia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the Republic of The Gambia and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2010. It was signed on 7 October 2011 in Banjul, The Gambia, and on 18 October 2011 in Vienna, Austria

  17. Protocol Additional to the Agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 12 June 1998 [fr

  18. Protocol Additional to the Agreement between Canada and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 24 September 1998 [fr

  19. Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003 [fr

  20. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2013-01-01

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria

  1. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria [fr

  2. Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non- Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna [fr

  3. Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 22 April 2010 in Berlin, Germany, and on 26 April 2010 in Vienna, Austria [fr

  4. Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed on 5 May 2007 in Lilongwe, Malawi, and on 26 July 2007 in Vienna, Austria [fr

  5. Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 9 March 2004. It was signed on 10 March 2004 in Vienna [fr

  6. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2013-01-01

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria [fr

  7. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010 [fr

  8. Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 September 1997. It was signed in Vienna on 30 September 1997 [fr

  9. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 9 October 2008 in Vienna [fr

  10. Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003

  11. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-09-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010

  12. Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non- Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol Additional to the Agreement between Ukraine and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 15 August 2000 in Vienna [es

  13. Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Socialist People's Libyan Arab Jamahiriya and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 9 March 2004. It was signed on 10 March 2004 in Vienna [es

  14. Protocol Additional to the Agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 12 June 1998 [es

  15. Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Lesotho and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 22 April 2010 in Berlin, Germany, and on 26 April 2010 in Vienna, Austria [es

  16. Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2007-01-01

    The text of the Protocol Additional to the Agreement between the Government of the Republic of Malawi and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed on 5 May 2007 in Lilongwe, Malawi, and on 26 July 2007 in Vienna, Austria [es

  17. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria [es

  18. Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of the Philippines and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 September 1997. It was signed in Vienna on 30 September 1997 [es

  19. Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Iraq and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 24 September 2008. It was signed on 9 October 2008 in Vienna [es

  20. Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2013-01-01

    The text of the Protocol Additional to the Agreement between the Government of the Kingdom of Denmark and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 5 March 2013. It was signed on 22 March 2013 in Vienna, Austria [es

  1. Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Madagascar and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 18 June 2003. It was signed in Vienna on 18 September 2003 [es

  2. Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Kingdom of Swaziland and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 4 March 2008. It was signed in Vienna on 23 July 2010 [es

  3. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria

  4. Protocol Additional to the Agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 12 June 1998

  5. Protocol Additional to the agreement between New Zealand and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/185) concluded between New Zealand and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and it entered into force on the same date

  6. Protocol additional to the agreement between the Holy See and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/187) concluded between the Holy See and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, and signed in Vienna on 24 September 1998, when it entered into force

  7. Protocol Additional to the Agreement between the Republic of Uzbekistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/508) concluded between the Republic of Uzbekistan and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 22 September 1998, and applied provisionally as from the date of signature

  8. Protocol additional to the agreement between the Hashemite Kingdom of Jordan and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-08-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/258) concluded between the Hashemite Kingdom of Jordan and the IAEA for the application of safeguards in connection with the Treaty for the Non-proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 18 March 1998 and it entered into force on 28 july 1998

  9. Protocol additional to the agreement between the Government of the Republic of Ghana and the International Atomic Energy Agency for the application of safeguards in connection with the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    1998-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement (INFCIRC/226) concluded between the Government of the Republic of Ghana and the IAEA for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT). The Additional Protocol was approved by the Board of Governors on 11 June 1998, and signed in Vienna on 12 June 1998. Pending entry into force, the Protocol is being applied provisionally as from the date of signature, i.e. 12 June 1998

  10. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (Chinese Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met.

  11. Protocol Additional to the agreement between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between Canada and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 24 September 1998. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from Canada written notification that Canada's statutory and/or constitutional requirements for entry into force have been met, i.e. on 8 September 2000

  12. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met

  13. Protocol Additional to the agreement between the Republic of Azerbaijan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Azerbaijan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 7 June 2000. It was signed in Vienna on 5 July 2000. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from Azerbaijan written notification that Azerbaijan's statutory and/or constitutional requirements for entry into force have been met, i.e. on 29 November 2000

  14. Protocol Additional to the agreement between the Czech Republic and the International Atomic Energy Agency for the application of safeguards in connection With the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Czech Republic and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 20 September 1999. It was signed in Vienna on 28 September 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on the date on which the Agency received from the Czech Republic written notification that the Czech Republic's statutory and/or constitutional requirements for entry into force have been met, i.e. on 1 July 2002

  15. Protocol Additional to the Agreement between the Republic of Montenegro and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Montenegro and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 13 June 2007. It was signed on 26 May 2008 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 4 March 2011, the date on which the Agency received from the Republic of Montenegro written notification that Montenegro's statutory and constitutional requirements for entry into force had been met

  16. Protocol Additional to the Agreement Between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2009. It was signed in Vienna on 8 April 2009. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 December 2010, the date on which the Agency received from the United Arab Emirates written notification that the United Arab Emirates' statutory and constitutional requirements for entry into force had been met

  17. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met.

  18. Protocol Additional to the Agreement of 30 January 1973 between Morocco and the Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement of 30 January 1973 between the Government of the Kingdom of Morocco and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 22 September 2004 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 21 April 2011, the date on which the Agency received from the Kingdom of Morocco written notification that Morocco's statutory and constitutional requirements for entry into force had been met

  19. Protocol Additional to the agreement between the Union of the Comoros and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2009-01-01

    The text of the Protocol Additional to the Agreement between the Union of the Comoros and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed in Vienna on 13 December 2005. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 January 2009, the date on which the Agency received from the Union of the Comoros written notification that Comoros' statutory and constitutional requirements for entry into force had been met

  20. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met [fr

  1. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (French Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met. [fr

  2. Protocol Additional to the Agreement Between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2009. It was signed in Vienna on 8 April 2009. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 December 2010, the date on which the Agency received from the United Arab Emirates written notification that the United Arab Emirates' statutory and constitutional requirements for entry into force had been met [fr

  3. Protocol additional to the agreement between the Republic of Tajikistan and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement concluded between the Republic of Tajikistan and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 12 June 2002. It was signed on 2 July 2003 in Vienna and on 7 July 2003 in Tashkent. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 14 December 2004, the date on which the Agency received from the Republic of Tajikistan written notification that the Republic of Tajikistan's statutory and/or constitutional requirements for entry into force had been met

  4. Protocol additional to the agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the United Republic of Tanzania and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2004. It was signed on 23 September 2004 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 7 February 2005, the date on which the Agency received from the United Republic of Tanzania written notification that the United Republic of Tanzania's statutory and/or constitutional requirements for entry into force had been met

  5. Protocol Additional to the agreement between the Republic of Cyprus and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Cyprus and the International Atomic Energy Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 25 November 1998. It was signed in Vienna on 29 July 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 February 2003, the date on which the Agency received from the Republic of Cyprus written notification that Cyprus' statutory and constitutional requirements for entry into force had been met

  6. Protocol Additional to the Agreement between the Republic of Mozambique and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Mozambique and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 22 November 2007. It was signed on 23 June 2010 in Lisbon, Portugal, and on 8 July 2010 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 March 2011, the date on which the Agency received from the Republic of Mozambique written notification that Mozambique's statutory and constitutional requirements for entry into force had been met

  7. Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Socialist Republic of Viet Nam and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 6 March 2007. It was signed on 10 August 2007 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 17 September 2012, the date on which the Agency received from the Socialist Republic of Viet Nam written notification that Vietnam's statutory and constitutional requirements for entry into force had been met [es

  8. Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (Spanish Edition)

    International Nuclear Information System (INIS)

    2012-01-01

    The text of the Protocol Additional to the Agreement between the Principality of Andorra and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 December 2000. It was signed in Vienna, Austria on 9 January 2001. 2. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 December 2011, the date on which the Agency received from the Principality of Andorra written notification that its statutory and constitutional requirements for entry into force had been met. [es

  9. Protocol Additional to the Agreement Between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the United Arab Emirates and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 3 March 2009. It was signed in Vienna on 8 April 2009. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 20 December 2010, the date on which the Agency received from the United Arab Emirates written notification that the United Arab Emirates' statutory and constitutional requirements for entry into force had been met [es

  10. Protocol Additional to the agreement between the Swiss Confederation and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Swiss Confederation and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 7 June 2000. It was signed on 16 June 2000 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 1 February 2005, the date upon which the Agency received from the Swiss Confederation written notification that the Swiss Confederation's statutory and/or constitutional requirements for entry into force had been met

  11. Protocol Additional to the agreement between the Republic of Seychelles and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Seychelles and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Protocol Additional on 18 March 2003. It was signed on 29 March 2004 in Windhoek and on 7 April 2004 in Vienna. Pursuant to Article 17 of the Protocol Additional, the Protocol entered into force on 13 October 2004, the date on which the Agency received from the Republic of Seychelles written notification that the Republic of Seychelles's statutory and/or constitutional requirements for entry into force had been met

  12. Protocol Additional to the agreement between the Republic of Chile and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Chile and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 10 September 2002. It was signed in Vienna on 19 September 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 3 November 2003, the date on which the Agency received from Chile written notification that Chile's statutory and/or constitutional requirements for entry into force had been met

  13. Decree No. 77-888 of 1 August 1977 publishing the Additional Protocol to the Convention of 19 January 1967, amended by the Protocol of 6 July 1971, between France, the Federal Republic of Germany and the United Kingdom on construction and operation of a very high flux reactor

    International Nuclear Information System (INIS)

    1977-01-01

    The Additional Protocol published by this Decree amends the 1967 Convention on the very high flux reactor at Grenoble, amended by the Protocol of 1974. The main modification concerns the expenditure, fixed by unanimous agreement each year by the Steering Committee of the Institute housing the Project and the partners in the frame of medium-term programming. (NEA) [fr

  14. 3 July 1985: Convention signed in Brussels on 31 January 1963, supplementary to the Paris Convention of 29 July 1960 on Third Party Liability in the Field of Nuclear Energy and Act approving the Protocols to amend the Paris Convention and the Brussels Supplementary Convention

    International Nuclear Information System (INIS)

    1985-01-01

    This Act refers to the Brussels Supplementary Convention approved by Belgium in 1966 and ratified on 20 August 1985 and approves ratification of the Protocols of 16 November 1982 to amend the Paris Convention and the Brussels Supplementary Convention respectively. The Protocols are reproduced in French, Dutch and German. (NEA) [fr

  15. Assessing technical competence in laparoscopic surgery in France: Ratification of the GOALS rating scale.

    Science.gov (United States)

    Panel, P; Niro, J; Neveu, M-E; Compan, C; Botchorishvili, R; Celhay, O

    2017-09-01

    The question of assessing surgical competence is the focus of mainly Anglo-Saxon studies. The GOALS questionnaire (Global Operative Assessment of Laparoscopic Skills) specific to laparoscopic surgery assessment has been developed since 2005. The aim of the study was to assess the metrological qualities of the GOALS questionnaire after ratification in French language. To produce a French version of the GOALS surgical competence assessing tool according to an established method (translation - backward translation - retranslation) and to check the metrological qualities (user satisfaction, acceptability, reliability and validity) of this questionnaire through observing residents while in training program on 22 residents in Gynaecology Obstetrics during the laparoscopy training, with the performance of a nephrectomy on a porcine model. The discrepancies in the initial translations were mainly due literal translations. Only synonymous differences were observed in the two backward translations. Comparison with original version led to 8 minor changes. No changes occurred between the 2 French versions. Satisfaction surveys when using the GOALS questionnaire by both examiners and students are similar. Face and content validity seemed good and there is no significant discrepancy between the examiners and the students (11.5 [9-15]; 12.4 [9-15]; P=0.40). Assessment by examiners showed an median value of 17.8 [9-26] with good correlation (α=0.80). By contrast, self-assessment, although there is no significant discrepancy, showed heterogeneity. GOALS French version was able to prove a significant progression both in self-assessment and external evaluation between the act performed on the first nephrectomy on the first day of the first session of the training and the fourth nephrectomy performed on the first day of the second session of the training. Our work allowed obtaining a GOALS French version with acceptable validity, good consistency between the assessments and

  16. Self reported awareness of child maltreatment among school professionals in Saudi Arabia: impact of CRC ratification.

    Science.gov (United States)

    AlBuhairan, Fadia S; Inam, Sarah S; AlEissa, Majid A; Noor, Ismail K; Almuneef, Maha A

    2011-12-01

    The Convention on the Rights of the Child (CRC) was ratified by Saudi Arabia 15 years ago; yet addressing the issue of child maltreatment only began in more recent years. School professionals play a significant role in children's lives, as they spend a great deal of time with them and are hence essential to protecting and identifying those in danger or at risk. The objective of this study is to identify school professional's awareness of child maltreatment and the existing national policies and procedures to examine the extent of efforts made in Saudi Arabia and to activate the roles of schools and school professionals in protecting children from violence and implementation of Article 19 of the CRC. This was a cross-sectional study, where school professionals from randomly selected schools throughout the country were invited to participate in a self-administered questionnaire. A total of 3,777 school professionals participated in the study. Fifty-five percent of professionals had at least 10 years of work experience. A low-level of awareness of child maltreatment was found in about 1/3 of school professionals. Only 1.9% of school professionals had ever attended any sort of specific training on child maltreatment, though 69.3% of those who had not, were willing to attend future training. With regards to awareness of CRC Article 19 or policies and procedures addressing child maltreatment, only 22% reported being aware of it. The majority of school professionals in Saudi Arabia have a low-intermediate level of awareness of child maltreatment, ratification of CRC, and related national policies and procedures, yet most are willing to attend training programs on this subject matter. Efforts need to be made in the country to fill this gap. Copyright © 2011 Elsevier Ltd. All rights reserved.

  17. Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics is reproduced in this document for the information of all Members. The Board of Governors approved the Protocol on 21 March 2000. It was signed on 22 March 2000 in Vienna. Pursuant to Article 11 of the Additional Protocol, the Protocol entered into force on 16 October 2007, the date on which the Agency received from the Russian Federation written notification that the procedures of the Russian Federation required for entry into force had been met

  18. Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics is reproduced in this document for the information of all Members. The Board of Governors approved the Protocol on 21 March 2000. It was signed on 22 March 2000 in Vienna. Pursuant to Article 11 of the Additional Protocol, the Protocol entered into force on 16 October 2007, the date on which the Agency received from the Russian Federation written notification that the procedures of the Russian Federation required for entry into force had been met [fr

  19. Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics

    International Nuclear Information System (INIS)

    2008-01-01

    The text of the Protocol between the Russian Federation and the International Atomic Energy Agency Additional to the Agreement between the Union of Soviet Socialist Republics and the International Atomic Energy Agency for the Application of Safeguards in the Union of Soviet Socialist Republics is reproduced in this document for the information of all Members. The Board of Governors approved the Protocol on 21 March 2000. It was signed on 22 March 2000 in Vienna. Pursuant to Article 11 of the Additional Protocol, the Protocol entered into force on 16 October 2007, the date on which the Agency received from the Russian Federation written notification that the procedures of the Russian Federation required for entry into force had been met [es

  20. Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1999-01-01

    The document reproduces the text of the Protocol Additional to the Agreement between the Republic of Indonesia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on Non-Proliferation of Nuclear Weapons (NPT), which was approved by the Board of Governors on 20 September 1999 and signed in Vienna on 29 September 1999. The Protocol entered into force on 29 September 1999

  1. Protocol Additional to the Agreement between the Government of the Republic of Lithuania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Government of the Republic of Lithuania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 8 December 1997, signed in Vienna on 11 March 1998, and entered into force on 5 July 2000

  2. Protocol Additional to the Agreement between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Slovenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 22 August 2000

  3. Protocol Additional to the Agreement between the Government of Japan and the International Atomic Energy Agency in implementation of Article III.1 and 4 of the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The document reproduces the text of the Protocol Additional to the Agreement between the Government of Japan and the International Atomic Energy Agency in implementation of Article III.1 and 4 of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), which was approved by the Board of Governors on 25 November 1998 and signed in Vienna on 4 December 1998. The Protocol entered into force on 16 December 1998

  4. Protocol Additional to the Agreement between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the People's Republic of Bulgaria and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The Protocol was approved by the Board of Governors on 14 September 1998, signed in Vienna on 24 September 1998, and entered into force on 10 October 2000

  5. Geneva protocols

    International Nuclear Information System (INIS)

    Kimminich, O.

    1990-01-01

    The First Protocol Additional to the Geneva Conventions of 1949 and relating to the Protection of Victims of International Armed Conflicts contains provisions prohibiting indiscriminate attacks. Nuclear warfare as such is not mentioned in the Protocol. It has been asserted that the Protocol does not apply to nuclear weapons for several reasons. However, close analysis shows that the rules governing the application of means and methods of warfare cannot exempt the nuclear weapons. If nuclear weapons are applied in a manner not consistent with article 51 of Protocol I, their use is forbidden by this article even in situations in which general international law might grant an exception from the ban on nuclear weapons, as in the case of reprisal. (orig./HSCH) [de

  6. Claims to success: advocacy for the protocol on the rights of women in Africa – solidarity for African women’s rights and the use of information and communication technologies

    NARCIS (Netherlands)

    K. Kemp (Karoline)

    2010-01-01

    textabstractThe goal of this particular research has been to examine the role of information and communication technologies (ICTs) in policy advocacy as applied by civil society. Taking the Solidarity for African Women’s Rights coalition and their work towards the ratification of the Protocol on

  7. Protocol to amend the convention on third party liability in the field of nuclear energy of 29th July 1960, as amended by the additional protocol of 28th January 1964, Paris, 16 November 1982

    International Nuclear Information System (INIS)

    1983-01-01

    This Protocol further amends the Convention on Third Party Liability in the Field of Nuclear Energy of 29 July 1960, concluded between the Federal Republic of Germany, Austria, Belgium, Denmark, Spain, Finland, France, Greece, Italy, Luxembourg, Norway, Netherlands, Portugal, United Kingdom, Sweden, Switzerland and Turkey within the framework of the Organisation for Economic Co-operation and Development. (U.K.)

  8. Hyperventilation and photic stimulation are useful additions to a placebo-based suggestive seizure induction protocol in patients with psychogenic nonepileptic seizures.

    Science.gov (United States)

    Popkirov, Stoyan; Grönheit, Wenke; Wellmer, Jörg

    2015-05-01

    The early and definitive diagnosis of psychogenic nonepileptic seizures is a common challenge in epileptology practice. Suggestive seizure induction is a valuable tool to aid the differentiation between epileptic and psychogenic nonepileptic seizures, especially when long-term video-EEG monitoring is inconclusive or unavailable. In this retrospective analysis, we compared the diagnostic yield of a classical, placebo-based induction protocol with that of an extended protocol that includes hyperventilation and photic stimulation as means of suggestion while also implementing more open, standardized patient information. We investigated whether the diversification of suggestive seizure induction has an effect on diagnostic yield and whether it preempts the administration of placebo. Data from 52 patients with confirmed psychogenic nonepileptic seizures were analyzed. While suggestive seizure induction using only placebo-based suggestion provoked a typical event in 13 of 20 patients (65%), the extended protocol was positive in 27 of 34 cases (84%); this improvement was not significant (p=0.11). Noninvasive suggestion techniques accounted for 78% of inductions, avoiding placebo administration in a majority of patients. Still, placebo remains an important part of suggestive seizure induction, responsible for 22% (6 out of 27) of successful inductions using our extended protocol. Our study demonstrates that the diversification of suggestive seizure induction is feasible and beneficial for both patients and diagnosticians. Copyright © 2015 Elsevier Inc. All rights reserved.

  9. Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    1997-01-01

    The document reproduces the text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Armenia and the IAEA for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). It was approved by the Board of Governors on 23 September 1997, signed in Vienna on 29 September 1997, and it will enter into force on the date the Agency receives written notification that Armenia's statutory and/or constitutional requirements for entry into force have been met. Pending entry into force, this Protocol shall apply provisionally from the date of signature, i.e., 29 September 1997

  10. Carbon emissions. The economic benefits of the Kyoto Protocol.

    Science.gov (United States)

    De Leo, G A; Rizzi, L; Caizzi, A; Gatto, M

    2001-10-04

    The third Conference of the Parties in Kyoto set the target of reducing greenhouse-gas emissions by an average of 5.3% with respect to 1990 values by 2008-2012. One of the main objections to the protocol's ratification is that compliance would pose an unbearable economic burden on the countries involved. But we show here that this is not the case if costs apart from the direct costs of energy production are also considered. Costs are also incurred in rectifying damage to human health, material goods, agriculture and the environment related to greenhouse-gas emissions.

  11. NGSI student activities in open source information analysis in support of the training program of the U.S. DOE laboratories for the entry into force of the additional protocol

    Energy Technology Data Exchange (ETDEWEB)

    Sandoval, M Analisa [Los Alamos National Laboratory; Uribe, Eva C [Los Alamos National Laboratory; Sandoval, Marisa N [Los Alamos National Laboratory; Boyer, Brian D [Los Alamos National Laboratory; Stevens, Rebecca S [Los Alamos National Laboratory

    2009-01-01

    In 2008 a joint team from Los Alamos National Laboratory (LANL) and Brookhaven National Laboratory (BNL) consisting of specialists in training of IAEA inspectors in the use of complementary access activities formulated a training program to prepare the U.S. Doe laboratories for the entry into force of the Additional Protocol. As a major part of the support of the activity, LANL summer interns provided open source information analysis to the LANL-BNL mock inspection team. They were a part of the Next Generation Safeguards Initiative's (NGSI) summer intern program aimed at producing the next generation of safeguards specialists. This paper describes how they used open source information to 'backstop' the LANL-BNL team's effort to construct meaningful Additional Protocol Complementary Access training scenarios for each of the three DOE laboratories, Lawrence Livermore National Laboratory, Idaho National Laboratory, and Oak Ridge National Laboratory.

  12. Projected balance of units during the first commitment period of the Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Brown, L. [Ministry for the Environment, Wellington (New Zealand); Patterson, K. [Ministry of Economic Development, Wellington (New Zealand); Rys, G. [Ministry of Agriculture and Forestry, Wellington (New Zealand)

    2005-05-15

    This report updates New Zealand's projected emissions and removals of greenhouse gases during the first commitment period (2008-2012) of the Kyoto Protocol. The update is based on the latest national inventory of greenhouse gas emissions and removals submitted to the United Nations Framework Convention on Climate Change secretariat on 15 April 2005. As at May 2005, New Zealand is projected to have deficit of units over the first commitment period of the Kyoto Protocol. The balance of units is projected to range between -11.3 Mt CO2e (95% CI) under an optimistic scenario and -62.6 Mt CO2e (95% CI) under a pessimistic scenario. The best estimate of the balance of units is -36.2 Mt CO2e. There is a range of 51Mt CO2e between the optimistic and pessimistic scenarios. This uncertainty reflects the difficulty in modelling the complex interactions of the New Zealand energy sector, projecting agricultural markets and animal productivity, estimating the reductions from the climate change policy package and predicting removals from forest sinks prior to the New Zealand Carbon Accounting System being operational. In addition, a review has highlighted that a number of improvements are required in the model used for CO2 emissions from the energy and industrial processes sector. The updated projection shows a substantial decrease from the 32.6 Mt CO2e surplus in the previous projection (May 2004) and the 55 Mt CO2e surplus projected prior to ratification of the Kyoto Protocol. The decrease from the 2004 projection is due primarily to an increase in projected energy and industrial processes emissions and a decrease in the removals via forest sinks. The decrease in removals is due to the quantification of previously unknown risks and updating of previous estimates with improved scientific information.

  13. Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons. Amendment of Article 17

    International Nuclear Information System (INIS)

    1999-01-01

    The document reproduces the amendment to the Article 17 of the Protocol Additional to the Agreement between the Republic of Armenia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons. The amendment was approved by the Board of Governors in June 1999, and entered into force on 10 September 1999

  14. Protocol Additional to the agreement between the Republic of Hungary and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Hungary and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 25 November 1998, signed in Vienna on 26 November 1998, and entered into force on 4 April 2000

  15. Protocol Additional the the agreement between the Republic of Croatia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Croatia and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 14 September 1998, signed in Vienna on 22 September 1998, and entered into force on 6 July 2000

  16. Protocol Additional to the agreement between the Republic of Poland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The document reproduces the text of the Protocol Additional to the agreement between the Republic of Poland and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 23 September 1997, signed in Vienna on 30 September 1997, and entered into force on 5 May 2000

  17. Protocol Additional to the agreement between the Kingdom of Norway and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-05-01

    The document reproduces the text of the Protocol Additional to the agreement between the Kingdom of Norway and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 24 March 1999, signed in Vienna on 29 September 1999, and entered into force on 16 May 2000

  18. Clean energy exports and the Kyoto Protocol

    International Nuclear Information System (INIS)

    Bramley, M.

