WorldWideScience

Sample records for antineoplastic protocols

  1. Thyroid dysfunction from antineoplastic agents.

    Science.gov (United States)

    Hamnvik, Ole-Petter Riksfjord; Larsen, P Reed; Marqusee, Ellen

    2011-11-02

    Unlike cytotoxic agents that indiscriminately affect rapidly dividing cells, newer antineoplastic agents such as targeted therapies and immunotherapies are associated with thyroid dysfunction. These include tyrosine kinase inhibitors, bexarotene, radioiodine-based cancer therapies, denileukin diftitox, alemtuzumab, interferon-α, interleukin-2, ipilimumab, tremelimumab, thalidomide, and lenalidomide. Primary hypothyroidism is the most common side effect, although thyrotoxicosis and effects on thyroid-stimulating hormone secretion and thyroid hormone metabolism have also been described. Most agents cause thyroid dysfunction in 20%-50% of patients, although some have even higher rates. Despite this, physicians may overlook drug-induced thyroid dysfunction because of the complexity of the clinical picture in the cancer patient. Symptoms of hypothyroidism, such as fatigue, weakness, depression, memory loss, cold intolerance, and cardiovascular effects, may be incorrectly attributed to the primary disease or to the antineoplastic agent. Underdiagnosis of thyroid dysfunction can have important consequences for cancer patient management. At a minimum, the symptoms will adversely affect the patient's quality of life. Alternatively, such symptoms can lead to dose reductions of potentially life-saving therapies. Hypothyroidism can also alter the kinetics and clearance of medications, which may lead to undesirable side effects. Thyrotoxicosis can be mistaken for sepsis or a nonendocrinologic drug side effect. In some patients, thyroid disease may indicate a higher likelihood of tumor response to the agent. Both hypothyroidism and thyrotoxicosis are easily diagnosed with inexpensive and specific tests. In many patients, particularly those with hypothyroidism, the treatment is straightforward. We therefore recommend routine testing for thyroid abnormalities in patients receiving these antineoplastic agents.

  2. Serine deprivation enhances antineoplastic activity of biguanides.

    Science.gov (United States)

    Gravel, Simon-Pierre; Hulea, Laura; Toban, Nader; Birman, Elena; Blouin, Marie-José; Zakikhani, Mahvash; Zhao, Yunhua; Topisirovic, Ivan; St-Pierre, Julie; Pollak, Michael

    2014-12-15

    Metformin, a biguanide widely used in the treatment of type II diabetes, clearly exhibits antineoplastic activity in experimental models and has been reported to reduce cancer incidence in diabetics. There are ongoing clinical trials to evaluate its antitumor properties, which may relate to its fundamental activity as an inhibitor of oxidative phosphorylation. Here, we show that serine withdrawal increases the antineoplastic effects of phenformin (a potent biguanide structurally related to metformin). Serine synthesis was not inhibited by biguanides. Instead, metabolic studies indicated a requirement for serine to allow cells to compensate for biguanide-induced decrease in oxidative phosphorylation by upregulating glycolysis. Furthermore, serine deprivation modified the impact of metformin on the relative abundance of metabolites within the citric acid cycle. In mice, a serine-deficient diet reduced serine levels in tumors and significantly enhanced the tumor growth-inhibitory actions of biguanide treatment. Our results define a dietary manipulation that can enhance the efficacy of biguanides as antineoplastic agents that target cancer cell energy metabolism.

  3. Antineoplastic mechanisms of Iodine in cancers that take up Iodine

    Directory of Open Access Journals (Sweden)