    2002-01-01

    This paper discussed Canada's attempt in international negotiations to gain credits for energy exports that may result in greenhouse gas emission reductions in the United States. It examined how well founded this position is from an environmental perspective and in terms of international equity and political reality. The author emphasized that the clean energy export issue does not provide a legitimate reason to delay Canada's ratification of the Kyoto Protocol, and cautioned that further renegotiation of Kyoto targets for the first commitment period would not be practical and would jeopardize Canada's international standing. The author did note, however, that for the second commitment period, this issue could be reintroduced. Although the problem can potentially be resolved by granting credits to producers and exempting emissions, it was suggested that the most effective approach would be for countries to factor energy export considerations into their negotiating positions

  19. After Indonesia’s Ratification: The ASEAN Agreement on Transboundary Haze Pollution and Its Effectiveness As a Regional Environmental Governance Tool

    Directory of Open Access Journals (Sweden)

    Daniel Heilmann

    2015-01-01

    Full Text Available On 20 January 2015 Indonesia deposited its instrument of ratification for the ASEAN Agreement on Transboundary Haze Pollution with the ASEAN Secretariat, becoming the last ASEAN member state to join the treaty. Haze pollution poses a serious health threat to the people of Indonesia, Singapore and Malaysia, and for decades haze pollution has been a highly contentious issue among ASEAN member states. This article argues that Indonesia’s ratification will not be an immediate game changer. The mechanisms of the agreement are too weak to contribute much to a reduction of haze pollution in the region. The agreement is designed according to the ASEAN way: a non-binding approach that is based on the principles of state sovereignty and non-intervention. This makes it unlikely that the agreement itself will bring about change, even now that all ASEAN member states have ratified it.

  20. Report on the behalf of the Foreign Affairs, Defence and Armed Forces Commission on: the bill project (accelerated procedure) authorizing the ratification of the joint procurement agreement for a designation by auction of common bid platforms, and the bill project (accelerated procedure) authorizing the ratification of the joint procurement agreement for a designation by auction of an auction monitor. Nr 171

    International Nuclear Information System (INIS)

    Boulaud, Didier

    2011-01-01

    This document first presents the currently operating greenhouse gas emission quota trading scheme and its evolution according to which quotas will be put up for auction. Then, it more precisely describes different aspects of this arrangement: general economy of the auction system, common auction platforms, auction monitor, and market procedures. Consequences on the French law are presented. The ratification procedure is discussed

  1. Protocols to Amend the Paris, Vienna and Brussels Supplementary Conventions and the Convention on Supplementary Compensation for Nuclear Damage: Status of their Implementation into National Legislation

    International Nuclear Information System (INIS)

    Schwartz, J.

    2006-01-01

    Over the last decade, a number of very significant developments have taken place in modernising the existing international nuclear liability regimes. The first major advancement was the adoption, in September 1997, of the Protocol to amend the 1963 Vienna Convention on Civil Liability for Nuclear Damage (VC Protocol) and of a new Convention on Supplementary Compensation for Nuclear Damage (CSC). This was followed, in February 2004, by the adoption of Protocols to amend both the 1960 Paris Convention on Third Party Liability in the Field of Nuclear Energy (PC Protocol) and the 1963 Brussels Convention Supplementary to the Paris Convention (BSC Protocol). The principle goal of all these new instruments is to provide a greater amount of compensation to a larger number of victims in respect of a broader scope of nuclear damage suffered as a result of a nuclear accident. The second, but still very important objective is the maintenance of compatibility between the revised Paris and Vienna Conventions to ensure the smooth functioning of the 1988 Joint Protocol Relating to the Application of the Vienna Convention (VC) and the Paris Convention (PC). In addition, the PC States wish to ensure that their newly revised Convention will not prevent a Contracting Party from joining the more global regime established by the CSC. However, it remains to be seen to what extent these new instruments will attract a sufficient number of adherents to make them truly effective. While the VC Protocol is already in force, it has not drawn wide support from the 1963 VC States or from countries with important nuclear generating capacity which have not yet joined that latter any Convention. In addition, notwithstanding its adoption almost 10 years ago, the CSC has not yet entered into force and it remains questionable whether it will ever attract the necessary number of adherents for that purpose, especially in light of its strict requirements in this regard. As for the PC and BSC Protocols to

  2. Additional Effects of a Physical Therapy Protocol on Headache Frequency, Pressure Pain Threshold, and Improvement Perception in Patients With Migraine and Associated Neck Pain: A Randomized Controlled Trial.

    Science.gov (United States)

    Bevilaqua-Grossi, Débora; Gonçalves, Maria Claudia; Carvalho, Gabriela Ferreira; Florencio, Lidiane Lima; Dach, Fabíola; Speciali, José Geraldo; Bigal, Marcelo Eduardo; Chaves, Thaís Cristina

    2016-06-01

    To evaluate the additional effect provided by physical therapy in migraine treatment. Randomized controlled trial. Tertiary university-based hospital. Among the 300 patients approached, 50 women (age range, 18-55y) diagnosed with migraine were randomized into 2 groups: a control group (n=25) and a physiotherapy plus medication group (n=25) (N=50). Both groups received medication for migraine treatment. Additionally, physiotherapy plus medication patients received 8 sessions of physical therapy over 4 weeks, comprised mainly of manual therapy and stretching maneuvers lasting 50 minutes. A blinded examiner assessed the clinical outcomes of headache frequency, intensity, and self-perception of global change and physical outcomes of pressure pain threshold and cervical range of motion. Data were recorded at baseline, posttreatment, and 1-month follow-up. Twenty-three patients experienced side effects from the medication. Both groups reported a significantly reduced frequency of headaches; however, no differences were observed between groups (physiotherapy plus medication patients showed an additional 18% improvement at posttreatment and 12% improvement at follow-up compared with control patients, P>.05). The reduction observed in the physiotherapy plus medication patients was clinically relevant at posttreatment, whereas clinical relevance for control patients was demonstrated only at follow-up. For pain intensity, physiotherapy plus medication patients showed statistical evidence and clinical relevance with reduction posttreatment (P<.05). In addition, they showed better self-perception of global change than control patients (P<.05). The cervical muscle pressure pain threshold increased significantly in the physiotherapy plus medication patients and decreased in the control patients, but statistical differences between groups were observed only in the temporal area (P<.05). No differences were observed between groups regarding cervical range of motion. We cannot

  3. The ADDITION-Cambridge trial protocol: a cluster – randomised controlled trial of screening for type 2 diabetes and intensive treatment for screen-detected patients

    Directory of Open Access Journals (Sweden)

    Kinmonth Ann

    2009-05-01

    Full Text Available Abstract Background The increasing prevalence of type 2 diabetes poses a major public health challenge. Population-based screening and early treatment for type 2 diabetes could reduce this growing burden. However, the benefits of such a strategy remain uncertain. Methods and design The ADDITION-Cambridge study aims to evaluate the effectiveness and cost-effectiveness of (i a stepwise screening strategy for type 2 diabetes; and (ii intensive multifactorial treatment for people with screen-detected diabetes in primary care. 63 practices in the East Anglia region participated. Three undertook the pilot study, 33 were allocated to three groups: no screening (control, screening followed by intensive treatment (IT and screening plus routine care (RC in an unbalanced (1:3:3 randomisation. The remaining 27 practices were randomly allocated to IT and RC. A risk score incorporating routine practice data was used to identify people aged 40–69 years at high-risk of undiagnosed diabetes. In the screening practices, high-risk individuals were invited to take part in a stepwise screening programme. In the IT group, diabetes treatment is optimised through guidelines, target-led multifactorial treatment, audit, feedback, and academic detailing for practice teams, alongside provision of educational materials for newly diagnosed participants. Primary endpoints are modelled cardiovascular risk at one year, and cardiovascular mortality and morbidity at five years after diagnosis of diabetes. Secondary endpoints include all-cause mortality, development of renal and visual impairment, peripheral neuropathy, health service costs, self-reported quality of life, functional status and health utility. Impact of the screening programme at the population level is also assessed through measures of mortality, cardiovascular morbidity, health status and health service use among high-risk individuals. Discussion ADDITION-Cambridge is conducted in a defined high-risk group

  4. Piloting the addition of contingency management to best practice counselling as an adjunct treatment for rural and remote disordered gamblers: study protocol

    Science.gov (United States)

    Christensen, Darren R; Witcher, Chad S G; Leighton, Trent; Hudson-Breen, Rebecca; Ofori-Dei, Samuel

    2018-01-01

    Introduction Problematic gambling is a significant Canadian public health concern that causes harm to the gambler, their families, and society. However, a significant minority of gambling treatment seekers drop out prior to the issue being resolved; those with higher impulsivity scores have the highest drop-out rates. Consequently, retention is a major concern for treatment providers. The aim of this study is to investigate the efficacy of internet-delivered cognitive behavioural therapy (CBT) and internet-delivered CBT and contingency management (CM+) as treatments for gambling disorder in rural Albertan populations. Contingency management (CM) is a successful treatment approach for substance dependence that uses small incentives to reinforce abstinence. This approach may be suitable for the treatment of gambling disorder. Furthermore, internet-delivered CM may hold particular promise in rural contexts, as these communities typically struggle to access traditional clinic-based counselling opportunities. Methods and analysis 54 adults with gambling disorder will be randomised into one of two conditions: CM and CBT (CM+) or CBT alone (CBT). Gambling will be assessed at intake, every treatment session, post-treatment, and follow-up. The primary outcome measures are treatment attendance, gambling abstinence, gambling, gambling symptomatology, and gambling urge. In addition, qualitative interviews assessing study experiences will be conducted with the supervising counsellor, graduate student counsellors, study affiliates, and a subset of treatment seekers. This is the first study to use CM as a treatment for gambling disorder in rural and remote populations. Ethics and dissemination This study was approved by the University of Lethbridge’s Human Subject Research Committee (#2016–080). The investigators plan to publish the results from this study in academic peer-reviewed journals. Summary information will be provided to the funder. Trial registration number NCT

  5. Piloting the addition of contingency management to best practice counselling as an adjunct treatment for rural and remote disordered gamblers: study protocol.

    Science.gov (United States)

    Christensen, Darren R; Witcher, Chad S G; Leighton, Trent; Hudson-Breen, Rebecca; Ofori-Dei, Samuel

    2018-04-03

    Problematic gambling is a significant Canadian public health concern that causes harm to the gambler, their families, and society. However, a significant minority of gambling treatment seekers drop out prior to the issue being resolved; those with higher impulsivity scores have the highest drop-out rates. Consequently, retention is a major concern for treatment providers. The aim of this study is to investigate the efficacy of internet-delivered cognitive behavioural therapy (CBT) and internet-delivered CBT and contingency management (CM+) as treatments for gambling disorder in rural Albertan populations. Contingency management (CM) is a successful treatment approach for substance dependence that uses small incentives to reinforce abstinence. This approach may be suitable for the treatment of gambling disorder. Furthermore, internet-delivered CM may hold particular promise in rural contexts, as these communities typically struggle to access traditional clinic-based counselling opportunities. 54 adults with gambling disorder will be randomised into one of two conditions: CM and CBT (CM+) or CBT alone (CBT). Gambling will be assessed at intake, every treatment session, post-treatment, and follow-up. The primary outcome measures are treatment attendance, gambling abstinence, gambling, gambling symptomatology, and gambling urge. In addition, qualitative interviews assessing study experiences will be conducted with the supervising counsellor, graduate student counsellors, study affiliates, and a subset of treatment seekers. This is the first study to use CM as a treatment for gambling disorder in rural and remote populations. This study was approved by the University of Lethbridge's Human Subject Research Committee (#2016-080). The investigators plan to publish the results from this study in academic peer-reviewed journals. Summary information will be provided to the funder. NCT02953899; Pre-results. © Article author(s) (or their employer(s) unless otherwise stated in

  6. Addition of telephone coaching to a physiotherapist-delivered physical activity program in people with knee osteoarthritis: A randomised controlled trial protocol

    Directory of Open Access Journals (Sweden)

    Bennell Kim L

    2012-12-01

    data. Follow-up assessments will also occur at 12 and 18 months. Discussion The findings will help determine whether the addition of telephone coaching sessions can improve sustainability of outcomes from a physiotherapist-delivered physical activity intervention in people with knee OA. Trial Registration Australian New Zealand Clinical Trials Registry reference: ACTRN12612000308897

  7. Efficacy of the addition of positive airway pressure to conventional chest physiotherapy in resolution of pleural effusion after drainage: protocol for a randomised controlled trial.

    Science.gov (United States)

    da Conceição Dos Santos, Elinaldo; Lunardi, Adriana Claudia

    2015-04-01

    Chest drainage for pleural effusion can cause pain and changes in respiratory function. It can also increase the risk of pulmonary complications and impair functional ability, which may increase length of hospital stay and the associated costs. For these reasons, surgical and clinical strategies have been adopted to reduce the duration of chest drainage. To evaluate the efficacy of the addition of intermittent positive airway pressure applied by the Muller reanimator via a rubber facial mask versus conventional physiotherapy on the duration of chest drainage (primary objective), and its effect on the recovery of respiratory function, length of hospital stay and incidence of pulmonary complications (secondary objectives). Randomised, controlled trial. Inpatients with pleural effusion, aged over 18 years, who have had chest drainage in situ for physiotherapy), a conventional chest physiotherapy group (conventional chest physiotherapy plus non-therapeutic positive airway pressure at 4 cmH2O) or a control group (non-therapeutic positive airway pressure at 4 cmH2O). All groups will receive treatment three times per day for 7 consecutive days. A blinded assessor will conduct all assessments. Peripheral oxygenation and chest drainage output will be measured over 7 consecutive days. Lung function will be re-assessed on Day 4 and Day 8. The criteria for removal of the chest drain will be a transudate output ≤ 200ml over 24hours and full lung expansion on chest radiography, as assessed by a blinded physician. Duration of chest drainage, length of hospital stay, and any pulmonary complications diagnosed during hospitalisation will be recorded. Intention to treat using: survival analysis for duration of chest drainage, and length of hospital stay; analysis of variance for chest-tube output, lung function and peripheral oxygen saturation; and chi-square tests for comparing the incidence of pulmonary complications between groups. Conventional chest physiotherapy and

  8. Optimising corticosteroid injection for lateral epicondylalgia with the addition of physiotherapy: A protocol for a randomised control trial with placebo comparison

    Directory of Open Access Journals (Sweden)

    Brooks Peter

    2009-06-01

    Full Text Available Abstract Background Corticosteroid injection and physiotherapy are two commonly prescribed interventions for management of lateral epicondylalgia. Corticosteroid injections are the most clinically efficacious in the short term but are associated with high recurrence rates and delayed recovery, while physiotherapy is similar to injections at 6 weeks but with significantly lower recurrence rates. Whilst practitioners frequently recommend combining physiotherapy and injection to overcome harmful effects and improve outcomes, study of the benefits of this combination of treatments is lacking. Clinicians are also faced with the paradox that the powerful anti-inflammatory corticosteroid injections work well, albeit in the short term, for a non-inflammatory condition like lateral epicondylalgia. Surprisingly, these injections have not been rigorously tested against placebo injections. This study primarily addresses both of these issues. Methods A randomised placebo-controlled clinical trial with a 2 × 2 factorial design will evaluate the clinical efficacy, cost-effectiveness and recurrence rates of adding physiotherapy to an injection. In addition, the clinical efficacy and adverse effects of corticosteroid injection beyond that of a placebo saline injection will be studied. 132 participants with a diagnosis of lateral epicondylalgia will be randomly assigned by concealed allocation to one of four treatment groups – corticosteroid injection, saline injection, corticosteroid injection with physiotherapy or saline injection with physiotherapy. Physiotherapy will comprise 8 sessions of elbow manipulation and exercise over an 8 week period. Blinded follow-up assessments will be conducted at baseline, 4, 8, 12, 26 and 52 weeks after randomisation. The primary outcome will be a participant rating of global improvement, from which measures of success and recurrence will be derived. Analyses will be conducted on an intention-to-treat basis using linear

  9. The Text of the Agreement of 5 April 1973 between The Netherlands and the Agency for the Application of Safeguards with respect to Surinam in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons and Additional Protocol I to the Treaty for the Prohibition of Nuclear Weapons in Latin America

    International Nuclear Information System (INIS)

    1976-01-01

    The text of the Agreement of 5 April 1973, and of the two Protocols thereto, between The Netherlands and the Agency for the application of safeguards with respect to Surinam in connection with the Treaty on the Non-Proliferation of Nuclear Weapons and with Additional Protocol I to the Treaty for the Prohibition of Nuclear Weapons in Latin America is reproduced in this document for the information of all Members.The Agreement and the two Protocols thereto entered into force on 5 June 1975, pursuant to Article 24 of the Agreement and to Article II of each of the Protocols.

  10. [International regulation of ethics committees on biomedical research as protection mechanisms for people: analysis of the Additional Protocol to the Convention on Human Rights and Biomedicine, concerning Biomedical Research of the Council of Europe].

    Science.gov (United States)

    de Lecuona, Itziar

    2013-01-01

    The article explores and analyses the content of the Council of Europe's Additional Protocol to the Convention on Human Rights and Biomedicine concerning Biomedical Research regarding the standard legal instrument in biomedical research, issued by an international organization with leadership in bioethics. This implies ethics committees are mechanisms of protection of humans in biomedical research and not mere bureaucratic agencies and that a sound inescapable international regulatory framework exists for States to regulate biomedical research. The methodology used focuses on the analysis of the background, the context in which it is made and the nature and scope of the Protocol. It also identifies and analyses the characteristics and functions of ethics committees in biomedical research and, in particular, the information that should be provided to this bodies to develop their functions previously, during and at the end of research projects. This analysis will provide guidelines, suggestions and conclusions for the awareness and training of members of these committees in order to influence the daily practice. This paper may also be of interest to legal practitioners who work in different areas of biomedical research. From this practical perspective, the article examines the legal treatment of the Protocol to meet new challenges and classic issues in research: the treatment of human biological samples, the use of placebos, avoiding double standards, human vulnerability, undue influence and conflicts of interest, among others. Also, from a critical view, this work links the legal responses to develop work procedures that are required for an effective performance of the functions assigned of ethics committees in biomedical research. An existing international legal response that lacks doctrinal standards and provides little support should, however, serve as a guide and standard to develop actions that allow ethics committees -as key bodies for States- to advance in

  11. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  12. Protocol Additional to the Agreement between the Dominican Republic and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Dominican Republic and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed in Vienna on 20 September 2007

  13. Protocol Additional to the Agreement between the Republic of Guatemala and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin-America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2009-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Guatemala and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 29 November 2001. It was signed in Guatemala City on 14 December 2001

  14. Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for teh Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002 [fr

  15. Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for teh Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002

  16. Protocol Additional to the Agreement between the Dominican Republic and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    The text of the Protocol Additional to the Agreement between the Dominican Republic and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 23 November 2006. It was signed in Vienna on 20 September 2007 [es

  17. Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for teh Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002 [es

  18. Protocol Additional to the Agreement between the United Mexican States and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the United Mexican States and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 9 March 2004. It was signed on 29 March 2004 in Vienna, Austria. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 4 March 2011, the date on which the Agency received from the United Mexican States written notification that Mexico's statutory and constitutional requirements for entry into force had been met

  19. Protocol Additional to the Agreement of 31 October 1975 between the Government of the Republic of Korea and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement of 31 October 1975 between the Government of the Republic of Korea and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 24 March 1999 and signed in Vienna on 21 June 1999. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 19 February 2004, the date on which the Agency received from the Republic of Korea written notification that the Republic of Korea's statutory and/or constitutional requirements for entry into force had been met

  20. Protocol Additional to the agreement between the United Kingdom of Great Britain and Northern Ireland, the European Atomic Energy Community and the International Atomic Energy Agency for the application of safeguards in the United Kingdom of Great Britain and Northern Ireland in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the United Kingdom of Great Britain and Northern Ireland, the European Atomic Energy Community and the International Atomic Energy Agency for the Application of Safeguards in the United Kingdom of Great Britain and Northern Ireland in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 30 April 2004, the date on which the Agency received written notification that the European Atomic Energy Community and the United Kingdom had met their respective internal requirements for entry into force

  1. Protocol Additional to the Agreement between Jamaica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2003-01-01

    The text of the Protocol Additional to the Agreement between Jamaica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002. It was signed in Vienna on 19 March 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force upon signature by the representatives of Jamaica and the Agency, i.e. on 19 March 2003

  2. Protocol Additional to the Agreement between the Republic of Cuba and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Cuba and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 9 September 2003. It was signed on 18 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 3 June 2004, the date on which the Agency received from Cuba written notification that Cuba's statutory and/or constitutional requirements for entry into force had been met

  3. Protocol Additional to the agreement between the Republic of Paraguay and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Paraguay and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 12 June 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 15 September 2004, the date on which the Agency received from Paraguay written notification that Paraguay's statutory and/or constitutional requirements for entry into force had been met

  4. Protocol Additional to the agreement between the Republic of El Salvador and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2004-01-01

    The text of the Protocol Additional to the Agreement between the Republic of El Salvador and the International Atomic Energy Agency in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 23 September 2002. It was signed on 5 September 2003. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 24 May 2004, the date on which Agency received from El Salvador written notification that El Salvador's statutory and/or constitutional requirements for entry into force had been met

  5. Protocol Additional to the agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the application of safeguards in connection with the treaty for the prohibition of nuclear weapons in Latin America and the treaty on the non-proliferation of nuclear weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Nicaragua and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 12 June 2002. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 18 February 2005, the date on which the Agency received from Nicaragua written notification that Nicaragua's statutory and/or constitutional requirements for entry into force had been met

  6. Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed on 7 July 2006 in Sydney and 14 July 2006 in Vienna. Pursuant to Article 17 of the Additional Protocol, the Protocol entered into force on 14 July 2006, upon signature by the representatives of the Republic of the Fiji Islands and the Agency

  7. Intelligence and treaty ratification

    International Nuclear Information System (INIS)

    Naftzinger, J.E.

    1990-01-01

    This paper describes the atmosphere leading up to the Senate INF hearings and then surveys the broad issues they raised. After that, the author highlights several aspects of the intelligence community's involvement and discusses the specific intelligence-related issues as the Senate committees saw them, notes their impact on the outcome, and finally draws several conclusions and lessons pertinent to the future

  8. The roles of parties with different commitments under the Kyoto Protocol and implications for NAFTA

    International Nuclear Information System (INIS)

    Fauteux, P.

    2002-01-01

    A government perspective on climate change negotiations was presented with particular reference to Canada's cleaner energy exports, the Kyoto mechanism and the second commitment period. The author emphasized the importance of cleaner energy exports for Canada, although progress is likely to be slow in this area because of the opposition among other Parties. Whatever approach the United States takes to trading, it must be compatible with the Kyoto Protocol. Eligibility for trading in North America was discussed with reference to what effect Canada's ratification of the Protocol would have on energy exports. It was noted that if Canada ratifies, it could be both a buyer and a seller, whereas the United States could only buy and Mexico could only sell. The author also suggested that developing countries or major emitters should take on commitments in order to provide greater compatibility in the North American context, especially if the United States rejoined the Kyoto Protocol

  9. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    with a variant of the classic BGW protocol. The protocol is secure against a semi-honest adversary. In Chapter 4 we describe a new protocol for VIFF that is secure against malicious adversaries. The protocol guarantees termination if the adversary allows a preprocessing phase to terminate, in which...... systems hosted by an untrusted provider. It guarantees atomic read and write operations on the shared data when the service is correct and preserves fork-linearizability when the service is faulty. A prototype has been implemented on top of the Subversion revision control system; benchmarks show...

  10. Report on the behalf of the Commission for Foreign Affairs on the bill project adopted by the Senate, bearing application of the additional protocol to the agreement between France, the European Atomic Energy Community, and the International Atomic Energy Agency related to the application of guarantees in France, signed in Vienna on the 22 September 1998. Nr 3428

    International Nuclear Information System (INIS)

    Destot, Michel

    2016-01-01

    This report first discusses an international context which requires a strengthened regime of nuclear non proliferation. It outlines that the struggle against nuclear proliferation is more than ever a matter of concern (a severe threat for peace, security and stability, a contrasted situation with noticeable advances in some countries and regions on the one hand, and severe proliferation crisis on the other hand). It analyses the contribution of the additional protocol to the strengthening of the non proliferation regime: a necessary strengthening of the IAEA guarantee system, the NPT as a keystone of the non proliferation regime, and a perfectible regime on other issues. The second part outlines that the bill project consolidates the French participation to the IAEA guarantee system. The Commission works are then reported, notably the detailed examination of the different bill project articles which deal with declaration obligations, international verification, penal arrangements, and arrangements related to overseas territories and other arrangements. Appendices propose an impact study, a comparative table between the text transmitted by the Senate and the provisions of the additional protocol, a comparison between the French additional protocol and the model adopter in 1997, a comparative table of additional protocols adopted by other countries, and a list of additional protocols

  11. The mesh network protocol evaluation and development

    OpenAIRE

    Pei, Ping; Petrenko, Y. N.

    2015-01-01

    In this paper, we introduce a Mesh network protocol evaluation and development. It has a special protocol. We could easily to understand that how different protocols are used in mesh network. In addition to our comprehension, Multi – hop routing protocol could provide robustness and load balancing to communication in wireless mesh networks.