    Carmen Aceves

    2015-12-01

    Full Text Available Purpose: In addition to being a component of thyroid hormone (TH, iodine can be an antioxidant as well as an antiproliferative and differentiation agent that helps to maintain the integrity of several organs with the ability to take up iodine.Methods and Results: Studies from our laboratory shown that in preclinical (cell culture, induced animal cancer and xenographs and clinical studies (mammary cancer protocol, molecular iodine (I2 supplementation exerts suppressive effects on implantation, development, and progression of cancer neoplasias. These effects can be mediated by a variety of mechanisms and pathways, including direct actions, in which the oxidized iodine modulates the immune/tumor response and through iodolipid formation and the activation of peroxisome proliferator-activated receptors type gamma (PPARγ triggering apoptotic and/or differentiation pathways.Conclusion: The absence of side effects and the easy availability and handling of I2 have allowed the establishment of clinical protocols to utilize I2 supplementation as an adjuvant in therapies against cancers that take up iodine.-----------------------------------------Cite this article as:  Aceves C, Anguiano B. Antineoplastic mechanisms of Iodine in cancers that take up Iodine. Int J Cancer Ther Oncol 2015; 3(4:3401.[This abstract was presented at the BIT’s 8th Annual World Cancer Congress, which was held from May 15-17, 2015 in Beijing, China.

  4. Application of electrolysis for detoxification of an antineoplastic in urine.

    Science.gov (United States)

    Kobayashi, Toyohide; Hirose, Jun; Sano, Kouichi; Kato, Ryuji; Ijiri, Yoshio; Takiuchi, Hiroya; Tanaka, Kazuhiko; Goto, Emi; Tamai, Hiroshi; Nakano, Takashi

    2012-04-01

    Antineoplastics in excreta from patients have been considered to be one of the origins of cytotoxic, carcinogenic, teratogenic, and mutagenic contaminants in surface water. Recent studies have demonstrated that antineoplastics in clinical wastewater can be detoxified by electrolysis. In this study, to develop a method for the detoxification of antineoplastics in excreta, methotrexate solution in the presence of human urine was electrolyzed and evaluated. We found that urine inhibits detoxification by electrolysis; however, this inhibition decreased by diluting urine. In urine samples, the concentrations of active chlorine generated by anodic oxidation from 0.9% NaCl solution for inactivation of antineoplastics increased in dilution-dependent and time-dependent manner. These results indicate that electrolysis with platinum-based iridium oxide composite electrode is a possible method for the detoxification of a certain antineoplastic in urine.

  5. Oral Antineoplastic Agents: Assessing the Delay in Care

    OpenAIRE

    2015-01-01

    The study was undertaken to determine the length of time between when a prescription for an oral antineoplastic agent is written by the provider and when the medication is received by the patient and to identify risk factors that significantly increase time to medication receipt. First-time fill prescriptions for oral antineoplastic agents were identified. The date the prescription was written and received by the patient was determined. A retrospective review was completed to gather additiona...

  6. Antineoplastic Effects of Honey Bee Venom

    Directory of Open Access Journals (Sweden)

    Mohammad Nabiuni

    2013-08-01

    Full Text Available Background: Bee venom (BV, like many other complementary medicines, has been used for thousands of years for the treatment of a range of diseases. More recently, BV is also being considered as an effective composition for the treatment of cancer. Cancer is a major worldwide problem. It is obvious that the identification of compounds that can activate apoptosis could be effective on the treatment of cancer. BV is a very complicated mixture of active peptides, enzymes, and biologically active amines. The two main components of BV are melittin and phospholipase A2 (PLA2. Of these two components, melittin, the major active ingredient of BV, has been identified to induce apoptosis and to possess anti-tumor effects. We tried to review antineoplastic effects of BV in this study. Materials and Methods: The related articles were derived from different data bases such as PubMed, Elsevier Science, and Google Scholar using keywords including bee venom, cancer, and apoptosis.Results: According to the results of this study, BV can induce apoptosis and inhibit tumor cell growth and metastasis. Results of in vivo experiments show that the anti-tumor effect of the BV is highly dependent on the manner of injection as well as the distance between the area of injection and the tumor cells.Conclusion: The results obtained from the reported studies revealed that BV has anti-cancer effects and can be used as an effective chemotherapeutic agent against tumors in the future.

  7. Antineoplastic compounds in the environment-substances of special concern.

    Science.gov (United States)

    Kümmerer, Klaus; Haiß, Annette; Schuster, Armin; Hein, Arne; Ebert, Ina

    2016-08-01

    Antineoplastic drugs are important in the treatment of cancer. Some interact directly with the deoxyribonucleic acid (DNA) and are of utmost importance in terms of risk. As highly active compounds, antineoplastics and their metabolites are largely excreted into wastewater and are found in the aquatic environment up to the lower μg/L range. Their predicted environmental concentrations are often below the action limit set in the European Medicines Agency (EMA) guideline. An in-depth risk assessment regarding their presence and effects in the aquatic environment is often not performed, and there is a lack of knowledge. This study considered whether there is an underestimation of possible risks associated with the presence of antineoplastic drugs with regard to trigger value stated in the EMA and FDA guidelines. In a balance, we identified a total of 102 active pharmaceutical ingredients of the ATC-group L01 (antineoplastic agents), which are environmentally relevant. In Germany, 20.7 t of antineoplastic agents was consumed in 2012. The share of drugs with DNA-damaging properties increased within the last 6 years from 24 up to 67 %. Solely, capecitabine and 5-fluorouracil amount together 8 t-which corresponds to 39 % of the total antineoplastic consumption. Around 80 % of the total mass consumed could be attributed to prescriptions issued by office-based practitioners and is mostly excreted at home. Based on the different mode of actions, a case-by-case evaluation of the risk connected to their presence in the environment is recommended. DNA-damaging drugs should be assessed independently as no action limit can be assumed.

  8. Microbial growth tests in anti-neoplastic injectable solutions.

    Science.gov (United States)

    Paris, Isabelle; Paci, Angelo; Rey, Jean-Baptiste; Bourget, Philippe

    2005-03-01

    The Institut Gustave-Roussy (IGR) Department of Clinical Pharmacy (DCP) ensures the annual preparation of about 30 000 therapeutic batches of anti-neoplastic agents. High performance thin-layer chromatography (HPTLC) allows postproduction quality control of these batches. Although the centralized chemotherapy manufacturing unit has been recently ISO 9001:2000 certified, it was considered to improve the quality level of manufactured batches even further. The viability of micro-organisms (bacteria and fungi) in appropriate sterile media containing various anti-neoplastic agents at therapeutic concentration was assessed to demonstrate the lack of contamination during our manufacturing process in the isolator. After 14 days of incubation in these media, the results show the absence of contamination of the manufactured batches. This leads us to conclude that using sterile drugs and sterile medical devices in a sterile isolator allows the manufacture of sterile therapeutic batches with excellent confidence.

  9. The Effect of Genetic Polymorphism upon Antineoplastic Sensitivity

    Institute of Scientific and Technical Information of China (English)

    Jun Liang

    2006-01-01

    In clinical practice, patients undergoing chemotherapy display prominent individual differences, adverse reactions and sensitivity to antineoplastic therapy. Those differences are caused by individual genetic polymorphism of related genes. Genetic variation can induce distinct alterations of drug-metabolizing enzymes, drug transporters, drug targets and DNA repair enzymes and thereby influence the ability of the drugs to reach their target sites. This article reviews in detail the potential interactions mentioned above.

  10. Oral Antineoplastic Agents: Assessing the Delay in Care

    Directory of Open Access Journals (Sweden)

    Brandi Anders

    2015-01-01

    Full Text Available The study was undertaken to determine the length of time between when a prescription for an oral antineoplastic agent is written by the provider and when the medication is received by the patient and to identify risk factors that significantly increase time to medication receipt. First-time fill prescriptions for oral antineoplastic agents were identified. The date the prescription was written and received by the patient was determined. A retrospective review was completed to gather additional information, including prescribed medication, indication, insurance coverage, patient assistance program use, dispensing pharmacy, and prior authorization requirements. The data was analyzed through multivariate statistical analysis and used to identify risk factors that may significantly increase the time to medication receipt. A total of 58 patients were included in the study. A median of 8 days elapsed between when the medication was prescribed and when it was received by the patient. Medication prescribed, absence of a Risk Evaluation Mitigation Strategies (REMS program, and insurance type are factors that increased time to medication receipt. An understanding of the median time involved, as well as factors affecting the time to delivery of prescriptions, will help healthcare providers better plan and prepare for the use of oral antineoplastic agents.