  12. Testing for identification of locking, maintenance and ratification of large expansion joints; Teste para identificacao de travamento, manutencao e aceitacao de junta de expansao de grande porte

    Energy Technology Data Exchange (ETDEWEB)

    Veiga, Jordana Luiza Barbosa da Costa; Lemos, Ricardo Jose Fernandes; Medeiros, Jorivaldo [Petroleo Brasileiro S.A. (PETROBRAS), Rio de Janeiro, RJ (Brazil)

    2012-07-01

    Piping systems connected to large machines must have high reliability. In particular systems that have traditionally turbo expander large diameter and operate at high temperatures (up to 760 deg C) and low pressure (less than 4 kgf/cm2). This paper focuses on verification, maintenance and ratification of the correct functioning of expansion joints ('JE') of a piping system (72 inches external diameter), connected to a turbo expander system. After verification of 'JE's' locking, it was necessary to intervene in the system to restore the correct operation, for reasons of delivery, only maintenance was carried out in the expansion joints connected to this system. These expansion joints were tested before and after the maintenance to ensure proper operation after installation and verify that the locking system had its origin in 'JE'. This paper presents the degradation observed in JE, maintenance performed and the results of the tests. (author)

  13. Report on the behalf of the Foreign Affairs Commission on the bill project n 3080 authorizing the ratification of the statutes of the International Renewable Energy Agency (IRENA)

    International Nuclear Information System (INIS)

    2011-01-01

    This document first recalls that the creation of the International Renewable Energy Agency (IRENA) is due to a German initiative. It recalls the rather quick negotiations (2007-2009) which led to the creation of the Agency, outlines that its statutes were inspired by those of other organizations coming under the United Nations. It comments the content of the article which defines the agency's missions. Then it discusses some questions which have been shelved: the absence of China and Russia, the risk of non ratification by the United States, the language issue. In a second part, the document reports the discussions during the bill examination by the Commission. An appendix indicates the countries which have signed or ratified the IRENA statutes

  14. De l’impératif de la sérénité pour un leadership en eaux troubles

    Directory of Open Access Journals (Sweden)

    Jawad Mejjad

    2016-10-01

    Full Text Available S’il est une valeur indiscutable actuellement, ce pourrait bien être la sérénité. Il est improbable pour ne pas dire impossible de trouver quelqu’un de nos jours, ne la valorisant pas, ou ne la recherchant pas. Qui ne souhaite pas maitriser la situation, avoir des relations pacifiées avec les autres, se sentir calme et serein ? Qui préférerait les situations tendues, les relations conflictuelles, se sentir angoissé ? Le problème commence à se poser quand nous considérons la sérénité comme la norme, obligatoire. Et c’est justement ce caractère impératif, indiscutable qui devrait nous alerter. Pour comprendre cet impératif social, il nous paraît judicieux de l’observer dans l’organisation typique de la modernité, c’est-à-dire l’entreprise. L’entreprise est devenue le lieu du stress et du mal vivre, avec force burn-out et maladies psychiques allant jusqu’au suicide. Dès lors, ce que l’on a tendance à demander presque exclusivement à un manager aujourd’hui, c’est d’éviter les conflits dans son équipe et avec les autres équipes. Autrement dit, le leader sera celui qui saura pacifier les relations, donner confiance aux autres en leur permettant de naviguer sereinement dans un monde trouble. Plus précisément, la compréhension de la sérénité comme valeur discriminante dans le monde de l’entreprise nous permettra d’affiner notre approche, en nous posant la question notamment de la sérénité comme composante du leadership moderne, et comme axe de communication.

  15. Law project for the application of additional protocol to the agreement between France and the atomic energy european community and the international atomic energy agency relative to the application of guaranties in France, signed at Vienna the 22 september 1998; Projet de loi portant application du protocole additionnel a l'accord entre la France, la Communaute europeenne de l'energie atomique et l'Agence internationale de l'energie atomique relatif a l'application de garanties en France, signe a Vienne le 22 septembre 1998

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-04-15

    This law project aims to allow the application of the additional protocol. This protocol plans the transmission, by France, to IAEA of defined information. These information concern materials and nuclear activities non declared by States not owning the nuclear weapon. (A.L.B.)

  16. Protocol Additional to the Agreement between the Republic of Costa Rica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Costa Rica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 29 November 2001. It was signed in in San Jose, Costa Rica on 12 December 2001

  17. Protocol Additional to the Agreement between the Republic of Ecuador and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Ecuador and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 20 September 1999. It was signed in Vienna on 1 October 1999

  18. Protocol Additional to the Agreement between the Republic of Peru and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2002-01-01

    The text of the Protocol Additional to the Safeguards Agreement concluded between the Republic of Peru and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) is reproduced in this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 10 December 1999. It was signed in Vienna on 22 March 2000

  19. Protocol Additional to the Agreement between Antigua and Barbuda and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2013-01-01

    The text of the Protocol Additional to the Agreement between Antigua and Barbuda and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 10 September 2013. It was signed on 30 October 2013 in St. John's, Antigua and Barbuda, and on 15 November 2013 in Vienna, Austria

  20. Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed on 7 July 2006 in Sydney and 14 July 2006 in Vienna [fr

  1. Protocol Additional to the Agreement between the Republic of Costa Rica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Costa Rica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 29 November 2001. It was signed in in San Jose, Costa Rica on 12 December 2001 [fr

  2. Protocol Additional to the Agreement between Antigua and Barbuda and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2014-01-01

    The text of the Protocol Additional to the Agreement between Antigua and Barbuda and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 10 September 2013. It was signed on 30 October 2013 in St. John's, Antigua and Barbuda, and on 15 November 2013 in Vienna, Austria [fr

  3. Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed on 7 July 2006 in Sydney and 14 July 2006 in Vienna

  4. Protocol Additional to the Agreement between the Republic of Costa Rica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-07-01

    The text of the Protocol Additional to the Agreement between the Republic of Costa Rica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 29 November 2001. It was signed in in San Jose, Costa Rica on 12 December 2001

  5. Protocol Additional to the Agreement between the Republic of Costa Rica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2011-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Costa Rica and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 29 November 2001. It was signed in in San Jose, Costa Rica on 12 December 2001 [es

  6. Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2006-01-01

    The text of the Protocol between the Republic of the Fiji Islands and the International Atomic Energy Agency Additional to the Agreement between the Government of Fiji and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Board of Governors approved the Additional Protocol on 16 June 2005. It was signed on 7 July 2006 in Sydney and 14 July 2006 in Vienna [es

  7. Protocol Additional to the Agreement between Antigua and Barbuda and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2013-01-01

    The text of the Protocol Additional to the Agreement between Antigua and Barbuda and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in this document for the information of all Members. The Board of Governors approved the Additional Protocol on 10 September 2013. It was signed on 30 October 2013 in St. John's, Antigua and Barbuda, and on 15 November 2013 in Vienna, Austria [es

  8. Bill authorizing the approval of the additional protocol to the construction agreement between the French government and the International organization of fusion energy for the joint implementation of the ITER project, and relative to the role of the labour inspection on the ITER international organization site and dealing with occupational health and safety

    International Nuclear Information System (INIS)

    2009-10-01

    The aim of the additional protocol to the construction agreement between the French Government and the ITER Organization is to allow the French labour inspection services to control the good respect of the French occupational health and safety regulation at the project site (Cadarache, Bouches du Rhone) and to play its role of adviser to the persons responsible for the organization. This bill gives permission to the approval of this additional protocol. It allows the labour inspectors to do their job on the ITER site. (J.S.)

  9. Submission to the British Columbia government on the Kyoto Protocol

    International Nuclear Information System (INIS)

    2002-09-01

    The Business Council provided its comments concerning the Kyoto Protocol and climate change to the government of British Columbia, recommending that a clear position be established quickly on the matter. The adopted position should also be disseminated broadly to allow stake holders sufficient time to prepare for the upcoming meetings of the Joint Ministers and First Ministers. The federal government has announced that the decision on whether to ratify the Kyoto Protocol will be made before the end of 2002, and this decision will have numerous effects on the people of British Columbia, businesses, workers, and consumers alike. The Business Council of British Columbia believes that the unique interests of the province can best be protected by a proactive approach. Actions plans are being prepared by several of the other provinces and territories, who have already stated their position concerning the Kyoto Protocol. The long-term risks of climate change for British Columbia have not been determined nor have the elements of a provincial approach. The following elements should be included in British Columbia's position on the Kyoto Protocol, according to the Business Council of British Columbia: (1) a credible and cost-effective implementation plan that does not unduly burden the province and other jurisdictions must be developed before Canada decides to ratify the Protocol. British Columbia should go on the record stating it does not support the ratification of the Kyoto Protocol in its present form. (2) the province should advocate for a national approach to climate change that can be achieved within a reasonable time frame, reflects the long-term nature of the problem, and is in agreement with the economic development objectives of British Columbia, (3) a plan detailing how the province intends to deal with the growth of greenhouse gas emissions should supplement and support the position of the province on the Kyoto Protocol. Consumers and business should be engaged

  10. Protocol Additional to the Agreement between the Dominican Republic and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2010-01-01

    Protocol Additional to the Agreement between the Dominican Republic and the International Atomic Energy Agency for the Application of Safeguards in Connection with the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Treaty on the Non-Proliferation of Nuclear Weapons [fr

  11. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  12. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  13. Plastik Sanatlarda İfadeci Yaklaşımda Beliren Yeni Algılama ve Figüratif Süreçler

    OpenAIRE

    burunsuz, muteber

    2015-01-01

    Plastik Sanatlarda İfadeci Yaklaşımda Beliren Yeni Algılama ve Figüratif Süreçler               Dr. Muteber BURUNSUZ[1]  Özet Günümüz sanatında plastik sanatlarda dışavurumculuğun ardından ortaya çıkan yeni algılama şekilleri; temel kavram olarak öznelliği ele alır. Özellikle diğer üslupsal arayışların sorunu haline dönüşen biçimsel kaygıların daha geride bırakıldığı, öznel girişimlerin ön planda olduğunu görüyoruz. Dünya üzerindeki duruş, biçim ve rollerini sanatsal yaşamlarıyla ortaya koyan...

  14. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impacts...... process can be applied to better capture opinions of different experts, thereby maximizing the evidential basis. Elaborating on manageability of invasive species is further needed to fully answer all risk analysis requirements. Tackling the issue of invasive species urges better handling of the acquired...

  15. Quassia "biopiracy" case and the Nagoya Protocol: A researcher's perspective.

    Science.gov (United States)

    Bourdy, Geneviève; Aubertin, Catherine; Jullian, Valérie; Deharo, Eric

    2017-07-12

    Biopiracy accusations are common in the world of biodiversity research. At the end of 2015, a French NGO accused researchers from the Institut de Recherche pour le Développement (IRD) of biopiracy. These researchers had applied for a patent for a natural bioactive molecule against malaria and cancer, the Simalikalactone E, isolated from Quassia amara L. (Simaroubaceae) leaves. This biopiracy allegation triggered a huge wave of attacks from the media and social networks, and vehement recrimination from political officials in French Guiana against researchers who have been accused of ethical misconduct, by stealing the traditional knowledge of indigenous people. These accusations were made in the contentious context of the ratification of the Nagoya Protocol in the frame of implementing the French law on biodiversity, nature and landscapes. So, in an atmosphere of heightened emotions it is crucial to understand the issues behind these accusations. We describe herein the genesis of our discovery, present the detractors' arguments, and discuss the consequences of such biopiracy denunciations for scientific research. We also address our concerns about the gap between rhetoric and reality and the real impact of the Nagoya Protocol on biodiversity conservation. Copyright © 2017 Elsevier Ireland Ltd. All rights reserved.

  16. Nr 621 - Report on the behalf of the Commission of foreign affairs, defence and armed forces on the bill project on the application of the additional protocol to the agreement between France, the European Atomic Energy Community, and the International Atomic Energy Agency related to the application of guarantees in France, signed in Vienna on the 22 September 1998

    International Nuclear Information System (INIS)

    Picchia, Robert del

    2013-01-01

    This report concerns an additional protocol which aims at reinforcing the efficiency of the international guarantee system. This system is part of an international approach for the struggle against nuclear weapon proliferation. The authors outline the necessary evolution of law to deal with the risk of development of clandestine military nuclear programs. They present the role of the IAEA, its organisation, its financing, and outline its reinforced role within the frame of the NPT (Non Proliferation Treaty) and of generalised guarantee agreements (a typology of these agreements is given). They also outline the limits of this guarantee system, and the necessity of its adaptation through an additional protocol. They discuss the difficulty of an international application (notably in the cases of Iran and North Korea). The articles are then discussed. They deal with definitions, declaration obligations, international verification, penal arrangements, arrangements related to overseas territories and other arrangements. The commission discussion is reported, and tables give comparisons between agreements

  17. Brazil and the strengthening of safeguard system of the International Atomic Energy Agency: from the four-part agreement to the additional protocol; O Brasil e o fortalecimento do sistema de salvaguardas da Agencia Internacional de Energia Atomica: do acordo quadripartite ao protocolo adicional

    Energy Technology Data Exchange (ETDEWEB)

    Moura, Carmen Lidia Richter Ribeiro

    2001-07-01

    The main objective of this paper is to analyse the evolution of IAEA verification system, that constitutes one of the main fundaments of the Non-proliferation nuclear weapons regimen, and to point out elements that contribute to inform the Brazilian position related to the Model Protocol additional to agreements for safeguard application: instrument that comprehend the most recent multilateral efforts of the nuclear verification

  18. Protocol between Romania and the International Atomic Energy Agency additional to the agreement between the Socialist Republic of Romania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2000-01-01

    The document reproduces the text of the Protocol Additional to the agreement between Romania and the International Atomic Energy Agency for the application of safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons which was approved by the Board of Governors on 9 June 1999, signed in Vienna on 11 June 1999, and entered into force on 7 July 2000

  19. Food additives

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/002435.htm Food additives To use the sharing features on this page, please enable JavaScript. Food additives are substances that become part of a food ...

  20. Protocol to amend the convention of 31st January 1963 supplementary to the Paris convention of 29th July 1960 on third party liability in the field of nuclear energy, as amended by the additional protocol of 28th January 1964, Paris, 16 November 1982

    International Nuclear Information System (INIS)

    1983-01-01

    This Protocol further amends the Convention of 31 January 1963 supplementary to the Paris Convention of 29 July 1960 on Third Party Liability in the Field of Nuclear Energy, concluded between the Federal Republic of Germany, Austria, Belgium, Denmark, Spain, Finland, France, Italy, Luxembourg, Norway, Netherlands, United Kingdom, Sweden and Switzerland, within the framework of the Organisation for Economic Co-operation and Development. (U.K.)

  1. Co-operation Agreement for the Promotion of Nuclear Science and Technology in Latin America and the Caribbean (ARCAL). Status list as of 30 September 2002. Signature and ratification. Declarations/reservations made upon signature

    International Nuclear Information System (INIS)

    2002-01-01

    The document reproduces the text of the Co-operation Agreement for the Promotion of Nuclear Science and Technology in Latin America and the Caribbean (ARCAL) which was opened for signature on 25 September 1998 and shall come into force after deposit of the instrument of ratification by ten Member States. It shall remain in force for ten years, and may be extended by periods of five years if the Member States so agree. By 30 September 2002, there were 18 Signatories to the above Agreement

  2. Additive manufacturing.

    Science.gov (United States)

    Mumith, A; Thomas, M; Shah, Z; Coathup, M; Blunn, G

    2018-04-01

    Increasing innovation in rapid prototyping (RP) and additive manufacturing (AM), also known as 3D printing, is bringing about major changes in translational surgical research. This review describes the current position in the use of additive manufacturing in orthopaedic surgery. Cite this article: Bone Joint J 2018;100-B:455-60.

  3. Reading the Kyoto Protocol. Ethical aspects of the convention on climate change

    International Nuclear Information System (INIS)

    Vermeersch, E.; Weiler, R.; Petrella, R.; Krause, F.; Sachs, W.; Zwart, H.; Keulartz, J.

    2005-01-01

    The Kyoto Protocol to the United Nations Framework Convention on Climate Change aims to reduce greenhouse gas emissions by urging the international community to take measures preventing 'dangerous man-made interference with the climate system'. Since its publication in 1997, the Kyoto Protocol has triggered heated debates among scientists and politicians. According to a number of critics, the questions as to whether global warming is caused by human intervention, and whether taking appropriate measures could reduce the trend, has not yet been conclusively answered. In a limited number of countries, this situation has led to a delay in the ratification process. Only when these disputes were settled in February 2005 the Kyoto Protocol became legally binding on all the signatories. If predictions are accurate, measures have to be taken to prevent a global catastrophe. This leads to another, much overlooked, but no less important question, namely how mankind can be motivated to accept the burden attached to the measures proposed by the Kyoto Protocol; in other words, how do we find and formulate an ethical basis for measures forcing us to sacrifice some of our wealth and riches, for a cleaner, more sustainable world?

  4. Bill project authorizing the ratification of the Paris agreement adopted on the 12 December 2015 - Nr 3719. Impact study. Opinion on the behalf of the Commission for sustainable development and land planning on the bill project, after initiation of the accelerated procedure authorizing the ratification of the Paris agreement adopted on the 12 December 2015 (nr 3719) - Nr 3733

    International Nuclear Information System (INIS)

    Valls, Manuel; Ayrault, Jean-Marc; Royal, Segolene; Chanteguet, Jean-Paul

    2016-01-01

    After having discussed the context of the adoption of the Paris agreement at the end of the COP21 (content and results of previous conferences), this report comments and discusses the content, structure and scope of this Paris agreement (discussion of article contents), and then presents the text of the bill project. A second part addresses the issue of the impact study. It also recalls the context created by the different conferences, the objectives of the Paris agreement, the estimated economic, financial, social, environmental, legal (at the French and European levels), and administrative consequences of the implementation of the Paris agreement. It recalls the history of negotiations of the different COPs, briefly indicates the status of ratification. The third part states the opinion of the Commission. It evokes the difficulties of negotiations after the failure in Kyoto, and outlines that the Paris agreement is ambitious and has an unprecedented support. It also outlines the emergency of action, the responsibilities of States, the consolidation of the solution agenda, and the necessary commitment of citizens. Commission discussions are reported

  5. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  6. Report made on behalf of the commission of foreign affairs, defence and military forces about the bill authorizing the approval of the additional protocol to the construction agreement between the French government and the International organization of fusion energy for the joint implementation of the ITER project, and relative to the role of the labour inspection on the ITER international organization site and dealing with occupational health and safety

    International Nuclear Information System (INIS)

    2009-12-01

    This additional protocol to the construction agreement between the French Government and the ITER Organization aims at allowing the French labour inspection services to control the good respect of the French occupational health and safety regulation at the project site (Cadarache, Bouches du Rhone) and to play its role of adviser to the persons responsible for the organization. The report briefly recalls the ITER project and its organization, and then presents the actual situation and the objective of the additional protocol. (J.S.)

  7. Training program to prepare the U.S. DOE laboratories for the entry into force of the protocol additional to the agreement between the United States of America and the International Atomic Energy Agency for the application of safeguards in the United

    International Nuclear Information System (INIS)

    Boyer, Brian David; Stevens, Rebecca C.; Uribe, Eva C.; Sandoval, M. Analisa; Valente, John N.; Valente, John U.; Jo, Jae H.; Sellen, Joana; Wonder, Edward

    2009-01-01

    In 2008, a joint team from Brookhaven National Laboratory (BNL) and Los Alamos National Laboratory (LANL) consisting of specialists in training IAEA inspectors in the use of complementary access activities formulated a training program to prepare the U.S DOE laboratories for the entry into force of the U.S. Additional Protocol. Since the U.S. Additional Protocol would allow for IAEA access to the DOE laboratories under the aegis of complementary access activities, the DOE laboratories would need to prepare for such visits. The goal of the training was to ensure that the DOE laboratories would successfully host an IAEA complementary access. In doing so, the labs must be able to provide the IAEA with the information that the IAEA would need to resolve its questions about the U.S. Declaration and declared activities at the lab, and also protect certain equities, as provided under the U.S. Additional Protocol Article 1.b and c. which set forth a 'National Security Exclusion.' This 'NSE' states that the AP provisions apply within the United States 'excluding only instances where its application would result in access by the Agency to activities with direct national security significance to the United States or to location or information associated with such activities.' These activities are referred to collectively as DNSS-direct national security significance. Furthermore, the U.S. has a specific right to employ managed access, without prejudice to the right under Article 1.b, in connection with activities of DNSS. The provisions in Articles 1.b and 1.c are unique to the U.S. AP, and are additional to the more general right, under Article 7, to use managed access to protect from disclosure proprietary and/or proliferation-sensitive information, and to meet safety and security requirements, that is incorporated directly from the Model Additional Protocol. The BNL-LANL team performed training at Lawrence Livermore National Laboratory, Idaho National Laboratory, and Oak

  8. Training program to prepare the U.S. DOE laboratories for the entry into force of the protocol additional to the agreement between the United States of America and the International Atomic Energy Agency for the application of safeguards in the United

    Energy Technology Data Exchange (ETDEWEB)

    Boyer, Brian David [Los Alamos National Laboratory; Stevens, Rebecca C [Los Alamos National Laboratory; Uribe, Eva C [Los Alamos National Laboratory; Sandoval, M Analisa [Los Alamos National Laboratory; Valente, John N [Los Alamos National Laboratory; Valente, John U [BNL; Jo, Jae H [BNL; Sellen, Joana [U.S. DOE/NNSA; Wonder, Edward [QINETIQ-NORTH AMERICA

    2009-01-01

    In 2008, a joint team from Brookhaven National Laboratory (BNL) and Los Alamos National Laboratory (LANL) consisting of specialists in training IAEA inspectors in the use of complementary access activities formulated a training program to prepare the U.S DOE laboratories for the entry into force of the U.S. Additional Protocol. Since the U.S. Additional Protocol would allow for IAEA access to the DOE laboratories under the aegis of complementary access activities, the DOE laboratories would need to prepare for such visits. The goal of the training was to ensure that the DOE laboratories would successfully host an IAEA complementary access. In doing so, the labs must be able to provide the IAEA with the information that the IAEA would need to resolve its questions about the U.S. Declaration and declared activities at the lab, and also protect certain equities, as provided under the U.S. Additional Protocol Article 1.b and c. which set forth a 'National Security Exclusion.' This 'NSE' states that the AP provisions apply within the United States 'excluding only instances where its application would result in access by the Agency to activities with direct national security significance to the United States or to location or information associated with such activities.' These activities are referred to collectively as DNSS-direct national security significance. Furthermore, the U.S. has a specific right to employ managed access, without prejudice to the right under Article 1.b, in connection with activities of DNSS. The provisions in Articles 1.b and 1.c are unique to the U.S. AP, and are additional to the more general right, under Article 7, to use managed access to protect from disclosure proprietary and/or proliferation-sensitive information, and to meet safety and security requirements, that is incorporated directly from the Model Additional Protocol. The BNL-LANL team performed training at Lawrence Livermore National Laboratory, Idaho

  9. Phosphazene additives

    Science.gov (United States)

    Harrup, Mason K; Rollins, Harry W

    2013-11-26

    An additive comprising a phosphazene compound that has at least two reactive functional groups and at least one capping functional group bonded to phosphorus atoms of the phosphazene compound. One of the at least two reactive functional groups is configured to react with cellulose and the other of the at least two reactive functional groups is configured to react with a resin, such as an amine resin of a polycarboxylic acid resin. The at least one capping functional group is selected from the group consisting of a short chain ether group, an alkoxy group, or an aryloxy group. Also disclosed are an additive-resin admixture, a method of treating a wood product, and a wood product.

  10. Non-surgical treatment of hip osteoarthritis. Hip school, with or without the addition of manual therapy, in comparison to a minimal control intervention: Protocol for a three-armed randomized clinical trial

    Directory of Open Access Journals (Sweden)

    Vach Werner

    2011-05-01

    Full Text Available Abstract Background Hip osteoarthritis is a common and chronic condition resulting in pain, functional disability and reduced quality of life. In the early stages of the disease, a combination of non-pharmacological and pharmacological treatment is recommended. There is evidence from several trials that exercise therapy is effective. In addition, single trials suggest that patient education in the form of a hip school is a promising intervention and that manual therapy is superior to exercise. Methods/Design This is a randomized clinical trial. Patients with clinical and radiological hip osteoarthritis, 40-80 years of age, and without indication for hip surgery were randomized into 3 groups. The active intervention groups A and B received six weeks of hip school, taught by a physiotherapist, for a total of 5 sessions. In addition, group B received manual therapy consisting of joint manipulation and soft-tissue therapy twice a week for six weeks. Group C received a self-care information leaflet containing advice on "live as usual" and stretching exercises from the hip school. The primary time point for assessing relative effectiveness is at the end of the six weeks intervention period with follow-ups after three and 12 months. Primary outcome measure is pain measured on an eleven-point numeric rating scale. Secondary outcome measures are the hip dysfunction and osteoarthritis outcome score, patient's global perceived effect, patient specific functional scale, general quality of life and hip range of motion. Discussion To our knowledge this is the first randomized clinical trial comparing a patient education program with or without the addition of manual therapy to a minimal intervention for patients with hip osteoarthritis. Trial registration ClinicalTrials NCT01039337

  11. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...... of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....