  11. Oral Antineoplastic Agents: Assessing the Delay in Care.

    Science.gov (United States)

    Anders, Brandi; Shillingburg, Alexandra; Newton, Michael

    2015-01-01

    The study was undertaken to determine the length of time between when a prescription for an oral antineoplastic agent is written by the provider and when the medication is received by the patient and to identify risk factors that significantly increase time to medication receipt. First-time fill prescriptions for oral antineoplastic agents were identified. The date the prescription was written and received by the patient was determined. A retrospective review was completed to gather additional information, including prescribed medication, indication, insurance coverage, patient assistance program use, dispensing pharmacy, and prior authorization requirements. The data was analyzed through multivariate statistical analysis and used to identify risk factors that may significantly increase the time to medication receipt. A total of 58 patients were included in the study. A median of 8 days elapsed between when the medication was prescribed and when it was received by the patient. Medication prescribed, absence of a Risk Evaluation Mitigation Strategies (REMS) program, and insurance type are factors that increased time to medication receipt. An understanding of the median time involved, as well as factors affecting the time to delivery of prescriptions, will help healthcare providers better plan and prepare for the use of oral antineoplastic agents.

  12. Experimental study on anti-neoplastic activity of epigallocatechin-3-gallate to digestive tract carcinomas

    Institute of Scientific and Technical Information of China (English)

    RAN Zhi-hua; ZOU Jian; XIAO Shu-dong

    2005-01-01

    Background Epigallocatechin-3-gallate (EGCG) has been demonstrated to have anti-neoplastic activity, but the effective concentration of EGCG and its possible mechanisms are uncertain. The study on the killing effects of EGCG on different digestive tract cancer cell lines can find target sites of its anti-neoplastic effect and provide a theoretical basis for its clinical application in the treatment of cancers. Methods Methyl thiazolyl tetrazolium (MTT) analysis was made to detect the differential sensitivities of eight digestive tract cancer cell lines to EGCG. The effect of EGCG on cell cycle distribution of sensitive cancer cell line was measured by flow cytometry. By polymerase chain reaction (PCR)-enzyme linked immunosorbent assay (ELISA) protocol, the influence of EGCG on telomerase activity of sensitive cancer cell line was also investigated. RT-PCR method was employed to detect the influence of EGCG on the expressions of hTERT, c-myc, p53 and mad1 genes in sensitive cancer cell line. Results EGCG exhibited dose-dependent killing effects on all eight disgestive tract cancer cell lines. The 50% inhibitory concentration (IC50) of SW1116, MKN45, BGC823, SGC7901, AGS, MKN28, HGC27 and LoVo cells were 51.7 μmol/L, 55.9 μmol/L, 68.5 μmol/L, 79.1 μmol/L, 83.8 μmol/L, 119.8 μmol/L, 183.2 μmol/L and 194.6 μmol/L, respectively. There were no apparent changes in cell cycle distribution of sensitive cancer cell line MKN45 48 hours after incubating with three different concentrations of EGCG compared with the controls. It was found that EGCG could suppress the telomerase activity of MKN45 cells, and the effects were dose- and time-dependent. After EGCG administration, the expression of hTERT and c-myc genes in MKN45 cells was decreased, that of the mad1 gene increased, and that of the p53 gene unchanged. Conclusions EGCG has dose-dependent killing effects on different digestive tract cancer cell lines. Administration of EGCG has no obvious effect on cell cycle

  13. Autophagy process is associated with anti-neoplastic function

    Institute of Scientific and Technical Information of China (English)

    Chong Wang; Yachen Wang; Michael A. McNutt; Wei-Guo Zhu

    2011-01-01

    Autophagy is a highly conserved process of cellular degradation, which is present in yeast, plants, and mammals.Under normal physiological conditions, autophagy acts to maintain cellular homeostasis and regulate the turnover of organelles.In response to cellular stresses, autophagy prevents the accumulation of impaired proteins and organelles, which serves to inhibit carcinogenesis.On this basis,it is widely accepted that most tumor suppressors, such as beclin 1 associated proteins, forkhead box class O (FoxO)family proteins, multiple mammalian target of Rapamycin (mTOR) inactivators, and nuclear p53 play a role in indu cing autophagy.Here, we focus on how the process of autophagy is associated with anti-neoplastic function.