  12. The role of the addition of ovarian suppression to tamoxifen in young women with hormone-sensitive breast cancer who remain premenopausal or regain menstruation after chemotherapy (ASTRRA): study protocol for a randomized controlled trial and progress

    International Nuclear Information System (INIS)

    Kim, Hyun-Ah; Ahn, Sei Hyun; Nam, Seok Jin; Park, Seho; Ro, Jungsil

    2016-01-01

    Ovarian function suppression (OFS) has been shown to be effective as adjuvant endocrine therapy in premenopausal women with hormone receptor-positive breast cancer. However, it is currently unclear if addition of OFS to standard tamoxifen therapy after completion of adjuvant chemotherapy results in a survival benefit. In 2008, the Korean Breast Cancer Society Study Group initiated the ASTRRA randomized phase III trial to evaluate the efficacy of OFS in addition to standard tamoxifen treatment in hormone receptor-positive breast cancer patients who remain or regain premenopausal status after chemotherapy. Premenopausal women with estrogen receptor-positive breast cancer treated with definitive surgery were enrolled after completion of neoadjuvant or adjuvant chemotherapy. Ovarian function was assessed at the time of enrollment and every 6 months for 2 years by follicular-stimulating hormone levels and bleeding history. If ovarian function was confirmed as premenopausal status, the patient was randomized to receive 2 years of goserelin plus 5 years of tamoxifen treatment or 5 years of tamoxifen alone. The primary end point will be the comparison of the 5-year disease-free survival rates between the OFS and tamoxifen alone groups. Patient recruitment was finished on March 2014 with the inclusion of a total of 1483 patients. The interim analysis will be performed at the time of the observation of the 187th event. This study will provide evidence of the benefit of OFS plus tamoxifen compared with tamoxifen only in premenopausal patients with estrogen receptor-positive breast cancer treated with chemotherapy

  13. Protocol for the ADDITION-Plus study: a randomised controlled trial of an individually-tailored behaviour change intervention among people with recently diagnosed type 2 diabetes under intensive UK general practice care

    Directory of Open Access Journals (Sweden)

    Fanshawe Tom

    2011-04-01

    Full Text Available Abstract Background The increasing prevalence of type 2 diabetes poses both clinical and public health challenges. Cost-effective approaches to prevent progression of the disease in primary care are needed. Evidence suggests that intensive multifactorial interventions including medication and behaviour change can significantly reduce cardiovascular morbidity and mortality among patients with established type 2 diabetes, and that patient education in self-management can improve short-term outcomes. However, existing studies cannot isolate the effects of behavioural interventions promoting self-care from other aspects of intensive primary care management. The ADDITION-Plus trial was designed to address these issues among recently diagnosed patients in primary care over one year. Methods/Design ADDITION-Plus is an explanatory randomised controlled trial of a facilitator-led, theory-based behaviour change intervention tailored to individuals with recently diagnosed type 2 diabetes. 34 practices in the East Anglia region participated. 478 patients with diabetes were individually randomised to receive (i intensive treatment alone (n = 239, or (ii intensive treatment plus the facilitator-led individual behaviour change intervention (n = 239. Facilitators taught patients key skills to facilitate change and maintenance of key behaviours (physical activity, dietary change, medication adherence and smoking, including goal setting, action planning, self-monitoring and building habits. The intervention was delivered over one year at the participant's surgery and included a one-hour introductory meeting followed by six 30-minute meetings and four brief telephone calls. Primary endpoints are physical activity energy expenditure (assessed by individually calibrated heart rate monitoring and movement sensing, change in objectively measured dietary intake (plasma vitamin C, medication adherence (plasma drug levels, and smoking status (plasma cotinine levels at

  14. Is the Kyoto Protocol an adequate environmental agreement to resolve the climate change problem?

    International Nuclear Information System (INIS)

    Arcas, R.L.

    2001-01-01

    The lack of understanding on how to handle the issue of global warming, which is embodied by the Kyoto Protocol, among the various nations of the world reached a point where environmental policy-makers saw a number of possible scenarios to global warming before the last meeting on Climate Change in July 2001 in Bonn: Amendments to the Kyoto Protocol, by changing the current targets and timetable into a long-term view of the global warming issue. The U.S. does not agree with the Kyoto Protocol Therefore, it will not do anything about it in terms of its ratification. A middle ground between the two previous options. The idea is the creation of a new mechanism where nations meet in international environmental for a voluntarily exchange of views with no legal commitments. In order to move forward, we should stop thinking of the global warming issue only in a cost-benefit analysis and instead take more into account public health and safety requirements. Since the U.S. and EU representatives may well find themselves deadlocked again when they meet at the end of October 2001 in Morocco for the next climate change convention, the author would like to make some recommendations at the end of this article. (author)

  15. Palliative radiotherapy in addition to self-expanding metal stent for improving dysphagia and survival in advanced oesophageal cancer (ROCS: Radiotherapy after Oesophageal Cancer Stenting): study protocol for a randomized controlled trial.

    Science.gov (United States)

    Adamson, Douglas; Blazeby, Jane; Nelson, Annmarie; Hurt, Chris; Nixon, Lisette; Fitzgibbon, Jim; Crosby, Tom; Staffurth, John; Evans, Mim; Kelly, Noreen Hopewell; Cohen, David; Griffiths, Gareth; Byrne, Anthony

    2014-10-22

    The single most distressing symptom for patients with advanced esophageal cancer is dysphagia. Amongst the more effective treatments for relief of dysphagia is insertion of a self-expanding metal stent (SEMS). It is possible that the addition of a palliative dose of external beam radiotherapy may prolong the relief of dysphagia and provide additional survival benefit. The ROCS trial will assess the effect of adding palliative radiotherapy after esophageal stent insertion. The study is a randomized multicenter phase III trial, with an internal pilot phase, comparing stent alone versus stent plus palliative radiotherapy in patients with incurable esophageal cancer. Eligible participants are those with advanced esophageal cancer who are in need of stent insertion for primary management of dysphagia. Radiotherapy will be administered as 20 Gray (Gy) in five fractions over one week or 30 Gy in 10 fractions over two weeks, within four weeks of stent insertion. The internal pilot will assess rates and methods of recruitment; pre-agreed criteria will determine progression to the main trial. In total, 496 patients will be randomized in a 1:1 ratio with follow up until death. The primary outcome is time to progression of patient-reported dysphagia. Secondary outcomes include survival, toxicity, health resource utilization, and quality of life. An embedded qualitative study will explore the feasibility of patient recruitment by examining patients' motivations for involvement and their experiences of consent and recruitment, including reasons for not consenting. It will also explore patients' experiences of each trial arm. The ROCS study will be a challenging trial studying palliation in patients with a poor prognosis. The internal pilot design will optimize methods for recruitment and data collection to ensure that the main trial is completed on time. As a pragmatic trial, study strengths include collection of all follow-up data in the usual place of care, and a focus on

  16. The effectiveness of the use of a digital activity coaching system in addition to a two-week home-based exercise program in patients after total knee arthroplasty: study protocol for a randomized controlled trial.

    Science.gov (United States)

    Harmelink, Karen E M; Zeegers, A V C M; Tönis, Thijs M; Hullegie, Wim; Nijhuis-van der Sanden, Maria W G; Staal, J Bart

    2017-07-05

    There is consistent evidence that supervised programs are not superior to home-based programs after total knee arthroplasty (TKA), especially in patients without complications. Home-based exercise programs are effective, but we hypothesize that their effectiveness can be improved by increasing the adherence to physical therapy advice to reach an adequate exercise level during the program and thereafter. Our hypothesis is that an activity coaching system (accelerometer-based activity sensor), alongside a home-based exercise program, will increase adherence to exercises and the activity level, thereby improving physical functioning and recovery. The objective of this study is to determine the effectiveness of an activity coaching system in addition to a home-based exercise program after a TKA compared to only the home-based exercise program with physical functioning as outcome. This study is a single-blind randomized controlled trial. Both the intervention (n = 55) and the control group (n = 55) receive a two-week home-based exercise program, and the intervention group receives an additional activity coaching system. This is a hand-held electronic device together with an app on a smartphone providing information and advice on exercise behavior during the day. The primary outcome is physical functioning, measured with the Timed Up and Go test (TUG) after two weeks, six weeks and three months. Secondary outcomes are 1) adherence to the activity level (activity diary); 2) physical functioning, measured with the 2-Minute Walk Test (2MWT) and the Knee Osteoarthritis Outcome Score; 3) quality of life (SF-36); 4) healthcare use up to one year postoperatively and 5) cost-effectiveness. Data are collected preoperatively, three days, two and six weeks, three months and one year postoperatively. The strengths of the study are the use of both performance-based tests and self-reported questionnaires and the personalized tailored program after TKA given by specialized physical

  17. Effectiveness of additional self-care acupressure for women with menstrual pain compared to usual care alone: using stakeholder engagement to design a pragmatic randomized trial and study protocol.

    Science.gov (United States)

    Blödt, Susanne; Schützler, Lena; Huang, Wenjing; Pach, Daniel; Brinkhaus, Benno; Hummelsberger, Josef; Kirschbaum, Barbara; Kuhlmann, Kirsten; Lao, Lixing; Liang, Fanrong; Mietzner, Anna; Mittring, Nadine; Müller, Sabine; Paul, Anna; Pimpao-Niederle, Carolina; Roll, Stephanie; Wu, Huangan; Zhu, Jiang; Witt, Claudia M

    2013-04-11

    Self-care acupressure might be successful in treating menstrual pain, which is common among young women. There is a need for comparative effectiveness research with stakeholder engagement in all phases seeking to address the needs of decision-makers. Our aim was to design a study on the effectiveness of additional self-care acupressure for menstrual pain comparing usual care alone using different methods of stakeholder engagement. The study was designed using multiple mixed methods for stakeholder engagement. Based on the results of a survey and focus group discussion, a stakeholder advisory group developed the study design. Stakeholder engagement resulted in a two-arm pragmatic randomized trial. Two hundred and twenty women aged 18 to 25 years with menstrual pain will be included in the study. Outcome measurement will be done using electronic questionnaires provided by a study specific mobile application (App). Primary outcome will be the mean pain intensity at the days of pain during the third menstruation after therapy start. Stakeholder engagement helped to develop a study design that better serves the needs of decision makers, including an App as a modern tool for both intervention and data collection in a young target group. Clinicaltrials.gov identifier http://NCT01582724.

  18. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  19. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  20. Convention on Early Notification of a Nuclear Accident and Convention on Assistance in the Case of a Nuclear Accident or Radiological Emergency. Status lists as of 30 September 2002. Signature, ratification, acceptance, approval, accession or succession. Declarations/reservations made upon expressing consent to be bound and objections thereto. Declarations/reservations made upon signature

    International Nuclear Information System (INIS)

    2002-01-01

    This document includes the information given in document INFCIRC/335/Add.10 and INFCIRC/336/Add. 11. It accordingly supersedes that document. It contains signatures, ratification, acceptance, approval, accession or successions, as well as declarations/reservations made upon signature by the countries and-or organizations with have accepted it

  1. Convention on the physical protection of nuclear material. Status list as of 12 September 2000. Signature, ratification, acceptance, approval, accession or succession. Declarations/reservations made upon expressing consent to be bound and objections thereto. Declarations/reservations made upon signature

    International Nuclear Information System (INIS)

    2000-01-01

    This document contains signatures, ratifications, acceptance, approval, accession or succession of the Convention on the physical protection of nuclear material as well as declarations/reservations made upon expressing consent to be bound and objections thereto and declarations made upon signature

  2. Minority Languages of the Russian Federation: Perspectives for a Ratification of the European Charter of Regional and Minority Languages. Mercator Working Papers = Las lenguas minoritarias de la Federacion Rusa Perspectivas para una ratificacion de la Carta Europea de las Lenguas Regionales y Minoritarias. Mercator Documentos de trabajo.

    Science.gov (United States)

    Vieytez, Eduardo J. Ruiz

    This paper describes the linguistic plurality of the Russian Federation, assessing the impact that the hypothetical ratification of the European Charter of Regional and Minority Languages could have on it. Four sections focus on the following: (1) "Introduction"; (2) "Part 1--The Linguistic Plurality of the Russian Federation":…

  3. Convention on early notification of a nuclear accident and convention on assistance in the case of a nuclear accident or radiological emergency. Status lists as of 12 September 2000. Signature, ratification, acceptance, approval, accession or succession. Declarations/reservations made upon expressing consent to be bound and objections thereto. Declarations/reservations made upon signature

    International Nuclear Information System (INIS)

    2000-01-01

    This document includes the information given in document INFCIRC/335/Add.9 and INFCIRC/336/Add. 10. It accordingly supersedes that document. It contains signatures, ratification, acceptance, approval, accession or successions, as well as declarations/reservations made upon signature by the countries and-or organizations with have accepted it

  4. Military veterans with mental health problems: a protocol for a systematic review to identify whether they have an additional risk of contact with criminal justice systems compared with other veterans groups

    Directory of Open Access Journals (Sweden)

    Taylor James

    2012-11-01

    Full Text Available Abstract Background There is concern that some veterans of armed forces, in particular those with mental health, drug or alcohol problems, experience difficulty returning to a civilian way of life and may subsequently come into contact with criminal justice services and imprisonment. The aim of this review is to examine whether military veterans with mental health problems, including substance use, have an additional risk of contact with criminal justice systems when compared with veterans who do not have such problems. The review will also seek to identify veterans’ views and experiences on their contact with criminal justice services, what contributed to or influenced their contact and whether there are any differences, including international and temporal, in incidence, contact type, veteran type, their presenting health needs and reported experiences. Methods/design In this review we will adopt a methodological model similar to that previously used by other researchers when reviewing intervention studies. The model, which we will use as a framework for conducting a review of observational and qualitative studies, consists of two parallel synthesis stages within the review process; one for quantitative research and the other for qualitative research. The third stage involves a cross study synthesis, enabling a deeper understanding of the results of the quantitative synthesis. A range of electronic databases, including MEDLINE, PsychINFO, CINAHL, will be systematically searched, from 1939 to present day, using a broad range of search terms that cover four key concepts: mental health, military veterans, substance misuse, and criminal justice. Studies will be screened against topic specific inclusion/exclusion criteria and then against a smaller subset of design specific inclusion/exclusion criteria. Data will be extracted for those studies that meet the inclusion criteria, and all eligible studies will be critically appraised. Included

  5. Military veterans with mental health problems: a protocol for a systematic review to identify whether they have an additional risk of contact with criminal justice systems compared with other veterans groups.

    Science.gov (United States)

    Taylor, James; Parkes, Tessa; Haw, Sally; Jepson, Ruth

    2012-11-06

    There is concern that some veterans of armed forces, in particular those with mental health, drug or alcohol problems, experience difficulty returning to a civilian way of life and may subsequently come into contact with criminal justice services and imprisonment. The aim of this review is to examine whether military veterans with mental health problems, including substance use, have an additional risk of contact with criminal justice systems when compared with veterans who do not have such problems. The review will also seek to identify veterans' views and experiences on their contact with criminal justice services, what contributed to or influenced their contact and whether there are any differences, including international and temporal, in incidence, contact type, veteran type, their presenting health needs and reported experiences. In this review we will adopt a methodological model similar to that previously used by other researchers when reviewing intervention studies. The model, which we will use as a framework for conducting a review of observational and qualitative studies, consists of two parallel synthesis stages within the review process; one for quantitative research and the other for qualitative research. The third stage involves a cross study synthesis, enabling a deeper understanding of the results of the quantitative synthesis. A range of electronic databases, including MEDLINE, PsychINFO, CINAHL, will be systematically searched, from 1939 to present day, using a broad range of search terms that cover four key concepts: mental health, military veterans, substance misuse, and criminal justice. Studies will be screened against topic specific inclusion/exclusion criteria and then against a smaller subset of design specific inclusion/exclusion criteria. Data will be extracted for those studies that meet the inclusion criteria, and all eligible studies will be critically appraised. Included studies, both quantitative and qualitative, will then undergo

  6. Network Memory Protocol

    National Research Council Canada - National Science Library

    Wilcox, D

    1997-01-01

    This report presents initial research into the design of a new computer system local area network transport layer protocol, designated the network memory protocol, which provides clients with direct...

  7. Système de communication et de localisation basé sur un radar coopératif à corrélation pour les transports guidés urbains

    OpenAIRE

    TATKEU, C; EL HILLALI, Y; DELOOF, P; RIVENQ, A

    2007-01-01

    Nous présentons ici un système original nommé CODIREP pour Communication Détection et Identification de Rames En Panne dédier au transport guidé. Ce système, basé sur un radar coopératif à corrélation, permet d'assurer à la fois les fonctionnalités de communication et de localisation. Le principal avantage du radar est de réduire la perte de temps d'exploitation causée par un métro en panne, en permettant au train suivant de connaître en temps réel la distance le séparant de celui qui est imm...

  8. Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons. Accession of Slovenia

    International Nuclear Information System (INIS)

    2008-01-01

    Article 17.a. of the Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) provides that the Additional Protocol shall come into force on the date on which the Agency receives from the Community and the Signatory States written notification that their respective requirements for entry into force have been met. Article 23(a) of Inference/193 provides the means for non-signatory States of the Additional Protocol to express their consent to be bound by the Additional Protocol [es

  9. Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons. Accession of Estonia and the Slovak Republic

    International Nuclear Information System (INIS)

    2007-01-01

    Article 17.a. of the Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) provides that the Additional Protocol shall come into force on the date on which the Agency receives from the Community and the Signatory States written notification that their respective requirements for entry into force have been met. Article 23(a) of INFCIRC/193 provides the means for non-signatory States of the Additional Protocol to express their consent to be bound by the Additional Protocol [es

  10. Guidance for States Implementing Comprehensive Safeguards Agreements and Additional Protocols

    International Nuclear Information System (INIS)

    2016-01-01

    This publication is aimed at enhancing States’ understanding of the safeguards obligations of both the State and the IAEA, and at improving the cooperation between States and the IAEA in safeguards implementation. It is principally intended for State or regional safeguards regulatory authorities and facility operators, and is a reference document that is supported by detailed guidance and examples in safeguards implementation practices presented in other publications in the series. (This version is the 2016 update.)

  11. Climate change in Latin America and the Caribbean. A review of the Bonn and Marrakech decisions and their effect on the clean development mechanism of the Kyoto protocol

    International Nuclear Information System (INIS)

    Maggiora, C. della

    2002-04-01

    The objective of this document is to present an overview of recent climate change developments, in particular with regards to carbon markets under the Clean Development Mechanism (CDM). The document is divided into three sections. The first section describes the history of the climate change negotiations. Section two presents an overview of the recent decisions adopted at the last international meetings (Bonn Agreements and Marrakech Accord), which have improved the odds of ratification of the Kyoto Protocol by 2002. The third section analyzes the carbon credit market. The first part of this section briefly presents the available information regarding real carbon credit transactions, while the second section focuses on the literature review of several theoretical models and presents the theoretical estimates of the price and size of the carbon market

  12. Effectiveness of the addition of therapeutic alliance with minimal intervention in the treatment of patients with chronic, nonspecific low back pain and low risk of involvement of psychosocial factors: a study protocol for a randomized controlled trial (TalkBack trial).

    Science.gov (United States)

    Fagundes, Felipe Ribeiro Cabral; de Melo do Espírito Santo, Caique; de Luna Teixeira, Francine Mendonça; Tonini, Thaís Vanelli; Cabral, Cristina Maria Nunes

    2017-01-31

    The stratified model of care has been an effective approach for the treatment of low back pain. However, the treatment of patients with low risk of psychosocial-factor involvement is unclear. The addition of the therapeutic alliance to a minimal intervention may be an option for the treatment of low back pain. This paper reports on the rationale, design and protocol for a randomized controlled trial with blind assessor to assess the effectiveness of the addition of therapeutic alliance with minimal intervention on pain and disability in patients with chronic, nonspecific low back pain. Two hundred and twenty-two patients with chronic, nonspecific low back pain and low risk of involvement of psychosocial factors will be assessed and randomly allocated into three groups (n = 74 patients per group). The Positive Therapeutic Alliance group will receive counseling and guidance with an emphasis on therapeutic alliance and empathy. The Usual Treatment group will receive the same information and counseling with limited interaction with the therapist. The Control group will not receive any intervention. The treatment will be composed by two intervention sessions with a 1-week interval. A blinded assessor will collect the following outcomes at baseline, 1 month, 6 months and 12 months after randomization: pain intensity (Pain Numerical Rating Scale), specific disability (Patient-specific Functional Scale), general disability (Oswestry Disability Index), global perceived effect (Global Perceived Effect Scale), empathy (Consultation and Relational Empathy Measure), credibility and expectations related to treatment. The analysis will be performed using linear mixed models. This will be the first study to understand the effect of combining enhanced therapeutic alliance to a treatment based on counseling, information and advice (minimal intervention). The addition of the therapeutic alliance to minimal intervention may improve the treatment of chronic, nonspecific low back

  13. Network Authentication Protocol Studies

    Science.gov (United States)

    2009-04-01

    This is called the “Decision Diffie-Hellman Problem” ( DDH ) [68]. For the protocols discussed in this paper, the cryptographic strength of the generated...group key is solely dependent upon the strength of the underlying two-party protocols. That said, we will not address the DDH problem further in this

  14. Recombinant gene expression protocols

    National Research Council Canada - National Science Library

    Tuan, Rocky S

    1997-01-01

    .... A fundamental requirement for successful recombinant gene expression is the design of the cloning vector and the choice of the host organism for expression. Recombinant Gene Expression Protocols grows out of the need for a laboratory manual that provides the reader the background and rationale, as well as the practical protocols for the preparation of...

  15. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    . In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise...

  16. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  17. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  18. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  19. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    2017-08-04

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  20. Routing protocols in wireless sensor networks.

    Science.gov (United States)

    Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Cabrera, Alicia Triviño; Abbas, Cláudia Jacy Barenco

    2009-01-01

    The applications of wireless sensor networks comprise a wide variety of scenarios. In most of them, the network is composed of a significant number of nodes deployed in an extensive area in which not all nodes are directly connected. Then, the data exchange is supported by multihop communications. Routing protocols are in charge of discovering and maintaining the routes in the network. However, the appropriateness of a particular routing protocol mainly depends on the capabilities of the nodes and on the application requirements. This paper presents a review of the main routing protocols proposed for wireless sensor networks. Additionally, the paper includes the efforts carried out by Spanish universities on developing optimization techniques in the area of routing protocols for wireless sensor networks.

  1. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  2. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  3. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one......, primarily based on descriptions of the protocols in the notation of CSP (Communicating Sequential Processes)....

  4. Universal Energy Supply Protocol (UESP)

    Energy Technology Data Exchange (ETDEWEB)

    Holz, F.; Meyer, T.; Roth, W.; Benz, J. [Fraunhofer-Institut fuer Solare Energiesysteme (ISE), Freiburg im Breisgau (Germany); Mueller, M. [Steca GmbH, Solar Electronics, Memmingen (Germany)

    2004-07-01

    The idea behind the Universal Energy Supply Protocol (UESP) is to equip all components (all kinds of generators, batteries and loads) with an identical and well-defined electrical DC connection as well as with intelligence and a communication interface, speaking a defined protocol (UESP). Power flow and information flow are separated, leading to more flexibility in system sizing and standardisation. A centralised control and energy management system administers the system as a whole. Its software is able to manage the energy generation and consumption and ensures the required level of reliability while reducing the operational cost to a minimum. In contrast to existing management concepts, the central idea behind UESP is to outsource the intelligence and the knowledge on the operational behaviour of the components out of the central management system into the components themselves. The components provide information about their current status of operation, current and future operation cost and constraints to the central management system. Here, using 'virtual stock exchange' algorithms, an optimised schedule for all components is determined and fed back to the components for implementation. The central management is thus very generic and can handle any component using the UESP protocol. It automatically adapts to new or changed system configurations, as these changes impact the optimisation only by additional 'players' on the virtual stock market. Eight German companies have teamed up with Fraunhofer ISE in a challenging project (funded by the German Ministry for the Environment, Nature Conservation and Nuclear Safety, BMU) to define the previously described protocol and interfaces and to elaborate the various implementations. The applications range form village power supply systems to telecommunication stations and signalling systems. It is foreseen to establish UESP as standardised interface in the future. (orig.)

  5. Does Transcranial Direct Current Stimulation Combined with Peripheral Electrical Stimulation Have an Additive Effect in the Control of Hip Joint Osteonecrosis Pain Associated with Sickle Cell Disease? A Protocol for a One-Session Double Blind, Block-Randomized Clinical Trial

    Directory of Open Access Journals (Sweden)

    Tiago da Silva Lopes

    2017-12-01

    Full Text Available Chronic pain in Sickle Cell Disease (SCD is probably related to maladaptive plasticity of brain areas involved in nociceptive processing. Transcranial Direct Current Stimulation (tDCS and Peripheral Electrical Stimulation (PES can modulate cortical excitability and help to control chronic pain. Studies have shown that combined use of tDCS and PES has additive effects. However, to date, no study investigated additive effects of these neuromodulatory techniques on chronic pain in patients with SCD. This protocol describes a study aiming to assess whether combined use of tDCS and PES more effectively alleviate pain in patients with SCD compared to single use of each technique. The study consists of a one-session double blind, block-randomized clinical trial (NCT02813629 in which 128 participants with SCD and femoral osteonecrosis will be enrolled. Stepwise procedures will occur on two independent days. On day 1, participants will be screened for eligibility criteria. On day 2, data collection will occur in four stages: sample characterization, baseline assessment, intervention, and post-intervention assessment. These procedures will last ~5 h. Participants will be divided into two groups according to homozygous for S allele (HbSS (n = 64 and heterozygous for S and C alleles (HbSC (n = 64 genotypes. Participants in each group will be randomly assigned, equally, to one of the following interventions: (1 active tDCS + active PES; (2 active tDCS + sham PES; (3 sham tDCS + active PES; and (4 sham tDCS + sham PES. Active tDCS intervention will consist of 20 min 2 mA anodic stimulation over the primary motor cortex contralateral to the most painful hip. Active PES intervention will consist of 30 min sensory electrical stimulation at 100 Hz over the most painful hip. The main study outcome will be pain intensity, measured by a Visual Analogue Scale. In addition, electroencephalographic power density, cortical maps of the gluteus maximus muscle elicited by

  6. Quantum protocol for cheat-sensitive weak coin flipping.

    Science.gov (United States)

    Spekkens, R W; Rudolph, Terry

    2002-11-25

    We present a quantum protocol for the task of weak coin flipping. We find that, for one choice of parameters in the protocol, the maximum probability of a dishonest party winning the coin flip if the other party is honest is 1/sqrt[2]. We also show that if parties restrict themselves to strategies wherein they cannot be caught cheating, their maximum probability of winning can be even smaller. As such, the protocol offers additional security in the form of cheat sensitivity.

  7. An economic and feasible Quantum Sealed-bid Auction protocol

    Science.gov (United States)

    Zhang, Rui; Shi, Run-hua; Qin, Jia-qi; Peng, Zhen-wan

    2018-02-01

    We present an economic and feasible Quantum Sealed-bid Auction protocol using quantum secure direct communication based on single photons in both the polarization and the spatial-mode degrees of freedom, where each single photon can carry two bits of classical information. Compared with previous protocols, our protocol has higher efficiency. In addition, we propose a secure post-confirmation mechanism without quantum entanglement to guarantee the security and the fairness of the auction.

  8. Protocols for quantum binary voting

    Science.gov (United States)

    Thapliyal, Kishore; Sharma, Rishi Dutt; Pathak, Anirban

    Two new protocols for quantum binary voting are proposed. One of the proposed protocols is designed using a standard scheme for controlled deterministic secure quantum communication (CDSQC), and the other one is designed using the idea of quantum cryptographic switch, which uses a technique known as permutation of particles. A few possible alternative approaches to accomplish the same task (quantum binary voting) have also been discussed. Security of the proposed protocols is analyzed. Further, the efficiencies of the proposed protocols are computed, and are compared with that of the existing protocols. The comparison has established that the proposed protocols are more efficient than the existing protocols.

  9. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  10. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  11. Background of the implementation of the Protocol the Convention against Torture: Monitoring places of detention and prevention of torture in Uruguay

    Directory of Open Access Journals (Sweden)

    Álvaro Garcé García y Santos

    2014-07-01

    Full Text Available The ratification of the Optional Protocol of the Convention against Torture had for our country, the significance of an ethical and juridical commitment of giving priority to the prevention of abuses for all the people deprived from liberty who are in jails or in other places of detention, as a consequence of a judicial decision or by virtue of an administrative mandate. Among the obligations established by the said Protocol it is found the one of setting up a National Mechanism of Prevention, technically and economically independent, in charge of the systematic monitoring of the detention centers. The creation of the National Institution of Human Rights, together with the legal mandate the same bears to coordinate its duties with the pre-existing Parliamentary Commissioner, finally brings the certain possibility of fulfilling with the obligations arising from the Protocol. At the same time, the original national solution, unparalleled in the region, implies a series of juridical complexities approached in this work. The cooperation between the two State Institutions involved in the matter, so as to avoid a useless overlapping of duties, brings up a promising future in relation to the prevention of torture in Uruguay.

  12. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Abstract. Kak's quantum key distribution (QKD) protocol provides not only the dis- tribution but also the integrity of secret key simultaneously in quantum channel. Conse- quently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the ...

  13. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Kak's quantum key distribution (QKD) protocol provides not only the distribution but also the integrity of secret key simultaneously in quantum channel. Consequently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the failure of Kak's ...

  14. Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons. Accession of Bulgaria

    International Nuclear Information System (INIS)

    2009-01-01

    The Agency received from the Republic of Bulgaria on 15 September 2008 and from the European Atomic Energy Community on 1 May 2009, notification that their respective requirements had been met. Accordingly, the Additional Protocol came into force for Bulgaria on 1 May 2009 [es

  15. Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons. Accession of Romania

    International Nuclear Information System (INIS)

    2010-01-01

    The Agency received from Romania on 22 August 2007 and from the European Atomic Energy Community on 1 May 2010, notification that their respective requirements had been met. Accordingly, the Additional Protocol came into force for Romania on 1 May 2010 [es

  16. Analysing Password Protocol Security Against Off-line Dictionary Attacks

    NARCIS (Netherlands)

    Corin, R.J.; Doumen, J.M.; Etalle, Sandro

    2003-01-01

    We study the security of password protocols against off-line dictionary attacks. In addition to the standard adversary abilities, we also consider further cryptographic advantages given to the adversary when considering the password protocol being instantiated with particular encryption schemes. We

  17. Analysing Password Protocol Security Against Off-line Dictionary Attacks

    NARCIS (Netherlands)

    Corin, R.J.; Doumen, J.M.; Etalle, Sandro; Busi, Nadia; Gorrieri, Roberto; Martinelli, Fabio

    We study the security of password protocols against off-line dictionary attacks. In addition to the standard adversary abilities, we also consider further cryptographic advantages given to the adversary when considering the password protocol being instantiated with particular encryption schemes. We

  18. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  19. Frameworks for Protocol Implementation

    NARCIS (Netherlands)

    de Barros Barbosa, Ciro; de barros Barbosa, C.; Ferreira Pires, Luis; Pires, L.F.; van Sinderen, Marten J.

    1998-01-01

    This paper reports on the development of a catalogue of frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be re-used in the implementation of various different concrete systems in this domain. By using frameworks we aim

  20. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  1. Updating protocols prodigy.

    Science.gov (United States)

    Ambrose, Kate

    2005-04-01

    If you are updating protocols, why not try the Prodigy website, at www.prodigy.nhs.uk ? It is a source of clinical knowledge on a range oftopics that is based on best evidence and organised to support clinical decision making.

  2. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    Science.gov (United States)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  3. PROFILE: Environmental Impact Assessment Under the National Environmental Policy Act and the Protocol on Environmental Protection to the Antarctic Treaty.

    Science.gov (United States)

    Ensminger; McCold; Webb

    1999-07-01

    / Antarctica has been set aside by the international community for protection as a natural reserve and a place for scientific research. Through the Antarctic Treaty of 1961, the signing nations agreed to cooperate in protecting the antarctic environment, in conducting scientific studies, and in abstaining from the exercise of territorial claims. The 1991 signing of the Protocol on Environmental Protection to the Antarctic Treaty (Protocol) by representatives of the 26 nations comprising the Antarctic Treaty Consultative Parties (Parties) significantly strengthened environmental protection measures for the continent. The Protocol required ratification by each of the governments individually prior to official implementation. The US government ratified the Protocol by passage of the Antarctic Science, Tourism, and Conservation Act of 1997. Japan completed the process by ratifying the Protocol on December 15, 1997. US government actions undertaken in Antarctica are subject to the requirements of both the Protocol and the US National Environmental Policy Act (NEPA). There are differences in the scope and intent of the Protocol and NEPA; however, both require environmental impact assessment (EIA) as part of the planning process for proposed actions that have the potential for environmental impacts. In this paper we describe the two instruments and highlight key similarities and differences with particular attention to EIA. Through this comparison of the EIA requirements of NEPA and the Protocol, we show how the requirements of each can be used in concert to provide enhanced environmental protection for the antarctic environment. NEPA applies only to actions of the US government; therefore, because NEPA includes certain desirable attributes that have been refined and clarified through numerous court cases, and because the Protocol is just entering implementation internationally, some recommendations are made for strengthening the procedural requirements of the Protocol

  4. A Survey on Underwater Acoustic Sensor Network Routing Protocols

    Directory of Open Access Journals (Sweden)

    Ning Li

    2016-03-01

    Full Text Available Underwater acoustic sensor networks (UASNs have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  5. A Survey on Underwater Acoustic Sensor Network Routing Protocols.

    Science.gov (United States)

    Li, Ning; Martínez, José-Fernán; Meneses Chaus, Juan Manuel; Eckert, Martina

    2016-03-22

    Underwater acoustic sensor networks (UASNs) have become more and more important in ocean exploration applications, such as ocean monitoring, pollution detection, ocean resource management, underwater device maintenance, etc. In underwater acoustic sensor networks, since the routing protocol guarantees reliable and effective data transmission from the source node to the destination node, routing protocol design is an attractive topic for researchers. There are many routing algorithms have been proposed in recent years. To present the current state of development of UASN routing protocols, we review herein the UASN routing protocol designs reported in recent years. In this paper, all the routing protocols have been classified into different groups according to their characteristics and routing algorithms, such as the non-cross-layer design routing protocol, the traditional cross-layer design routing protocol, and the intelligent algorithm based routing protocol. This is also the first paper that introduces intelligent algorithm-based UASN routing protocols. In addition, in this paper, we investigate the development trends of UASN routing protocols, which can provide researchers with clear and direct insights for further research.

  6. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  7. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  8. Information Flow in Secret Sharing Protocols

    Directory of Open Access Journals (Sweden)

    Elham Kashefi

    2009-11-01

    Full Text Available The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC, error correction and secret sharing amongst others. In addition they are at the forefront in terms of implementations. As such they represent an excellent opportunity to move towards integrated protocols involving many of these elements. In this paper we look at expressing and extending graph state secret sharing and MBQC in a common framework and graphical language related to flow. We do so with two main contributions. First we express in entirely graphical terms which set of players can access which information in graph state secret sharing protocols. These succinct graphical descriptions of access allow us to take known results from graph theory to make statements on the generalisation of the previous schemes to present new secret sharing protocols. Second, we give a set of necessary conditions as to when a graph with flow, i.e. capable of performing a class of unitary operations, can be extended to include vertices which can be ignored, pointless measurements, and hence considered as unauthorised players in terms of secret sharing, or error qubits in terms of fault tolerance. This offers a way to extend existing MBQC patterns to secret sharing protocols. Our characterisation of pointless measurements is believed also to be a useful tool for further integrated measurement based schemes, for example in constructing fault tolerant MBQC schemes.

  9. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  10. Phototherapy Modalities and Protocols

    Directory of Open Access Journals (Sweden)

    Ayten Ferahbaş

    2010-12-01

    Full Text Available Over the past few years, the development of irradiation devices with new emission spectra has led to an expanded role for phototherapy in the treatment of skin diseases. This development is best illustrated by the increasing frequency with which 311 nm UVB phototherapy is used for the treatment of psoriasis and vitiligo, especially. Another example is UVA1 340-400 nm. UVA1 was first used to treat patients with atopic dermatitis, but it has been found to be efficacious in several other skin diseases. This is overview of the protocols for phototherapy with UV in the treatment of skin diseases as currently used according to recent literature review. There are, of course, other protocols in use that are effective.

  11. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  12. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  13. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  14. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  15. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  16. Protocol for a Delay-Tolerant Data-Communication Network

    Science.gov (United States)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  17. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  18. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 74683-79494

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  19. Neuro MR: protocols.

    Science.gov (United States)

    Mikulis, David J; Roberts, Timothy P L

    2007-10-01

    Clinical MRI depends on a symbiosis between MR physics and clinical requirements. The imaging solutions are based on a balance between the "palette" of available image contrasts derived from nuclear spin physics and tissue biophysics, and clinical determinants such as the anticipated pathology and efficient use of imaging time. Imaging is therefore optimized to maximize diagnostic sensitivity and specificity through the development of protocols organized along the lines of major disease categories. In the other part of this two-part review, the primary determinants of image contrast, including T1, T2, and T2*, were highlighted. The development of pulse sequences designed to optimize each of these image contrasts was discussed and the impact of technological innovation (parallel imaging and high-field systems) on the manner in which these sequences could be modified to improve clinical efficacy was further emphasized. The scope of that discussion was broadened to include the application of: 1) water diffusion imaging used primarily for detection of pathologies that restrict the free movement of water in the tissues and for defining fiber tracts in the brain; 2) the intravenous administration of exogenous contrast agents (gadolinium-diethylene triamine pentaacetic acid [GdDTPA]) for assessment of blood-brain-barrier (BBB) defects and brain blood flow; and 3) MR spectroscopy (MRS) for assessment of brain metabolites. The goal of this part is to discuss how these acquisitions are combined into specific protocols that can effectively detect and characterize, or in keeping with our artistic analogy, "paint" each of the major diseases affecting the central nervous system (CNS). This work concludes with a discussion of image artifacts and pitfalls in image interpretation, which, in spite our best efforts to minimize or eliminate them, continue to occur. Much of the ensuing discussion is based on our own institutional experience. Protocols, therefore, do not necessarily

  20. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  1. Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons

    International Nuclear Information System (INIS)

    2005-01-01

    The text of the Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons is reproduced in the Annex to this document for the information of all Members. The Additional Protocol was approved by the Board of Governors on 11 June 1998. It was signed in Vienna on 22 September 1998

  2. The importance of the Montreal Protocol in protecting climate.

    Science.gov (United States)

    Velders, Guus J M; Andersen, Stephen O; Daniel, John S; Fahey, David W; McFarland, Mack

    2007-03-20

    The 1987 Montreal Protocol on Substances that Deplete the Ozone Layer is a landmark agreement that has successfully reduced the global production, consumption, and emissions of ozone-depleting substances (ODSs). ODSs are also greenhouse gases that contribute to the radiative forcing of climate change. Using historical ODSs emissions and scenarios of potential emissions, we show that the ODS contribution to radiative forcing most likely would have been much larger if the ODS link to stratospheric ozone depletion had not been recognized in 1974 and followed by a series of regulations. The climate protection already achieved by the Montreal Protocol alone is far larger than the reduction target of the first commitment period of the Kyoto Protocol. Additional climate benefits that are significant compared with the Kyoto Protocol reduction target could be achieved by actions under the Montreal Protocol, by managing the emissions of substitute fluorocarbon gases and/or implementing alternative gases with lower global warming potentials.

  3. Quantum-key-distribution protocol with pseudorandom bases

    Science.gov (United States)

    Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.

    2018-01-01

    Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.

  4. Authentication Protocols for Internet of Things: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Mohamed Amine Ferrag

    2017-01-01

    Full Text Available In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1 Machine to Machine Communications (M2M, (2 Internet of Vehicles (IoV, (3 Internet of Energy (IoE, and (4 Internet of Sensors (IoS. Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

  5. The Nagoya Protocol and Indigenous Peoples

    Directory of Open Access Journals (Sweden)

    Maria Yolanda Teran

    2016-07-01

    Full Text Available This article is about Indigenous peoples’ involvement in the Nagoya Protocol negotiations from 2006 to 2010, as well as in its implementation to stop biopiracy in order to protect Pachamama, Mother Earth, and to ensure our survival and the survival of coming generations. The Nagoya Protocol is an international instrument that was adopted in Nagoya, Japan in October 2010 by the Conference of Parties (COP 10 and ratified by 51 countries in Pyeongchang, South Korea in October 2014 at COP 12. This protocol governs access to genetic resources and the fair and equitable sharing of benefits arising from their utilization (access and benefit sharing [ABS]. It has several articles related to Indigenous peoples and traditional knowledge, as well as: The interrelation and inseparable nature between genetic resources and traditional knowledge; The diversity of circumstances surrounding traditional knowledge ownership, including by country; The identification of traditional knowledge owners; The declaration of Indigenous peoples' human rights; and The role of women in the biodiversity process. In addition, this protocol lays out obligations on access, specifically participation in equitable benefit sharing, the accomplishment of prior and informed consent, and the mutually agreed terms and elaboration of a national legal ABS framework with the participation of Indigenous peoples and local communities in order to have well-defined roles, responsibilities, and times of negotiations.

  6. The Evolution of Web Protocols

    OpenAIRE

    Kelly, B

    1999-01-01

    This paper outlines the evolution of World Wide Web protocols. The paper reviews the original protocols developed for the web, in addressing, transport and data formats. A review of developments of the protocols is given, including developments of web data formats (HTML 4.0, cascading stylesheets and XML), transport (HTTP/1.1 and HTTP/NG) and addressing (URLs). The paper describes how the web initially lacked a metadata architecture and outlines the emergence of a metadata architecture for th...

  7. A protected password change protocol

    OpenAIRE

    Wang, Ren-Chiun; Yang, Chou-Chen; Mo, Kun-Ru

    2005-01-01

    Some protected password change protocols were proposed. However, the previous protocols were easily vulnerable to several attacks such as denial of service, password guessing, stolen-verifier and impersonation atacks etc. Recently, Chang et al. proposed a simple authenticated key agreement and protected password change protocol for enhancing the security and efficiency. In this paper, authors shall show that password guessing, denial of service and known-key attacks can work in their password...

  8. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  9. Host Identity Protocol Proxy

    Science.gov (United States)

    Salmela, Patrik; Melén, Jan

    The Host Identity Protocol (HIP) is one of the more recent designs that challenge the current Internet architecture. The main features of HIP are security and the identifier-locator split, which solves the problem of overloading the IP address with two separate tasks. This paper studies the possibility of providing HIP services to legacy hosts via a HIP proxy. Making a host HIP enabled requires that the IP-stack of the host is updated to support HIP. From a network administrator's perspective this can be a large obstacle. However, by providing HIP from a centralized point, a HIP proxy, the transition to begin using HIP can be made smoother. This and other arguments for a HIP proxy will be presented in this paper along with an analysis of a prototype HIP proxy and its performance.

  10. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  11. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  12. Additive Manufacturing Infrared Inspection

    Science.gov (United States)

    Gaddy, Darrell; Nettles, Mindy

    2015-01-01

    The Additive Manufacturing Infrared Inspection Task started the development of a real-time dimensional inspection technique and digital quality record for the additive manufacturing process using infrared camera imaging and processing techniques. This project will benefit additive manufacturing by providing real-time inspection of internal geometry that is not currently possible and reduce the time and cost of additive manufactured parts with automated real-time dimensional inspections which deletes post-production inspections.

  13. [Food additives and healthiness].

    Science.gov (United States)

    Heinonen, Marina

    2014-01-01

    Additives are used for improving food structure or preventing its spoilage, for example. Many substances used as additives are also naturally present in food. The safety of additives is evaluated according to commonly agreed principles. If high concentrations of an additive cause adverse health effects for humans, a limit of acceptable daily intake (ADI) is set for it. An additive is a risk only when ADI is exceeded. The healthiness of food is measured on the basis of nutrient density and scientifically proven effects.

  14. [A new protocol, is the spine still safe?].

    Science.gov (United States)

    Kokke, Marike C; Ham, Wietske; Leenen, Loek P H

    2015-01-01

    The latest version of the Dutch National Protocol Ambulance Care (Landelijk Protocol Ambulancezorg LPA8), introduced on 1 January 2015, contains too few guarantees of the safety of trauma patients in whom spinal immobilisation has to be performed. A number of strict indications have been removed and too much freedom is also permitted with respect to implementation. Although the previous standard method using a spinal board, collar and blocks did have disadvantages, the new operating method has been insufficiently substantiated and, in addition, is not well matched to the protocols of Accident and Emergency departments. It is vital that the agencies involved collaborate to reach a joint solution.

  15. SPECT/CT workflow and imaging protocols

    International Nuclear Information System (INIS)

    Beckers, Catherine; Hustinx, Roland

    2014-01-01

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  16. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  17. Resource Usage Protocols for Iterators

    NARCIS (Netherlands)

    Huisman, Marieke; Haack, C.; Müller, P.; Hurlin, C.

    We discuss usage protocols for iterator objects that prevent concurrent modifications of the underlying collection while iterators are in progress. We formalize these protocols in Java-like object interfaces, enriched with separation logic contracts. We present examples of iterator clients and

  18. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  19. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  20. Early action to reduce greenhouse gas emissions before the commitment period of the Kyoto protocol: advantages and disadvantages.

    Science.gov (United States)

    Michaelowa, A; Rolfe, C

    2001-09-01

    Current "business as usual" projections suggest greenhouse gas emissions from industrialized nations will grow substantially over the next decade. However, if it comes into force, the Kyoto Protocol will require industrialized nations to reduce emissions to an average of 5% below 1990 levels in the 2008-2012 period. Taking early action to close this gap has a number of advantages. It reduces the risks of passing thresholds that trigger climate change "surprises." Early action also increases future generations' ability to choose greater levels of climate protection, and it leads to faster reductions of other pollutants. From an economic sense, early action is important because it allows shifts to less carbon-intensive technologies during the course of normal capital stock turnover. Moreover, many options for emission reduction have negative costs, and thus are economically worthwhile, because of paybacks in energy costs, healthcare costs, and other benefits. Finally, early emission reductions enhance the probability of successful ratification and lower the risk of noncompliance with the protocol. We discuss policy approaches for the period prior to 2008. Disadvantages of the current proposals for Credit for Early Action are the possibility of adverse selection due to problematic baseline calculation methods as well as the distributionary impacts of allocating a part of the emissions budget already before 2008. One simple policy without drawbacks is the so-called baseline protection, which removes the disincentive to early action due to the expectation that businesses may, in the future, receive emission rights in proportion to past emissions. It is particularly important to adopt policies that shift investment in long-lived capital stock towards less carbon-intensive technologies and to encourage innovation and technology development that will reduce future compliance costs.

  1. Additives in yoghurt production

    Directory of Open Access Journals (Sweden)

    Milna Tudor

    2008-02-01

    Full Text Available In yoghurt production, mainly because of sensory characteristics, different types of additives are used. Each group, and also each substance from the same group has different characteristics and properties. For that reason, for improvement of yoghurt sensory characteristics apart from addition selection, the quantity of the additive is very important. The same substance added in optimal amount improves yoghurt sensory attributes, but too small or too big addition can reduce yoghurt sensory attributes. In this paper, characteristics and properties of mostly used additives in yoghurt production are described; skimmed milk powder, whey powder, concentrated whey powder, sugars and artificial sweeteners, fruits, stabilizers, casein powder, inulin and vitamins. Also the impact of each additive on sensory and physical properties of yoghurt, syneresis and viscosity, are described, depending on used amount added in yoghurt production.

  2. Laboratory protocols for testing the efficacy of commercial pit latrine ...

    African Journals Online (AJOL)

    additive products. Protocols were developed and tested on a range of different commercial products sold for their ability to control the rate of accumulation of pit latrine contents. The effect of commercial additives on mass loss from VIP sludge in. 300 g honey jars was compared to mass loss from similar units subjected to no ...

  3. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    Science.gov (United States)

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  4. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  5. Comparison of a new whole-body continuous-table-movement protocol versus a standard whole-body MR protocol for the assessment of multiple myeloma.

    Science.gov (United States)

    Weckbach, S; Michaely, H J; Stemmer, A; Schoenberg, S O; Dinter, D J

    2010-12-01

    To evaluate a whole body (WB) continuous-table-movement (CTM) MR protocol for the assessment of multiple myeloma (MM) in comparison to a step-by-step WB protocol. Eighteen patients with MM were examined at 1.5T using a WB CTM protocol (axial T2-w fs BLADE, T1-w GRE sequence) and a step-by-step WB protocol including coronal/sagittal T1-w SE and STIR sequences as reference. Protocol time was assessed. Image quality, artefacts, liver/spleen assessability, and the ability to depict bone marrow lesions less than or greater than 1 cm as well as diffuse infiltration and soft tissue lesions were rated. Potential changes in the Durie and Salmon Plus stage and the detectability of complications were assessed. Mean protocol time was 6:38 min (CTM) compared to 24:32 min (standard). Image quality was comparable. Artefacts were more prominent using the CTM protocol (P = 0.0039). Organ assessability was better using the CTM protocol (P < 0.001). Depiction of bone marrow and soft tissue lesions was identical without a staging shift. Vertebral fractures were not detected using the CTM protocol. The new protocol allows a higher patient throughput and facilitates the depiction of extramedullary lesions. However, as long as vertebral fractures are not detectable, the protocol cannot be safely used for clinical routine without the acquisition of an additional sagittal sequence.

  6. Comparison of a new whole-body continuous-table-movement protocol versus a standard whole-body MR protocol for the assessment of multiple myeloma

    International Nuclear Information System (INIS)

    Weckbach, S.; Michaely, H.J.; Schoenberg, S.O.; Dinter, D.J.; Stemmer, A.

    2010-01-01

    To evaluate a whole body (WB) continuous-table-movement (CTM) MR protocol for the assessment of multiple myeloma (MM) in comparison to a step-by-step WB protocol. Eighteen patients with MM were examined at 1.5T using a WB CTM protocol (axial T2-w fs BLADE, T1-w GRE sequence) and a step-by-step WB protocol including coronal/sagittal T1-w SE and STIR sequences as reference. Protocol time was assessed. Image quality, artefacts, liver/spleen assessability, and the ability to depict bone marrow lesions less than or greater than 1 cm as well as diffuse infiltration and soft tissue lesions were rated. Potential changes in the Durie and Salmon Plus stage and the detectability of complications were assessed. Mean protocol time was 6:38 min (CTM) compared to 24:32 min (standard). Image quality was comparable. Artefacts were more prominent using the CTM protocol (P = 0.0039). Organ assessability was better using the CTM protocol (P < 0.001). Depiction of bone marrow and soft tissue lesions was identical without a staging shift. Vertebral fractures were not detected using the CTM protocol. The new protocol allows a higher patient throughput and facilitates the depiction of extramedullary lesions. However, as long as vertebral fractures are not detectable, the protocol cannot be safely used for clinical routine without the acquisition of an additional sagittal sequence. (orig.)

  7. Additive and polynomial representations

    CERN Document Server

    Krantz, David H; Suppes, Patrick

    1971-01-01

    Additive and Polynomial Representations deals with major representation theorems in which the qualitative structure is reflected as some polynomial function of one or more numerical functions defined on the basic entities. Examples are additive expressions of a single measure (such as the probability of disjoint events being the sum of their probabilities), and additive expressions of two measures (such as the logarithm of momentum being the sum of log mass and log velocity terms). The book describes the three basic procedures of fundamental measurement as the mathematical pivot, as the utiliz

  8. Redactions in protocols for drug trials: what industry sponsors concealed.

    Science.gov (United States)

    Marquardsen, Mikkel; Ogden, Michelle; Gøtzsche, Peter C

    2018-01-01

    Objective To describe the redactions in contemporary protocols for industry-sponsored randomised drug trials with patient relevant outcomes and to evaluate whether there was a legitimate rationale for the redactions. Design Cohort study. Under the Freedom of Information Act, we requested access to trial protocols approved by a research ethics committee in Denmark from October 2012 to March 2013. We received 17 consecutive protocols, which had been redacted before we got them, and nine protocols without redactions. In five additional cases, the companies refused to let the committees give us access, and in three other cases, documents were missing. Participants Not applicable. Setting Not applicable. Main outcome measure Amount and nature of redactions in 22 predefined key protocol variables. Results The redactions were most widespread in those sections of the protocol where there is empirical evidence of substantial problems with the trustworthiness of published drug trials: data analysis, handling of missing data, detection and analysis of adverse events, definition of the outcomes, interim analyses and premature termination of the study, sponsor's access to incoming data while the study is running, ownership to the data and investigators' publication rights. The parts of the text that were redacted differed widely, both between companies and within the same company. Conclusions We could not identify any legitimate rationale for the redactions. The current mistrust in industry-sponsored drug trials can only change if the industry offers unconditional access to its trial protocols and other relevant documents and data.

  9. Performance analysis of routing protocols for IoT

    Science.gov (United States)

    Manda, Sridhar; Nalini, N.

    2018-04-01

    Internet of Things (IoT) is an arrangement of advancements that are between disciplinary. It is utilized to have compelling combination of both physical and computerized things. With IoT physical things can have personal virtual identities and participate in distributed computing. Realization of IoT needs the usage of sensors based on the sector for which IoT is integrated. For instance, in healthcare domain, IoT needs to have integration with wearable sensors used by patients. As sensor devices produce huge amount of data, often called big data, there should be efficient routing protocols in place. To the extent remote systems is worried there are some current protocols, for example, OLSR, DSR and AODV. It additionally tosses light into Trust based routing protocol for low-power and lossy systems (TRPL) for IoT. These are broadly utilized remote directing protocols. As IoT is developing round the corner, it is basic to investigate routing protocols that and evaluate their execution regarding throughput, end to end delay, and directing overhead. The execution experiences can help in settling on very much educated choices while incorporating remote systems with IoT. In this paper, we analyzed different routing protocols and their performance is compared. It is found that AODV showed better performance than other routing protocols aforementioned.

  10. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  11. Food additives data book

    National Research Council Canada - National Science Library

    Smith, Jim; Hong-Shum, Lily

    2011-01-01

    .... Compiled by food industry experts with a proven track record of producing high quality reference work, this volume is the definitive resource for technologists using food additives"-- "The use...

  12. Food Additives and Hyperkinesis

    Science.gov (United States)

    Wender, Ester H.

    1977-01-01

    The hypothesis that food additives are causally associated with hyperkinesis and learning disabilities in children is reviewed, and available data are summarized. Available from: American Medical Association 535 North Dearborn Street Chicago, Illinois 60610. (JG)

  13. Rely-Guarantee Protocols

    Science.gov (United States)

    2014-05-01

    University Pittsburgh, PA 15213 1School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, USA. 2Faculdade de Ciências e Tecnologia ...additional examples that are not in the ECOOP paper. This work was partially supported by Fundação para a Ciência e Tecnologia (Portuguese Foundation

  14. Biologic comparison of partial breast irradiation protocols

    International Nuclear Information System (INIS)

    Rosenstein, Barry S.; Lymberis, Stella C.; Formenti, Silvia C.

    2004-01-01

    Purpose: To analyze the dose/fractionation schedules currently used in ongoing clinical trials of partial breast irradiation (PBI) by comparing their biologically effective dose (BED) values to those of three standard whole breast protocols commonly used after segmental mastectomy in the treatment of breast cancer. Methods and materials: The BED equation derived from the linear-quadratic model for radiation-induced cell killing was used to calculate the BEDs for three commonly used whole breast radiotherapy regimens, in addition to a variety of external beam radiotherapy, as well as high-dose-rate and low-dose-rate brachytherapy, PBI protocols. Results: The BED values of most PBI protocols resulted in tumor control BEDs roughly equivalent to a 50-Gy standard treatment, but consistently lower than the BEDs for regimens in which the tumor bed receives a total dose of either 60 Gy or 66 Gy. The BED values calculated for the acute radiation responses of erythema and desquamation were nearly all lower for the PBI schedules, and the late-response BEDs for most PBI regimens were in a similar range to the BEDs for the standard treatments. Conclusion: Biologically effective dose modeling raises the concern that inadequate doses might be delivered by PBI to ensure optimal in-field tumor control

  15. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  16. Recommended protocols for sampling macrofungi

    Science.gov (United States)

    Gregory M. Mueller; John Paul Schmit; Sabine M. Hubndorf Leif Ryvarden; Thomas E. O' Dell; D. Jean Lodge; Patrick R. Leacock; Milagro Mata; Loengrin Umania; Qiuxin (Florence) Wu; Daniel L. Czederpiltz

    2004-01-01

    This chapter discusses several issues regarding reommended protocols for sampling macrofungi: Opportunistic sampling of macrofungi, sampling conspicuous macrofungi using fixed-size, sampling small Ascomycetes using microplots, and sampling a fixed number of downed logs.

  17. Automata-theoretic protocol programming

    NARCIS (Netherlands)

    Jongmans, Sung-Shik Theodorus Quirinus

    2016-01-01

    Parallel programming has become essential for writing scalable programs on general hardware. Conceptually, every parallel program consists of workers, which implement primary units of sequential computation, and protocols, which implement the rules of interaction that workers must abide by. As

  18. Fused Lasso Additive Model.

    Science.gov (United States)

    Petersen, Ashley; Witten, Daniela; Simon, Noah

    2016-01-01

    We consider the problem of predicting an outcome variable using p covariates that are measured on n independent observations, in a setting in which additive, flexible, and interpretable fits are desired. We propose the fused lasso additive model (FLAM), in which each additive function is estimated to be piecewise constant with a small number of adaptively-chosen knots. FLAM is the solution to a convex optimization problem, for which a simple algorithm with guaranteed convergence to a global optimum is provided. FLAM is shown to be consistent in high dimensions, and an unbiased estimator of its degrees of freedom is proposed. We evaluate the performance of FLAM in a simulation study and on two data sets. Supplemental materials are available online, and the R package flam is available on CRAN.

  19. e-SCP-ECG+ Protocol: An Expansion on SCP-ECG Protocol for Health Telemonitoring—Pilot Implementation

    Directory of Open Access Journals (Sweden)

    George J. Mandellos

    2010-01-01

    Full Text Available Standard Communication Protocol for Computer-assisted Electrocardiography (SCP-ECG provides standardized communication among different ECG devices and medical information systems. This paper extends the use of this protocol in order to be included in health monitoring systems. It introduces new sections into SCP-ECG structure for transferring data for positioning, allergies, and five additional biosignals: noninvasive blood pressure (NiBP, body temperature (Temp, Carbon dioxide (CO2, blood oxygen saturation (SPO2, and pulse rate. It also introduces new tags in existing sections for transferring comprehensive demographic data. The proposed enhanced version is referred to as e-SCP-ECG+ protocol. This paper also considers the pilot implementation of the new protocol as a software component in a Health Telemonitoring System.

  20. Alternative additives; Alternative additiver

    Energy Technology Data Exchange (ETDEWEB)

    2007-08-15

    In this project a number of industrial and agricultural waste products have been characterised and evaluated in terms of alkali-getter performance. The intended use is for biomass-fired power stations aiming at reducing corrosion or slagging related problems. The following products have been obtained, characterised and evaluated: 1) Brewery draff 2) Danish de-gassed manure 3) Paper sludge 4) Moulding sand 5) Spent bleaching earth 6) Anorthosite 7) Sand 8) Clay-sludge. Most of the above alternative additive candidates are deemed unsuitable due to insufficient chemical effect and/or expensive requirements for pre-treatment (such as drying and transportation). 3 products were selected for full-scale testing: de-gassed manure, spent bleaching earth and clay slugde. The full scale tests were undertaken at the biomass-fired power stations in Koege, Slagelse and Ensted. Spent bleaching earth (SBE) and clay sludge were the only tested additive candidates that had a proven ability to react with KCl, to thereby reduce Cl-concentrations in deposits, and reduce the deposit flux to superheater tubes. Their performance was shown to nearly as good as commercial additives. De-gassed manure, however, did not evaluate positively due to inhibiting effects of Ca in the manure. Furthermore, de-gassed manure has a high concentration of heavy metals, which imposes a financial burden with regard to proper disposal of the ash by-products. Clay-sludge is a wet clay slurring, and drying and transportation of this product entails substantial costs. Spent bleaching does not require much pre-treatment and is therefore the most promising alternative additive. On the other hand, bleaching earth contains residual plant oil which means that a range of legislation relating to waste combustion comes into play. Not least a waste combustion fee of 330 DKK/tonne. For all alternative (and commercial) additives disposal costs of the increase ash by-products represents a significant cost. This is

  1. From additivity to synergism

    DEFF Research Database (Denmark)

    Ritz, Christian; Streibig, Jens Carl

    2014-01-01

    Interest in synergistic or antagonistic effects through mixture experiments has grown immensely over the past two decades, not the least within in pharmacology and toxicology. Several definitions of reference models exist; one commonly used reference model is concentration or dose addition, which...... assumes compounds, when administrated simultaneously, do not interfere with each other at the site of action. We focus on statistical modelling that allows evaluation of dose addition. We will describe several statistical approaches that are suitable for analysis mixture data where synergistic...... or antagonistic effects may be present. The statistical models are defined and explained and some of the approaches exemplified. Code in open-source software is provided....

  2. Additives in plastics.

    Science.gov (United States)

    Deanin, R D

    1975-01-01

    The polymers used in plastics are generally harmless. However, they are rarely used in pure form. In almost all commercial plastics, they are "compounded" with monomeric ingredients to improve their processing and end-use performance. In order of total volume used, these monomeric additives may be classified as follows: reinforcing fibers, fillers, and coupling agents; plasticizers; colorants; stabilizers (halogen stabilizers, antioxidants, ultraviolet absorbers, and biological preservatives); processing aids (lubricants, others, and flow controls); flame retardants, peroxides; and antistats. Some information is already available, and much more is needed, on potential toxicity and safe handling of these additives during processing and manufacture of plastics products. PMID:1175566

  3. A novel protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery under cardiopulmonary bypass.

    Science.gov (United States)

    Odaka, Mizuho; Minakata, Kenji; Toyokuni, Hideaki; Yamazaki, Kazuhiro; Yonezawa, Atsushi; Sakata, Ryuzo; Matsubara, Kazuo

    2015-08-01

    This study aimed to develop and assess the effectiveness of a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. We established a protocol for antibiotic prophylaxis based on preoperative kidney function in patients undergoing open heart surgery. This novel protocol was assessed by comparing patients undergoing open heart surgery before (control group; n = 30) and after its implementation (protocol group; n = 31) at Kyoto University Hospital between July 2012 and January 2013. Surgical site infections (SSIs) were observed in 4 control group patients (13.3 %), whereas no SSIs were observed in the protocol group patients (P protocol group (P protocol significantly decreased the total antibiotic dose used in the perioperative period (P protocol group patients required this additional change in the antibiotic regimen (P protocol based on preoperative kidney function effectively prevents SSIs in patients undergoing open heart surgery.

  4. Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons. Accession of the Czech Republic

    International Nuclear Information System (INIS)

    2010-01-01

    Protocol Additional to the Agreement between the Republic of Austria, the Kingdom of Belgium, the Kingdom of Denmark, the Republic of Finland, the Federal Republic of Germany, the Hellenic Republic, Ireland, the Italian Republic, the Grand Duchy of Luxembourg, the Kingdom of The Netherlands, the Portuguese Republic, the Kingdom of Spain, the Kingdom of Sweden, the European Atomic Energy Community and the International Atomic Energy Agency in implementation of Article III, (1) and (4) of the Treaty on the Non-Proliferation of Nuclear Weapons. Accession of the Czech Republic [es

  5. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R.; Crawford, Aladsair J.; Viswanathan, Vilayanur V.; Ferreira, Summer; Schoenwald, David

    2014-06-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Its subsequent use in the field and review by the protocol working group and most importantly the users’ subgroup and the thermal subgroup has led to the fundamental modifications reflected in this update of the 2012 Protocol. As an update of the 2012 Protocol, this document (the June 2014 Protocol) is intended to supersede its predecessor and be used as the basis for measuring and expressing ESS performance. The foreword provides general and specific details about what additions, revisions, and enhancements have been made to the 2012 Protocol and the rationale for them in arriving at the June 2014 Protocol.

  6. Advances in Additive Manufacturing

    Science.gov (United States)

    2016-07-14

    State University, Applied Research Laboratory • Rich Martukanitz • Ken Meinert • Ted Reutzel • Jay Keist • Griffin Jones • Jay Tressler...Directorate. In this talk we highlight a few projects in additively manufactured electronics (e.g., batteries, capacitors, antennas) that span bench

  7. Biobased lubricant additives

    Science.gov (United States)

    Fully biobased lubricants are those formulated using all biobased ingredients, i.e. biobased base oils and biobased additives. Such formulations provide the maximum environmental, safety, and economic benefits expected from a biobased product. Currently, there are a number of biobased base oils that...

  8. Precursor Additive Manufacturing Inventions

    Science.gov (United States)

    Roberts, C.; Bourell, D.

    2018-03-01

    Most modern Additive Manufacturing (AM) processes were invented and commercialized in a short period of time spanning 1984-2000. This paper reports on AM processes invented in the 1974-1987 time period, known as precursor AM processes. The critical difference between the two periods is public knowledge and utilization of distributed computing.

  9. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  10. Additive manufactured serialization

    Science.gov (United States)

    Bobbitt, III, John T.

    2017-04-18

    Methods for forming an identifying mark in a structure are described. The method is used in conjunction with an additive manufacturing method and includes the alteration of a process parameter during the manufacturing process. The method can form in a unique identifying mark within or on the surface of a structure that is virtually impossible to be replicated. Methods can provide a high level of confidence that the identifying mark will remain unaltered on the formed structure.

  11. Climate change scenarios and Technology Transfer Protocols

    International Nuclear Information System (INIS)

    Kypreos, Socrates; Turton, Hal

    2011-01-01

    We apply a specific version of MERGE-ETL, an integrated assessment model, to study global climate policies supported by Technology Transfer Protocols (TTPs). We model a specific formulation of such a TTP where donor countries finance via carbon tax revenues, the diffusion of carbon-free technologies in developing countries (DCs) and quantify its benefits. Industrialized countries profit from increased technology exports, global diffusion of advanced technology (leading to additional technology learning and cost reductions) and reduced climate damages through the likelihood of greater global participation in a new international agreement. DCs experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and expected secondary benefits of carbon abatement (such as reduced local and regional air pollution). The analysis identifies potential candidate technologies that could be supported under a TTP, and the impact of a TTP on economic development (including the flow of transfer subsidies) and global emissions. Although a TTP may encourage additional participation, such a proposal is only likely to be successful if an increased willingness to pay to avoid climate damages is accepted, first by the present and future generations of the industrialized world and later on, when sufficient economic growth is accumulated, by today's developing countries. - Research Highlights: → Climate policy scenarios are assessed with differentiated commitments in carbon emission control supported by Technology Transfer Protocols. → Donor countries finance, via carbon-tax revenues, the exports of carbon-free technologies in developing countries helping to get a new international agreement. → Developing countries experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and secondary benefits. → Under Technology Protocols alone and

  12. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against act...

  13. About the Design of QUIC Firefox Transport Protocol

    Directory of Open Access Journals (Sweden)

    Vraj Pandya

    2017-07-01

    Full Text Available QUIC (Quick UDP Internet Connections Chrome is an experimental transport layer network protocol designed by Jim Roskind at Google, initially implemented in 2012 and announced publicly in 2013. One of the QUIC's goals is to improve performance of connection-oriented web applications that are currently using the Transmission Control Protocol (TCP. To do that, QUIC achieves a reduced latency and a better stream-multiplexing support to avoid network congestion. In 2015, Firefox Mozilla started to work on an equivalent QUIC transport protocol for their browser. This idea was motivated by the differences between Chrome and Firefox. Despite the fact that Mozilla Firefox and Google Chrome are both web browser engines, there are some significant differences between them, such as file hierarchy, open source policies (Firefox is completely, while Chrome is only partial, tabs design, continuous integration, and more. Likewise QUIC Chrome, QUIC Firefox is a new multiplexed and secure transport based on User Datagram Protocol (UDP, designed from the ground up and optimized for Hyper-Text Transfer Protocol 2 (HTTP/2 semantics. While built with HTTP/2 as the primary application protocol, QUIC builds on decades of transport and security experience, and implements mechanisms that make it attractive as a modern general-purpose transport. In addition to describing the main design of QUIC Firefox, this paper will compare Firefox with QUIC Firefox. Our preliminary experimental results support that QUIC Firefox has a faster execution time, less latency time, and a better throughput time than the traditional Firefox.  

  14. An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS.

    Science.gov (United States)

    Amin, Ruhul; Biswas, G P

    2015-08-01

    Recently, Giri et al.'s proposed a RSA cryptosystem based remote user authentication scheme for telecare medical information system and claimed that the protocol is secure against all the relevant security attacks. However, we have scrutinized the Giri et al.'s protocol and pointed out that the protocol is not secure against off-line password guessing attack, privileged insider attack and also suffers from anonymity problem. Moreover, the extension of password guessing attack leads to more security weaknesses. Therefore, this protocol needs improvement in terms of security before implementing in real-life application. To fix the mentioned security pitfalls, this paper proposes an improved scheme over Giri et al.'s scheme, which preserves user anonymity property. We have then simulated the proposed protocol using widely-accepted AVISPA tool which ensures that the protocol is SAFE under OFMC and CL-AtSe models, that means the same protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The informal cryptanalysis has been also presented, which confirmed that the proposed protocol provides well security protection on the relevant security attacks. The performance analysis section compares the proposed protocol with other existing protocols in terms of security and it has been observed that the protocol provides more security and achieves additional functionalities such as user anonymity and session key verification.

  15. Gasoline detergent additive

    Energy Technology Data Exchange (ETDEWEB)

    Herbstman, S.; Hayden, T.E.; Nalesnik, T.E.; Benfaremo, N.

    1991-07-09

    This patent describes a gasoline fuel composition. It comprises a major portion of a gasoline fuel and a minor amount, as a gasoline detergent additive, of a Mannich coupled product of bis-polyisobutylene succinimide of an amine, prepared by: reacting an alkenyl succinimide acid anhydride with an amine to form a bis-succinimide; treating the bis-succinimide with nonylphenol in the presence of an aldehyde to form a Mannich phenol coupled bis-succinimide product; and recovering the product Mannich phenol coupled bis-succinimide.

  16. Biocoder: A programming language for standardizing and automating biology protocols.

    Science.gov (United States)

    Ananthanarayanan, Vaishnavi; Thies, William

    2010-11-08

    Published descriptions of biology protocols are often ambiguous and incomplete, making them difficult to replicate in other laboratories. However, there is increasing benefit to formalizing the descriptions of protocols, as laboratory automation systems (such as microfluidic chips) are becoming increasingly capable of executing them. Our goal in this paper is to improve both the reproducibility and automation of biology experiments by using a programming language to express the precise series of steps taken. We have developed BioCoder, a C++ library that enables biologists to express the exact steps needed to execute a protocol. In addition to being suitable for automation, BioCoder converts the code into a readable, English-language description for use by biologists. We have implemented over 65 protocols in BioCoder; the most complex of these was successfully executed by a biologist in the laboratory using BioCoder as the only reference. We argue that BioCoder exposes and resolves ambiguities in existing protocols, and could provide the software foundations for future automation platforms. BioCoder is freely available for download at http://research.microsoft.com/en-us/um/india/projects/biocoder/. BioCoder represents the first practical programming system for standardizing and automating biology protocols. Our vision is to change the way that experimental methods are communicated: rather than publishing a written account of the protocols used, researchers will simply publish the code. Our experience suggests that this practice is tractable and offers many benefits. We invite other researchers to leverage BioCoder to improve the precision and completeness of their protocols, and also to adapt and extend BioCoder to new domains.

  17. Secret Public Key Protocols Revisited

    Science.gov (United States)

    Lim, Hoon Wei; Paterson, Kenneth G.

    Password-based protocols are important and popular means of providing human-to-machine authentication. The concept of secret public keys was proposed more than a decade ago as a means of securing password-based authentication protocols against off-line password guessing attacks, but was later found vulnerable to various attacks. In this paper, we revisit the concept and introduce the notion of identity-based secret public keys. Our new identity-based approach allows secret public keys to be constructed in a very natural way using arbitrary random strings, eliminating the structure found in, for example, RSA or ElGamal keys. We examine identity-based secret public key protocols and give informal security analyses, indicating that they are secure against off-line password guessing and other attacks.

  18. BWR zinc addition Sourcebook

    International Nuclear Information System (INIS)

    Garcia, Susan E.; Giannelli, Joseph F.; Jarvis, Alfred J.

    2014-01-01

    Boiling Water Reactors (BWRs) have been injecting zinc into the primary coolant via the reactor feedwater system for over 25 years for the purpose of controlling primary system radiation fields. The BWR zinc injection process has evolved since the initial application at the Hope Creek Nuclear Station in 1986. Key transitions were from the original natural zinc oxide (NZO) to depleted zinc oxide (DZO), and from active zinc injection of a powdered zinc oxide slurry (pumped systems) to passive injection systems (zinc pellet beds). Zinc addition has continued through various chemistry regimes changes, from normal water chemistry (NWC) to hydrogen water chemistry (HWC) and HWC with noble metals (NobleChem™) for mitigation of intergranular stress corrosion cracking (IGSCC) of reactor internals and primary system piping. While past reports published by the Electric Power Research Institute (EPRI) document specific industry experience related to these topics, the Zinc Sourcebook was prepared to consolidate all of the experience gained over the past 25 years. The Zinc Sourcebook will benefit experienced BWR Chemistry, Operations, Radiation Protection and Engineering personnel as well as new people entering the nuclear power industry. While all North American BWRs implement feedwater zinc injection, a number of other BWRs do not inject zinc. This Sourcebook will also be a valuable resource to plants considering the benefits of zinc addition process implementation, and to gain insights on industry experience related to zinc process control and best practices. This paper presents some of the highlights from the Sourcebook. (author)

  19. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  20. Testing heated flint palaeodose protocols using dose recovery procedures

    International Nuclear Information System (INIS)

    Richter, D.; Temming, H.

    2006-01-01

    Thermoluminescence (TL) dating of materials from archaeological contexts has been shown to be an accurate method when comparisons are made with other chronometric dating methods; however, little has been published on the verification of the measurement protocols used to determine the equivalent dose (palaeodose). Instead of testing TL dating protocols for heated flint using archaeological material with unknown thermal and radiation history, dose recovery tests for three samples of different geological origin are presented. These samples exhibit TL emission in the UV, blue and orange-red wavelengths. In addition to the two multiple aliquot protocols (standard additive-regeneration and normalization) generally used to determine the palaeodose, the single-aliquot-regenerative-dose (SAR) TL and OSL procedure, a 'short' SAR-TL and isothermal luminescence (IT) decay procedures are applied using detection windows limited to these emissions. Accurate dose recovery is obtained for the standard and normalization protocols in the commonly employed detection window (UV-blue), the 'short' SAR in the orange-red window and some IT measurements. While the standard techniques give the most accurate and precise results, detection of the TL and IT orange-red emission in connection with a 'short' SAR protocol also gave accurate and precise results. Such procedures are especially suitable for samples too small for standard multiple aliquot techniques, which require large samples

  1. Reinforcement with fluoroplastic additives

    Energy Technology Data Exchange (ETDEWEB)

    Morgan, R.A.; Stewart, C.W.; Thomas, E.W.; Stahl, W.M.

    1991-05-01

    The use of high molecular weight polytetrafluoroethylene (PTFE) as a reinforcing additive to improve the tear strength of elastomers was studied in silicone rubber by the mid-1950s and in fluoroelastomers by the late-1960s. Although the PTFE is added as a powder, the shear developed during compounding into an elastomer fibrillates the power into a continuous network of nodes and fibers. This network structure effectively reinforces elastomers but it also leads to distortion of finished parts and unacceptably high hardness and modulus of vulcanizates. A new high molecular weight TFE/HFP fluoroplastic micropowder has recently been developed (Teflon MP1500, Du Pont) which forms short fibers, ribbons or platelets when compounded with sufficient shear into elastomers. The controlled structure developed during compounding allows high levels of incorporation of the micropowder into elastomers with uniform dispersion and results in significant improvements in tear strength and abrasion resistance, as well as reduced coefficients of friction.

  2. Sewage sludge additive

    Science.gov (United States)

    Kalvinskas, J. J.; Mueller, W. A.; Ingham, J. D. (Inventor)

    1980-01-01

    The additive is for a raw sewage treatment process of the type where settling tanks are used for the purpose of permitting the suspended matter in the raw sewage to be settled as well as to permit adsorption of the dissolved contaminants in the water of the sewage. The sludge, which settles down to the bottom of the settling tank is extracted, pyrolyzed and activated to form activated carbon and ash which is mixed with the sewage prior to its introduction into the settling tank. The sludge does not provide all of the activated carbon and ash required for adequate treatment of the raw sewage. It is necessary to add carbon to the process and instead of expensive commercial carbon, coal is used to provide the carbon supplement.

  3. Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.

    Science.gov (United States)

    Alanazi, Adwan; Elleithy, Khaled

    2015-09-02

    Many routing protocols have been proposed for wireless sensor networks. These routing protocols are almost always based on energy efficiency. However, recent advances in complementary metal-oxide semiconductor (CMOS) cameras and small microphones have led to the development of Wireless Multimedia Sensor Networks (WMSN) as a class of wireless sensor networks which pose additional challenges. The transmission of imaging and video data needs routing protocols with both energy efficiency and Quality of Service (QoS) characteristics in order to guarantee the efficient use of the sensor nodes and effective access to the collected data. Also, with integration of real time applications in Wireless Senor Networks (WSNs), the use of QoS routing protocols is not only becoming a significant topic, but is also gaining the attention of researchers. In designing an efficient QoS routing protocol, the reliability and guarantee of end-to-end delay are critical events while conserving energy. Thus, considerable research has been focused on designing energy efficient and robust QoS routing protocols. In this paper, we present a state of the art research work based on real-time QoS routing protocols for WMSNs that have already been proposed. This paper categorizes the real-time QoS routing protocols into probabilistic and deterministic protocols. In addition, both categories are classified into soft and hard real time protocols by highlighting the QoS issues including the limitations and features of each protocol. Furthermore, we have compared the performance of mobility-aware query based real-time QoS routing protocols from each category using Network Simulator-2 (NS2). This paper also focuses on the design challenges and future research directions as well as highlights the characteristics of each QoS routing protocol.

  4. Proposed quality control protocol of a dual energy bone densitometer from Spanish protocol for quality control of radiology

    International Nuclear Information System (INIS)

    Saez, F.; Benito, M. A.; Collado, P.; Saez, M.

    2011-01-01

    In this paper we propose additional testing to complete the tests by the Spanish Protocol for Quality Control of Diagnostic Radiology, taking into account the particular characteristics of these units, and including these tests in the estimation of patient dose dose assessment area. There is also the possibility to independently verify the quality control tests that are done automatically.

  5. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  6. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...

  7. Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2004-01-01

    This paper introduces a process calculus with recursion which allows us to express an unbounded number of runs of the ping-pong protocols introduced by Dolev and Yao. We study the decidability issues associated with two common approaches to checking security properties, namely reachability analysis...

  8. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  9. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Despite its importance, the practice of a structured postoperative ... the handoff protocol; limited nurse checklist to six items; added ... anticipatory guidance for the ICU team. Once the ICU team clarified any questions from the anaesthesiologist, the surgeon. (and then the theatre nursing staff) proceeded to report on the.

  10. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  11. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...

  12. Additive Manufactured Superconducting Cavities

    Science.gov (United States)

    Holland, Eric; Rosen, Yaniv; Woolleet, Nathan; Materise, Nicholas; Voisin, Thomas; Wang, Morris; Mireles, Jorge; Carosi, Gianpaolo; Dubois, Jonathan

    Superconducting radio frequency cavities provide an ultra-low dissipative environment, which has enabled fundamental investigations in quantum mechanics, materials properties, and the search for new particles in and beyond the standard model. However, resonator designs are constrained by limitations in conventional machining techniques. For example, current through a seam is a limiting factor in performance for many waveguide cavities. Development of highly reproducible methods for metallic parts through additive manufacturing, referred to colloquially as 3D printing\\x9D, opens the possibility for novel cavity designs which cannot be implemented through conventional methods. We present preliminary investigations of superconducting cavities made through a selective laser melting process, which compacts a granular powder via a high-power laser according to a digitally defined geometry. Initial work suggests that assuming a loss model and numerically optimizing a geometry to minimize dissipation results in modest improvements in device performance. Furthermore, a subset of titanium alloys, particularly, a titanium, aluminum, vanadium alloy (Ti - 6Al - 4V) exhibits properties indicative of a high kinetic inductance material. This work is supported by LDRD 16-SI-004.

  13. Study Protocol: The Norfolk Diabetes Prevention Study [NDPS]: a 46 month multi - centre, randomised, controlled parallel group trial of a lifestyle intervention [with or without additional support from lay lifestyle mentors with Type 2 diabetes] to prevent transition to Type 2 diabetes in high risk groups with non - diabetic hyperglycaemia, or impaired fasting glucose.

    Science.gov (United States)

    Pascale, Melanie; Murray, Nikki; Bachmann, Max; Barton, Garry; Clark, Allan; Howe, Amanda; Greaves, Colin; Sampson, Mike

    2017-01-06

    This 7 year NIHR programme [2011-2018] tests the primary hypothesis that the NDPS diet and physical activity intervention will reduce the risk of transition to type 2 diabetes (T2DM) in groups at high risk of Type 2 diabetes. The NDPS programme recognizes the need to reduce intervention costs through group delivery and the use of lay mentors with T2DM, the realities of normal primary care, and the complexity of the current glycaemic categorisation of T2DM risk. NDPS identifies people at highest risk of T2DM on the databases of 135 general practices in the East of England for further screening with ab fasting plasma glucose and glycosylated haemoglobin [HbA1c]. Those with an elevated fasting plasma glucose [impaired fasting glucose or IFG] with or without an elevated HbA1c [non -diabetic hyperglycaemia; NDH] are randomised into three treatment arms: a control arm receiving no trial intervention, an arm receiving an intensive bespoke group-based diet and physical activity intervention, and an arm receiving the same intervention with enhanced support from people with T2DM trained as diabetes prevention mentors [DPM]. The primary end point is cumulative transition rates to T2DM between the two intervention groups, and between each intervention group and the control group at 46 months. Participants with screen detected T2DM are randomized into an equivalent prospective controlled trial with the same intervention and control arms with glycaemic control [HbA1c] at 46 months as the primary end point. Participants with NDH and a normal fasting plasma glucose are randomised into an equivalent prospective controlled intervention trial with follow up for 40 months. The intervention comprises six education sessions for the first 12 weeks and then up to 15 maintenance sessions until intervention end, all delivered in groups, with additional support from a DPM in one treatment arm. The NDPS programme reports in 2018 and will provide trial outcome data for a group delivered

  14. Numerical analysis of decoy state quantum key distribution protocols

    Energy Technology Data Exchange (ETDEWEB)

    Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

    2008-01-01

    Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

  15. KoralQuery -- A General Corpus Query Protocol

    DEFF Research Database (Denmark)

    Bingel, Joachim; Diewald, Nils

    2015-01-01

    The task-oriented and format-driven development of corpus query systems has led to the creation of numerous corpus query languages (QLs) that vary strongly in expressiveness and syntax. This is a severe impediment for the interoperability of corpus analysis systems, which lack a common protocol....... In this paper, we present KoralQuery, a JSON-LD based general corpus query protocol, aiming to be independent of particular QLs, tasks and corpus formats. In addition to describing the system of types and operations that KoralQuery is built on, we exemplify the representation of corpus queries in the serialized...

  16. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  17. A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View

    Directory of Open Access Journals (Sweden)

    Baraka D. Sija

    2018-01-01

    Full Text Available A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches’ outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers’ OSI (Open Systems Interconnection model.

  18. Dynamic Channel Slot Allocation Scheme and Performance Analysis of Cyclic Quorum Multichannel MAC Protocol

    Directory of Open Access Journals (Sweden)

    Xing Hu

    2017-01-01

    Full Text Available In high diversity node situation, multichannel MAC protocol can improve the frequency efficiency, owing to fewer collisions compared with single-channel MAC protocol. And the performance of cyclic quorum-based multichannel (CQM MAC protocol is outstanding. Based on cyclic quorum system and channel slot allocation, it can avoid the bottleneck that others suffered from and can be easily realized with only one transceiver. To obtain the accurate performance of CQM MAC protocol, a Markov chain model, which combines the channel-hopping strategy of CQM protocol and IEEE 802.11 distributed coordination function (DCF, is proposed. The results of numerical analysis show that the optimal performance of CQM protocol can be obtained in saturation bound situation. And then we obtain the saturation bound of CQM system by bird swarm algorithm. In addition, to improve the performance of CQM protocol in unsaturation situation, a dynamic channel slot allocation of CQM (DCQM protocol is proposed, based on wavelet neural network. Finally, the performance of CQM protocol and DCQM protocol is simulated by Qualnet platform. And the simulation results show that the analytic and simulation results match very well; the DCQM performs better in unsaturation situation.

  19. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  20. Automated addition of Chelex solution to tubes containing trace items

    DEFF Research Database (Denmark)

    Stangegaard, Michael; Hansen, Thomas Møller; Hansen, Anders Johannes

    2011-01-01

    Extraction of DNA from trace items for forensic genetic DNA typing using a manual Chelex based extraction protocol requires addition of Chelex solution to sample tubes containing trace items. Automated of addition of Chelex solution may be hampered by high viscosity of the solution and fast...... sedimentation rate of the Chelex beads. Here, we present a simple method that can be used on an Eppendorf epMotion liquid handler resolving these issues...

  1. Research Protocol: Collections Related to Synthetic Turf ...

    Science.gov (United States)

    The “Federal Research Action Plan on Recycled Tire Crumb Used on Playing Fields and Playgrounds” (referred to subsequently as the Federal Research Action Plan or FRAP) was finalized in February 2016. The U.S. EPA and CDC/ATSDR, in collaboration with CPSC, have prepared this research protocol to implement portions of the research activities outlined under the FRAP. Specifically, this research protocol is designed to implement three of the research elements described in the Federal Research Action Plan: Conduct a literature review and data gaps analysis; Perform tire crumb rubber characterization research; Perform human exposure characterization research. Concerns have been raised by the public about the safety of recycled tire crumb rubber used in synthetic turf fields and playgrounds in the United States. Several studies have been identified that examine exposure to tire crumb rubber infill in these settings. While, in general, these studies have not provided evidence for these health concerns, the existing studies do not comprehensively evaluate all aspects of exposure associated with these use scenarios. Additional research is needed to help fill important data gaps that will lead to improved exposure assessment and risk evaluation for children and adults using synthetic turf fields and playgrounds with tire crumb rubber. In response, the U.S. Environmental Protection Agency (EPA), the Centers for Disease Control and Prevention/Agency for Toxic Su

  2. Fibred Coalgebraic Logic and Quantum Protocols

    Directory of Open Access Journals (Sweden)

    Daniel Marsden

    2014-12-01

    Full Text Available Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

  3. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  4. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret......, MPC can be based on arbitrary finite rings. This is in sharp contrast to the literature where essentially all MPC protocols require a much stronger mathematical structure, namely a field. Apart from its theoretical value, this can lead to efficiency improvements since it allows a greater freedom...... of all known schemes follows as corollaries whose proofs are pure linear algebra arguments, in contrast to some hybrid arguments used in the literature. (4) We construct a new unconditionally secure VSS scheme with minimized reconstruction complexity in the setting of a dishonest minority. This improves...

  5. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    ), primary objective, primary endpoint, and--for confirmatory trials only--hypothesis and sample size calculation. We used logistic regression, χ(2), and Fisher's exact test. RESULTS: A total of 282 applications of academic clinical drug trials were submitted to the Danish Health and Medicines Authority......BACKGROUND: Unacknowledged inconsistencies in the reporting of clinical trials undermine the validity of the results of the trials. Little is known about inconsistency in the reporting of academic clinical drug trials. Therefore, we investigated the prevalence of consistency between protocols...... and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...

  6. Heavy vehicle driver workload assessment. Task 1, task analysis data and protocols review

    Science.gov (United States)

    This report contains a review of available task analytic data and protocols pertinent to heavy vehicle operation and determination of the availability and relevance of such data to heavy vehicle driver workload assessment. Additionally, a preliminary...

  7. Enterprise Considerations for Ports and Protocols

    Science.gov (United States)

    2016-10-21

    Internet and similar networks . The Internet model is commonly known as TCP/IP, because of its most important protocols, the Transmission Control...according to the scope of the networking involved. IETF documents RFC 1122 [25] and RFC 1123 [26] describe the Internet Protocol suite and model ...An alternative model , the Open Systems Interconnection ( OSI ) model [27], is often used to describe protocols. The OSI model defines protocols in

  8. Data Integrity Protocol for Sensor Networks

    OpenAIRE

    Durresi, Arjan; Paruchuri, Vamsi; Kannan, Rajgopal; Iyengar, S. S.

    2005-01-01

    In this paper, we present a novel lightweight protocol for data integrity in wireless sensor networks. Our protocol is based on a leapfrog strategy in which each cluster head verifies if its previous node has preserved the integrity of the packet using the secret key it shares with two hop uptree nodes. The proposed protocol is simple. The analysis and simulation results show that the protocol needs very few header bits, as low as three bits, thus resulting in negligible bandwidth overhead; t...

  9. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...... trying to circumvent the intended steps. The results of our analysis confirm the effectiveness of the cryptofraglets framework for the model and analysis of security properties and eventually show its potential to identify and uncover protocol flaws....

  10. Approaches to Formal Verification of Security Protocols

    OpenAIRE

    Lal, Suvansh; Jain, Mohit; Chaplot, Vikrant

    2011-01-01

    In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliability thereby, increasing the usability of systems that employ them. Thus, formal verification of security protocols has become a key issue in computer and communications security. In...

  11. Quantum bit commitment protocol without quantum memory

    OpenAIRE

    Ramos, Rubens Viana; Mendonca, Fabio Alencar

    2008-01-01

    Quantum protocols for bit commitment have been proposed and it is largely accepted that unconditionally secure quantum bit commitment is not possible; however, it can be more secure than classical bit commitment. In despite of its usefulness, quantum bit commitment protocols have not been experimentally implemented. The main reason is the fact that all proposed quantum bit commitment protocols require quantum memory. In this work, we show a quantum bit commitment protocol that does not requir...

  12. New dimensions in SNMP Protocol in Romania

    Directory of Open Access Journals (Sweden)

    Alice Nastovici

    2009-06-01

    Full Text Available In this year 2009, after e-finance shock made in each banks who worked with Simple NetworkManagement Protocol (SNMP default community string and vulnerability:- If you do not absolutely require SNMP, disable it- If you must use SNMP, use the same policy for community names as used for passwords.Make sure that they are difficult to guess or crack and that they are chanced periodically- Validate and check community names using SNMPwalk. Additional information can be foundat http://www.2nd.com/functionSNMPwalk.php- Filter SNMP (port 161/udp at the border-router or firewall unless it is absolutely necessary topool or manage devices from outside of the local network, where possible read-only

  13. A simulation of the FASTBUS protocols

    CERN Document Server

    Booth, A W

    1981-01-01

    FASTBUS is a standard bus system being developed for high speed data acquisition and processing in the next generation of large scale physics experiments. Prototypes are being built according to a draft specification. The FASTBUS protocols have been simulated using a powerful software tool which is a computer description language. This Instruction Set Processor Specification language, ISPS, has been used in the design and development of several microprocessor systems. Its applications are diverse, including automated design and the generation of machine relative software, as well as simulation. The results of the FASTBUS simulation are presented, with an overview of the ISPS hardware description language. An additional facility is discussed, which supplements the simulation by providing a visual presentation of the FASTBUS signals, that is, a timing-graph generator.

  14. A simulation of the FASTBUS protocols

    International Nuclear Information System (INIS)

    Booth, A.W.

    1981-01-01

    FASTBUS is a standard bus system being developed for high speed data acquisition and processing in the next generation of large scale physics experiments. Prototypes are being built according to a draft specification. The FASTBUS protocols have been simulated using a powerful software tool which is a computer description language. This Instruction Set Processor Specification language, ISPS, has been used in the design and development of several microprocessor systems. It's applications are diverse, including automated design and the generation of machine relative software, as well as simulation. The results of the FASTBUS simulation are presented, with an overview of the ISPS hardware description language. An additional facility is discussed, which supplements the simulation by providing a visual presentation of the FASTBUS signals, that is, a timing-graph generator. (orig.)

  15. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  16. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  17. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...... how the Petri-net semantics can be used to prove security properties....

  18. Heuristic Methods for Security Protocols

    Directory of Open Access Journals (Sweden)

    Qurat ul Ain Nizamani

    2009-10-01

    Full Text Available Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  19. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  20. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  1. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  2. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol is formali...

  3. PCR protocols: current methods and applications

    National Research Council Canada - National Science Library

    White, Bruce Alan

    1993-01-01

    ..." between "small" and "big" labs, since its use makes certain projects, especially those related to molecular cloning, now far more feasible for the small lab with a modest budget. This new volume on PCR Protocols does not attempt the impossible task of representing all PCR-based protocols. Rather, it presents a range of protocols, both analytical ...

  4. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    internet. 2. New Features in IPv6. Harsha Srinath. IPv4, the workhorse protocol of the currently popular TePI. IP protocol suite, is fast becoming obsolete. The exponen- ... designers of this Internet Protocol (lPv4) never envisioned the scale of the ..... using multiple access providers across the same interface to have separate ...

  5. Timed Model Checking of Security Protocols

    NARCIS (Netherlands)

    Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.; Mader, Angelika H.

    We propose a method for engineering security protocols that are aware of timing aspects. We study a simplified version of the well-known Needham Schroeder protocol and the complete Yahalom protocol. Timing information allows the study of different attack scenarios. We illustrate the attacks by model

  6. 21 CFR 1301.18 - Research protocols.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Research protocols. 1301.18 Section 1301.18 Food..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Registration § 1301.18 Research protocols. (a) A protocol... have such submission approved by, the Food and Drug Administration as required in 21 U.S.C. 355(i) and...

  7. Crypto-Verifying Protocol Implementations in ML

    NARCIS (Netherlands)

    Bhargavan, K.; Corin, R.J.; Fournet, C.

    2007-01-01

    We intend to narrow the gap between concrete implementations and verified models of cryptographic protocols. We consider protocols implemented in F#, a variant of ML, and verified using CryptoVerif, Blanchet's protocol verifier for computational cryptography. We experiment with compilers from F#

  8. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  9. In America’s Best Interests: 1977 Additional Protocol I to the Geneva Conventions, Redux

    Science.gov (United States)

    2005-05-01

    22202-4302. fW;pondenIs should be _..thai notiMll1slandlng any other provision of law. no person shag be subject 10 any penalty lor 1..ling to comply...Filipino guerillas fighting the Imperial Japanese forces, and Afghan Mujahedin repelling Soviet invaders. But could al-Qa ’eda operatives similarly avail...that all lands once part of the Islamic Empire at its height in the 16thcentury are therefore today occupied territories. Anonymous, Imperial Hubris

  10. Guidance for States Implementing Comprehensive Safeguards Agreements and Additional Protocols (Arabic Edition)

    International Nuclear Information System (INIS)

    2017-01-01

    This publication is aimed at enhancing States’ understanding of the safeguards obligations of both the State and the IAEA, and at improving the cooperation between States and the IAEA in safeguards implementation. It is principally intended for State or regional safeguards regulatory authorities and facility operators, and is a reference document that will be supported by detailed guidance and examples in ‘Safeguards Implementation Practices’ (SIPs) to be published separately.

  11. A simple protocol for the michael addition of indoles with electron ...

    Indian Academy of Sciences (India)

    Administrator

    In order to extend the scope of this methodology, various 1,2-disubstituted vinyl ketones (chalcones) were used as Michael acceptor and the results are tabulated (table 1). In this case, however, reaction proceeds to completion at slightly elevated tempe- ature (70°C). Chalcones having electron donating groups in the styryl ...

  12. 75 FR 4323 - Additional Quantitative Fit-testing Protocols for the Respiratory Protection Standard

    Science.gov (United States)

    2010-01-27

    ...: Contact Ms. Jennifer Ashley, Office of Communications, Room N-3647, OSHA, U.S. Department of Labor, 200... test report prepared by an independent government research laboratory (e.g., Lawrence Livermore...

  13. Commercial Satellite Data as a Support to the Additional Protocol Declarations

    International Nuclear Information System (INIS)

    Isaksson, Stig; Dahlin, Goeran; Joensson, Camilla

    2003-05-01

    The overall objective of the project is to show how commercial satellite data can be used for safeguard purposes both at the Swedish Nuclear Power Inspectorate, SKI and IAEA. Furthermore the experiences from this project can support IAEA in its process to develop methods and routines to make the best use of the Member State provided information in combination with satellite images. Finally it will give IAEA a relevant case study of the usefulness of satellite data for change detection purposes. This project shall provide SKI with digitised maps and commercial satellite data to verify the descriptions provided by two Swedish nuclear operators. Furthermore those digital data may be included in the declaration given to IAEA. The long-term aim is to enhance the quality of the Swedish declaration as well as to give the IAEA support as regards methods to use commercial satellite data. The project has provided SKI with digitised vector maps and optical satellite data over two selected nuclear sites. Furthermore these data will help to verify the descriptions that those two Swedish nuclear operators will give to SKI. The selected sites in this project are: Simpevarp with the three Oskarshamn nuclear power reactors, CLAB (the Central Interim Storage Facility for Spent Nuclear Fuel) and Aespoe laboratory. The area has been chosen since it contains nuclear power reactors, as well as storage facilities for used nuclear fuels and an underground research laboratory. For the Simpevarp site historical data has also been included to illustrate changes that have occurred since the first reactor O1 came in to use; and Studsvik with the materials testing reactor 'R2', a number of other types of nuclear technical activities and other non-nuclear related activities. The site has been chosen for its complexity

  14. 15 CFR 781.2 - Purposes of the Additional Protocol and APR.

    Science.gov (United States)

    2010-01-01

    ... suitable for fuel fabrication or for being isotopically enriched); imports and exports of specified nuclear equipment and non-nuclear material; nuclear fuel cycle-related research and development activities not...; nuclear-related equipment manufacturing, assembly, or construction; imports, exports, and other activities...

  15. Guidance for States Implementing Comprehensive Safeguards Agreements and Additional Protocols (Spanish Edition)

    International Nuclear Information System (INIS)

    2015-01-01

    This publication is aimed at enhancing States’ understanding of the safeguards obligations of both the State and the IAEA, and at improving the cooperation between States and the IAEA in safeguards implementation. It is principally intended for State or regional safeguards regulatory authorities and facility operators, and is a reference document that will be supported by detailed guidance and examples in ‘Safeguards Implementation Practices’ (SIPs) to be published separately

  16. Entry into Force of the Additional Protocol to the safeguards agreements

    International Nuclear Information System (INIS)

    Prieto, N.; Recio, M.

    2004-01-01

    The development of the peaceful use of nuclear energy has always been linked to verification of the truthfulness of such peaceful application. such checks must necessarily be undertaken by people or organisations possessing technical competence and a status of independence recognised by the international community. this is the case of the safeguards inspectors of the International Atomic Energy Agency (IAEA). The history of safeguards dates back to the speech Atoms for Peace, given by the US President Eisenhower before the General Assembly of the United Nations on 8th December 1953. In his speech, Eisenhower underlined the serious threat of the incipient atomic weapons race and the advisability of achieving a collective commitment to the peaceful use of atomic energy. the speech anticipated the setting up of an international agency that would cooperate in the technological development of nuclear energy and at the same time safeguard a material that should not be used for the clandestine manufacturing of weapons. This agency, the IAEA, was created three years later within the framework of the United Nations and is today the leading actor in the application of safeguards measures in relation to nuclear materials and facilities

  17. Protocol independent transmission method in software defined optical network

    Science.gov (United States)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  18. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.’s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.’s protocol and existing similar protocols. PMID:27163786

  19. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Science.gov (United States)

    Reddy, Alavalapati Goutham; Das, Ashok Kumar; Odelu, Vanga; Yoo, Kee-Young

    2016-01-01

    Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  20. An Enhanced Biometric Based Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Elliptic Curve Cryptography.

    Directory of Open Access Journals (Sweden)

    Alavalapati Goutham Reddy

    Full Text Available Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

  1. Reactive broadcasting protocol for video on demand

    Science.gov (United States)

    Paris, Jehan-Francois; Carter, Steven W.; Long, Darrell D. E.

    1999-12-01

    We propose a reactive broadcasting protocol that addresses the problem of distributing moderately popular videos in a more efficient fashion. Like all efficient broadcasting protocols, reactive broadcasting assumes that the customer set-top box has enough local storage to store at least one half of each video being watched. Unlike other broadcasting protocols, reactive broadcasting only broadcasts the later portions of each video. the initial segment of each video is distributed on demand using a stream tapping protocol. Our simulations show that reactive broadcasting outperforms both conventional broadcasting protocols and pure stream tapping for a wide range of video request rates.

  2. Use of limited MR protocol (coronal STIR) in the evaluation of patients with hip pain

    International Nuclear Information System (INIS)

    Khoury, N.J.; Birjawi, G.A.; Hourani, M.H.; Chaaya, M.

    2003-01-01

    To assess the role of a limited MR protocol (coronal STIR) as the initial part of the MR examination in patients with hip pain. Eighty-five patients presenting with hip pain, and normal radiographs of the pelvis, and who underwent our full MR protocol for hips were included retrospectively in the study. The full protocol consists of coronal T1-weighted and short tau inversion-recovery (STIR), and axial T2-weighted sequences. Ninety-three MR examinations were performed. Two radiologists interpreted the STIR (limited) examinations and the full studies separately, masked to each other's findings and to the final diagnosis. Comparison between the two protocols was then undertaken. For both readers, all normal MR examinations on the coronal STIR limited protocol were normal on the full protocol, with an interobserver reliability of 0.96. The STIR protocol was able to detect the presence or absence of an abnormality in 100% of cases (sensitivity). The STIR-only protocol provided a specific diagnosis in only 65% of cases (specificity). A normal coronal STIR study of the hips in patients with hip pain and normal radiographs precludes the need for further pelvic MR sequences. Any abnormality detected on this limited protocol should be further assessed by additional MR sequences. (orig.)

  3. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... to a transition semantics which can easily be implemented. (An existing SPL implementation bridges the gap that often exists between abstract protocol models on which verification of security properties is carried out and the implemented protocol.) SPL-nets are a particular kind of contextual Petri...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  4. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  5. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...... of formal protocol verification. Verification, however, is usually carried out on an abstract model not at all related with a protocol’s implementation. Experience shows that security breaches introduced in implementations of successfully verified models are rather common. The χ-Spaces framework...... is an implementation of SPL (Security Protocol Language), a formal model for studying security protocols. In this paper we discuss the use of χ-Spaces as a tool for developing robust security protocol implementations. To make the case, we take a family of key-translation protocols due to Woo and Lam and show how χ...

  6. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...... called SPS (Security Protocol Specification) language, that enables users, without requiring deep expertise in formal models from them, to specify a wide range of real-world protocols in a simple and intuitive way. Thus, SPS allows users to verify their protocols using different tools, and generate...

  7. Efficient Cooperative Protocols for Full-Duplex Relaying over Nakagami-m Fading Channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2015-02-24

    In this work, efficient protocols are studied for full-duplex relaying (FDR) with loopback interference over Nakagami-m block fading channels. Recently, a selective decodeand- forward (DF) protocol was proposed for FDR, and was shown to outperform existing protocols in terms of outage over Rayleigh-fading channels. In this work, we propose an incremental selective DF protocol that offers additional power savings, yet yields the same outage performance. We evaluate their outage performance over independent non-identically distributed Nakagami-m fading links, and study their relative performance in terms of the signal-to-noise ratio cumulative distribution function via closed-form expressions. The offered diversity gain is also derived. In addition, we study their performance relative to their half-duplex counterparts, as well as known non-selective FDR protocols. We corroborate our theoretical results with simulation, and confirm that selective cooperation protocols outperform the known non-selective protocols in terms of outage. Finally, we show that depending on the loopback interference level, the proposed protocols can outperform their half-duplex counterparts when high spectral efficiencies are targeted.

  8. PEMBIAYAAN RESTRUKTURISASI INDUSTRI BUS PERKOTAAN SESUAI DENGAN KERANGKA KERJA PROTOKOL KYOTO (Funding for Industrial Restructuring Urban Bus Industry following Kyoto Protocol

    Directory of Open Access Journals (Sweden)

    Danang Parikesit

    2002-07-01

    Full Text Available ABSTRAK Sektor transportasi, khususnya sektor angkutan umum telah lama disadari sebagai kontributor utama emisi gas rumah kaca (Green House Gases Emissions. Investasi pada angkutan umum perkotaan sangat dibutuhkan walaupun pembiayaan yang konvensional sering sulit dilakukan karena tingginya tingkat investasi dan prioritas pemerintah saat ini. Angkutan perkotaan juga dilihat sebagai daerah kekuasaan sektor swasta yang membuat pemerintah sulit untuk mengeluarkan uang publik. Ratifikasi Kyoto Protocol telah memberi jalan untuk mengembangkan alternatif pembiayaan untuk pembangunan yang berkelanjutan. Clean Development Mechanism pada Kyoto Protocol telah membuka kesempatan bagi otoritas angkutan umum perkotaan dengan menggunakan prinsip carbon trading. Sumber daya untuk menerapkan proyek angkutan umum perkotaan dengan CDM sangat esensial. Pekerjaan di masa datang harus diarahkan untuk mempelajari metodologi dalam mengkombinasi soft measures dan melaksanakan proyek secara optimal. Pembiayaan dengan sistem CDM ini telah dimulai di Yogyakarta dengan judul The Green House Gases Emission Reduction Program for Urban Buses in Yogyakarta atau Program Penurunan Emisi Gas Rumah Kaca untuk Bus Perkotaan di Yogyakarta. Sebuah aliansi dengan nama YUPTA (Yogyakarta Urban Public Transport Alliance telah dibentuk yang terdiri dari 3 lembaga yaitu Dinas Perhubungan Propinsi DIY, Pusat Studi Transportasi dan Logistik (PUSTRAL UGM dan Koperasi Pengusaha Angkutan Kota Yogyakarta (KOPATA.   ABSTRACT Transportation sector, especially public transportation, has been known as the main contributor to the green house hases emission. Investment to urban public transportation is needed but conventional funding is often difficult to be obtained because of the high investment level and the present government priority. Urban transportation is also seen as a private sector domain making the government difficult to use public fund. Kyoto protocol ratification has opened the way to

  9. Protocols development for security and privacy of radio frequency identification systems

    Science.gov (United States)

    Sabbagha, Fatin

    There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.

  10. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  11. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  12. INEEL AIR MODELING PROTOCOL ext

    Energy Technology Data Exchange (ETDEWEB)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  13. A Lightweight Continuous Authentication Protocol for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Yo-Hsuan Chuang

    2018-04-01

    Full Text Available Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs. Within this kind of Internet of Things (IoT environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  14. A Lightweight Continuous Authentication Protocol for the Internet of Things.

    Science.gov (United States)

    Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-04-05

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  15. Efficient MAC Protocol for Subcarrier-Wise Rate Adaptation over WLAN

    Directory of Open Access Journals (Sweden)

    Sung Won Kim

    2010-01-01

    Full Text Available While bit-loading algorithms over wireless systems have been extensively studied, the development of a protocol which implements bit-loading-based rate adaptation over wireless systems has not been highlighted. The design of such a protocol is not a trivial problem, due to the overhead associated with the feedback information. In this paper, a novel protocol is proposed to provide an efficient way to implement subcarrier-wise rate adaptation in OFDM-based wireless systems. When receiving a Ready-To-Send (RTS packet, the receiver determines the number of bits to be allocated on each subcarrier through channel estimation. This decision is delivered to the sender using an additional OFDM symbol in the Clear-To-Send (CTS packet. That is, bit-allocation over subcarriers is achieved using only one additional OFDM symbol. The protocol enhances the channel efficiency in spite of the overhead of one additional OFDM symbol.

  16. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  17. Estimation of radiation exposure for brain perfusion CT: standard protocol compared with deviations in protocol.

    Science.gov (United States)

    Hoang, Jenny K; Wang, Chu; Frush, Donald P; Enterline, David S; Samei, Ehsan; Toncheva, Greta; Lowry, Carolyn; Yoshizumi, Terry T

    2013-11-01

    The purpose of this study was to measure the organ doses and estimate the effective dose for the standard brain perfusion CT protocol and erroneous protocols. An anthropomorphic phantom with metal oxide semiconductor field effect transistor (MOSFET) detectors was scanned on a 64-MDCT scanner. Protocol 1 used a standard brain perfusion protocol with 80 kVp and fixed tube current of 200 mA. Protocol 2 used 120 kVp and fixed tube current of 200 mA. Protocol 3 used 120 kVp with automatic tube current modulation (noise index, 2.4; minimum, 100 mA; maximum, 520 mA). Compared with protocol 1, the effective dose was 2.8 times higher with protocol 2 and 7.8 times higher with protocol 3. For all protocols, the peak dose was highest in the skin, followed by the brain and calvarial marrow. Compared with protocol 1, the peak skin dose was 2.6 times higher with protocol 2 and 6.7 times higher with protocol 3. The peak skin dose for protocol 3 exceeded 3 Gy. The ocular lens received significant scatter radiation: 177 mGy for protocol 2 and 435 mGy for protocol 3, which were 4.6 and 11.3 times the dose for protocol 1, respectively. Compared with the standard protocol, erroneous protocols of increasing the tube potential from 80 kVp to 120 kVp will lead to a three- to fivefold increase in organ doses, and concurrent use of high peak kilovoltage with incorrectly programmed tube current modulation can increase dose to organs by 7- to 11-fold. Tube current modulation with a low noise index can lead to doses to the skin and ocular lens that are close to thresholds for tissue reactions.

  18. Empirical evaluation of bone extraction protocols.

    Directory of Open Access Journals (Sweden)

    Timothy P Cleland

    Full Text Available The application of high-resolution analytical techniques to characterize ancient bone proteins requires clean, efficient extraction to obtain high quality data. Here, we evaluated many different protocols from the literature on ostrich cortical bone and moa cortical bone to evaluate their yield and relative purity using the identification of antibody-antigen complexes on enzyme-linked immunosorbent assay and gel electrophoresis. Moa bone provided an ancient comparison for the effectiveness of bone extraction protocols tested on ostrich bone. For the immunological part of this study, we focused on collagen I, osteocalcin, and hemoglobin because collagen and osteocalcin are the most abundant proteins in the mineralized extracellular matrix and hemoglobin is common in the vasculature. Most of these procedures demineralize the bone first, and then the remaining organics are chemically extracted. We found that the use of hydrochloric acid, rather than ethylenediaminetetraacetic acid, for demineralization resulted in the cleanest extractions because the acid was easily removed. In contrast, the use of ethylenediaminetetraacetic acid resulted in smearing upon electrophoretic separation, possibly indicating these samples were not as pure. The denaturing agents sodium dodecyl sulfate, urea, and guanidine HCl have been used extensively for the solubilization of proteins in non-biomineralized tissue, but only the latter has been used on bone. We show that all three denaturing agents are effective for extracting bone proteins. One additional method tested uses ammonium bicarbonate as a solubilizing buffer that is more appropriate for post-extraction analyses (e.g., proteomics by removing the need for desalting. We found that both guanidine HCl and ammonium bicarbonate were effective for extracting many bone proteins, resulting in similar electrophoretic patterns. With the increasing use of proteomics, a new generation of scientists are now interested in the

  19. effects of sulphur addition on addition on and mechanical properties

    African Journals Online (AJOL)

    User

    234-8034714355. 8034714355. 1. EFFECTS OF SULPHUR ADDITION ON. ADDITION ON. 2. AND MECHANICAL PROPERTIES O. 3. 4. C. W. Onyia. 5. 1DEPT. OF METALLURGICAL AND MATERIALS. 6. 2, 4DEPT. OF METALLURGICAL ...

  20. Variability of United States Online Rehabilitation Protocols for Proximal Hamstring Tendon Repair

    Science.gov (United States)

    Lightsey, Harry M.; Kantrowitz, David E.; Swindell, Hasani W.; Trofa, David P.; Ahmad, Christopher S.; Lynch, T. Sean

    2018-01-01

    Background: The optimal postoperative rehabilitation protocol following repair of complete proximal hamstring tendon ruptures is the subject of ongoing investigation, with a need for more standardized regimens and evidence-based modalities. Purpose: To assess the variability across proximal hamstring tendon repair rehabilitation protocols published online by United States (US) orthopaedic teaching programs. Study Design: Cross-sectional study. Methods: Online proximal hamstring physical therapy protocols from US academic orthopaedic programs were reviewed. A web-based search using the search term complete proximal hamstring repair rehabilitation protocol provided an additional 14 protocols. A comprehensive scoring rubric was developed after review of all protocols and was used to assess each protocol for both the presence of various rehabilitation components and the point at which those components were introduced. Results: Of 50 rehabilitation protocols identified, 35 satisfied inclusion criteria and were analyzed. Twenty-five protocols (71%) recommended immediate postoperative bracing: 12 (34%) prescribed knee bracing, 8 (23%) prescribed hip bracing, and 5 (14%) did not specify the type of brace recommended. Fourteen protocols (40%) advised immediate nonweightbearing with crutches, while 16 protocols (46%) permitted immediate toe-touch weightbearing. Advancement to full weightbearing was allowed at a mean of 7.1 weeks (range, 4-12 weeks). Most protocols (80%) recommended gentle knee and hip passive range of motion and active range of motion, starting at a mean 1.4 weeks (range, 0-3 weeks) and 4.0 weeks (range, 0-6 weeks), respectively. However, only 6 protocols (17%) provided specific time points to initiate full hip and knee range of motion: a mean 8.0 weeks (range, 4-12 weeks) and 7.8 weeks (range, 0-12 weeks), respectively. Considerable variability was noted in the inclusion and timing of strengthening, stretching, proprioception, and cardiovascular exercises

  1. Energy-efficient cooperative protocols for full-duplex relay channels

    KAUST Repository

    Khafagy, Mohammad Galal

    2013-12-01

    In this work, energy-efficient cooperative protocols are studied for full-duplex relaying (FDR) with loopback interference. In these protocols, relay assistance is only sought under certain conditions on the different link outages to ensure effective cooperation. Recently, an energy-efficient selective decode-And-forward protocol was proposed for FDR, and was shown to outperform existing schemes in terms of outage. Here, we propose an incremental selective decode-And-forward protocol that offers additional power savings, while keeping the same outage performance. We compare the performance of the two protocols in terms of the end-to-end signal-to-noise ratio cumulative distribution function via closed-form expressions. Finally, we corroborate our theoretical results with simulation, and show the relative relay power savings in comparison to non-selective cooperation in which the relay cooperates regardless of channel conditions. © 2013 IEEE.

  2. Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems

    Energy Technology Data Exchange (ETDEWEB)

    Conover, David R. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Crawford, Aladsair J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Fuller, Jason C. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Gourisetti, Sri Nikhil Gup [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Viswanathan, Vilayanur V. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Ferreira, Summer [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Schoenwald, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Rosewater, David [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-04-01

    The Protocol for Uniformly Measuring and Expressing the Performance of Energy Storage Systems (PNNL-22010) was first issued in November 2012 as a first step toward providing a foundational basis for developing an initial standard for the uniform measurement and expression of energy storage system (ESS) performance. Based on experiences with the application and use of that document, and to include additional ESS applications and associated duty cycles, test procedures and performance metrics, a first revision of the November 2012 Protocol was issued in June 2014 (PNNL 22010 Rev. 1). As an update of the 2014 revision 1 to the Protocol, this document (the March 2016 revision 2 to the Protocol) is intended to supersede the June 2014 revision 1 to the Protocol and provide a more user-friendly yet more robust and comprehensive basis for measuring and expressing ESS performance.

  3. Dual Polling Protocol for Improving Performance in Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Sunmyeng Kim

    2018-01-01

    Full Text Available An ad hoc network is based on a distributed coordination function (DCF to transmit data packets through channel contentions. In DCF, when the number of stations increases, performance degrades considerably because of extremely high collision probability. To improve performance, a distributed point coordination function (DPCF protocol was proposed. In this protocol, stations operate as in DCF to obtain channel access rights. When a station obtains access rights, it polls all neighboring stations by using point coordination function (PCF. The polled stations then transmit their data packets without channel contentions. However, this protocol aggravates the issue of hidden terminals and causes channel wastage. To solve these problems, we propose a protocol in which a station polls stations in limited areas as opposed to every station in its transmission range. In addition, it polls only stations with data packets. The proposed protocol lowers the probability of collision and improves network performance

  4. effects of sulphur addition on addition on and mechanical properties

    African Journals Online (AJOL)

    User

    The effects of sulphur addition addition addition on the microstruc on the microstruc. 14. Al-12wt%Si alloy have alloy have alloy have been investigated in thi been investigated in this been investigated in thi been investigated .... ce sand castings for micro-structural structural structural carried out carried out to determine the.

  5. An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

    Directory of Open Access Journals (Sweden)

    S.K. Hafizul Islam

    2017-07-01

    Full Text Available In the literature, many three-party authenticated key exchange (3PAKE protocols are put forwarded to established a secure session key between two users with the help of trusted server. The computed session key will ensure secure message exchange between the users over any insecure communication networks. In this paper, we identified some deficiencies in Tan’s 3PAKE protocol and then devised an improved 3PAKE protocol without symmetric key en/decryption technique for mobile-commerce environments. The proposed protocol is based on the elliptic curve cryptography and one-way cryptographic hash function. In order to prove security validation of the proposed 3PAKE protocol we have used widely accepted AVISPA software whose results confirm that the proposed protocol is secure against active and passive attacks including replay and man-in-the-middle attacks. The proposed protocol is not only secure in the AVISPA software, but it also secure against relevant numerous security attacks such as man-in-the-middle attack, impersonation attack, parallel attack, key-compromise impersonation attack, etc. In addition, our protocol is designed with lower computation cost than other relevant protocols. Therefore, the proposed protocol is more efficient and suitable for practical use than other protocols in mobile-commerce environments.

  6. DAQ architecture and read-out protocole

    CERN Document Server

    Harris, F; Jost, B; Mato, P; Mato, Pere

    1998-01-01

    The proposed LHCb readout architecture is overviewed, followed by discussion and comparison of two candidate readout protocols, namely the 'Full Readout' and'Phased Readout' protocols.The philosophy of the Full Readout protocol is to send all of the event data to a processor before commencing the high level trigger algorithms.This results in simplicity in the protocol at the cost of the bandwidth requirement for the readout network. This is our preferred approach if the network costs are not prohibitive. Using the Phased Readout protocol the event data is sent in portions according to the demands of the trigger algorithms. This results in a more complex protocol, but in a reduction on the readout network bandwidth requirement.The effect of transmission errors on the behaviour of the system, and the implementation of system partitioning, are also discussed.1

  7. Merging Multiparty Protocols in Multiparty Choreographies

    Directory of Open Access Journals (Sweden)

    Fabrizio Montesi

    2013-02-01

    Full Text Available Choreography-based programming is a powerful paradigm for defining communication-based systems from a global viewpoint. A choreography can be checked against multiparty protocol specifications, given as behavioural types, that may be instantiated indefinitely at runtime. Each protocol instance is started with a synchronisation among the involved peers. We analyse a simple transformation from a choreography with a possibly unbounded number of protocol instantiations to a choreography instantiating a single protocol, which is the merge of the original ones. This gives an effective methodology for obtaining new protocols by composing existing ones. Moreover, by removing all synchronisations required for starting protocol instances, our transformation reduces the number of communications and resources needed to execute a choreography.

  8. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  9. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  10. Variation in radiographic protocols in paediatric interventional cardiology

    International Nuclear Information System (INIS)

    McFadden, S L; Hughes, C M; Winder, R J

    2013-01-01

    The aim of this work is to determine current radiographic protocols in paediatric interventional cardiology (IC) in the UK and Ireland. To do this we investigated which imaging parameters/protocols are commonly used in IC in different hospitals, to identify if a standard technique is used and illustrate any variation in practice. A questionnaire was sent to all hospitals in the UK and Ireland which perform paediatric IC to obtain information on techniques used in each clinical department and on the range of clinical examinations performed. Ethical and research governance approval was sought from the Office for Research Ethics Committees Northern Ireland and the individual trusts. A response rate of 79% was achieved, and a wide variation in technique was found between hospitals. The main differences in technique involved variations in the use of an anti-scatter grid and the use of additional filtration to the radiation beam, frame rates for digital acquisition and pre-programmed projections/paediatric specific programming in the equipment. We conclude that there is no standard protocol for carrying out paediatric IC in the UK or Ireland. Each hospital carries out the IC procedure according to its own local protocols resulting in a wide variation in radiation dose. (paper)

  11. Autonomous Power Control MAC Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Battery energy limitation has become a performance bottleneck for mobile ad hoc networks. IEEE 802.11 has been adopted as the current standard MAC protocol for ad hoc networks. However, it was developed without considering energy efficiency. To solve this problem, many modifications on IEEE 802.11 to incorporate power control have been proposed in the literature. The main idea of these power control schemes is to use a maximum possible power level for transmitting RTS/CTS and the lowest acceptable power for sending DATA/ACK. However, these schemes may degrade network throughput and reduce the overall energy efficiency of the network. This paper proposes autonomous power control MAC protocol (APCMP, which allows mobile nodes dynamically adjusting power level for transmitting DATA/ACK according to the distances between the transmitter and its neighbors. In addition, the power level for transmitting RTS/CTS is also adjustable according to the power level for DATA/ACK packets. In this paper, the performance of APCMP protocol is evaluated by simulation and is compared with that of other protocols.

  12. Packet Drop Avoidance for High-speed network transmission protocol

    Energy Technology Data Exchange (ETDEWEB)

    Jin, Guojun

    2004-05-01

    As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in Transmission Control Protocol (TCP) have worked well on low bandwidth delay product networks, but with newer high-bandwidth delay networks they have shown to be inefficient and prone to unstable. This is largely due to increased network bandwidth coupled with changes in internet traffic patterns. These changes come from a variety of new network applications that are being developed to take advantage of the increased network bandwidth. This paper will examine the end-to-end congestion avoidance mechanism and perform a step-by-step analysis of its theory. In addition we will propose an alternative approach developed as part of a new network transmission protocol. Our alternative protocol uses a packet drop avoidance (PDA) mechanism built on top of the maximum burst size (MBS) theory combined with a real-time available bandwidth algorithm.

  13. Additively Homomorphic UC commitments with Optimal Amortized Overhead

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Damgård, Ivan Bjerre; David, Bernardo Machado

    2015-01-01

    and a linear code with efficient encoding. We also construct an additively homomorphic version of our basic scheme using VSS. Furthermore we evaluate the concrete efficiency of our schemes and show that the amortized computational overhead is significantly lower than in the previous best constructions. In fact......, our basic scheme has amortised concrete efficiency comparable with previous protocols in the Random Oracle Model even though it is constructed in the plain model....

  14. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  15. Merging Multiparty Protocols in Multiparty Choreographies

    OpenAIRE

    Fabrizio Montesi; Marco Carbone

    2013-01-01

    Choreography-based programming is a powerful paradigm for defining communication-based systems from a global viewpoint. A choreography can be checked against multiparty protocol specifications, given as behavioural types, that may be instantiated indefinitely at runtime. Each protocol instance is started with a synchronisation among the involved peers. We analyse a simple transformation from a choreography with a possibly unbounded number of protocol instantiations to a choreography instantia...

  16. Composing security protocols: from confidentiality to privacy

    OpenAIRE

    Arapinis, Myrto; Cheval, Vincent; Delaune, Stéphanie

    2015-01-01

    Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techniques have to be developed. We propose several results to safely compose security protocols. We consider arbitrary primitives modeled using an equational theory, and a rich process algebra close to the applied pi calculus. Relying on these composi...

  17. The Project Based Mechanisms of the Kyoto Protocol. Credible Instruments or Challenges to the Integrity of the Kyoto Protocol?

    Energy Technology Data Exchange (ETDEWEB)

    Takeuchi Waldegren, Linn

    2006-03-15

    The project based mechanisms of the Kyoto Protocol are innovative instruments which allow projects to earn credits for reducing greenhouse gas (GHG) emissions. The credits can in turn be used by countries to reach their emissions targets according to the Kyoto Protocol. The Project based mechanisms are known as the Clean Development Mechanism (CDM) and the Joint Implementation (JI). If the project based mechanisms are to be effective policy instruments they must ensure the integrity of the Kyoto Protocol, and their ability to promote and prove real emission reductions is critical. The environmental credibility of the project based mechanisms will also ensure their ability to promote cost effectiveness. Key concepts in this context are environmental and project additionality, and their role and value for the project based mechanisms are analyzed. Environmental additionality is established by comparing a project's emissions to a baseline. The baseline's credibility is thus vital. The concept of project additionality is somewhat controversial, but is nonetheless of equal importance. The case studies of CDM approved methodologies (AMs) and proposed projects suggest that there are credibility issues that need to be addressed if the project based mechanisms are to promote real emissions reductions.

  18. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  19. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  20. A new quantum private comparison protocol

    Science.gov (United States)

    Xu, Ling; Wang, Jing; Ahmed, Hafeez; Zhao, Zhiwen

    2017-10-01

    For two participants to compare the equality of their private information without revealing them, a new quantum private protocol with the help of semi-honest third party TP is proposed. Different from previous protocols, the four particle |Wf⟩ state and the |χ+⟩ state are utilized in this protocol as the carriers of quantum information and form the entanglement swapping as basic principle. The simple measurement of quantum states and exclusive-or operation are only required to conduct in this protocol. What's more, this protocol can compare two bits of two participants' private information in every comparison time. Meanwhile, it needs no unitary operation to fulfill this protocol. This protocol is feasible and efficient to execute through these aspects. In the end, the security of this protocol is analyzed at great length from two kinds of attacks including the outside attack and the participant attack. And the analysis result shows that this protocol can withstand various kinds of attacks and be secure to perform efficiently.