  14. Molecular biomonitoring of a population of nurses handling antineoplastic drugs

    Energy Technology Data Exchange (ETDEWEB)

    Cornetta, Tommaso [Department of Biology, ' Roma Tre' University, Viale Guglielmo Marconi, 446-00146 Rome (Italy); ' Don Carlo Gnocchi' Foundation, Rome (Italy); Padua, Luca [' Don Carlo Gnocchi' Foundation, Rome (Italy); Department of Neuroscience, Neurology Institute, Catholic University, Rome (Italy); Testa, Antonella; Ievoli, Elena [Toxicology and Biomedical Sciences Section, ENEA Research Center, Casaccia (Rome) (Italy); Festa, Fabiola [Department of Biology, ' Roma Tre' University, Viale Guglielmo Marconi, 446-00146 Rome (Italy); Tranfo, Giovanna [Department of Occupational Hygiene, Italian Institute for Occupational Prevention and Safety, Monteporzio Catone (Rome) (Italy); Baccelliere, Luigi [S. Martino Hospital, Genova (Italy); Cozzi, Renata [Department of Biology, ' Roma Tre' University, Viale Guglielmo Marconi, 446-00146 Rome (Italy)], E-mail: cozzi@bio.uniroma3.it

    2008-02-01

    Many antineoplastic drugs have been found to have carcinogenic, mutagenic and teratogenic activity and so hospital personnel handling these substances are potentially exposed to health risk. Understanding this risk derived from protracted occupational exposure has great relevance even if the workers normally adopt individual and environmental protective measures. To address this question we have studied the presence of DNA and chromosome damage in a population of nurses employed in Italian oncology units and in matched controls. We used the comet assay to evidence the presence of DNA strand breaks, due to both acute and chronic exposure, and the micronucleus (MN) test, which is a measure of clastogenic and aneugenic events. Furthermore, since the individual response to the exogenous insults may be genetically determined, we studied the possible influence of single nucleotide polymorphism in XRCC1 and XRCC3 DNA repair genes on induced genetic damage. We also considered the effects of confounding factors like smoking, age and gender. The results indicated that the exposed subjects had significantly high levels of genetic damage. Age and gender were associated with increased values in MN, both in control and in exposed groups; the smoking habit affects MN frequency in controls, but not in workers. Furthermore we found that exposed subjects bearing at least one XRCC1 variant allele (399Gln) show higher values of MN. The present data provide the evidence to show that occupational exposure to antineoplastic drugs, even if in safety controlled conditions, represents a serious health risk. Furthermore we have shown that the presence of XRCC1 genetic polymorphism could contribute to increase the genetic damage in susceptible individuals who are occupationally exposed to dangerous substances.

  15. Approval of antineoplastic agents in India: comparison with the US and EU regions

    Directory of Open Access Journals (Sweden)

    Bhaven C. Kataria

    2012-02-01

    Full Text Available Background: The antineoplastic drugs are prescribed for the treatment of cancer, which is an important cause of mortality in India; therefore, a drug lag in the availability of antineoplastic drugs is a direct threat to life. The present study was undertaken to assess the drug lag for new antineoplastic agents in India compared with that in the United States (US or European Union (EU. Methods: The new antineoplastic agents approved in the United States, European Union and India between 1999 and 2011 were identified and information was gathered primarily from the websites of regulatory agencies of the three regions. We assessed absolute and relative drug lag for new antineoplastic agents approved in the three regions. Results: Of the 70 new antineoplastic agents, 64 (91.42% were approved in the United States, 54 (77.14% in the European Union and 44 (62.85% in India. The US was the first to approve 59 (84.28% out of the 70 new antineoplastic agents, the EU was the first to approve 9 (12.85% and India was the first to approve 2 (2.85%. The median approval lag for India (26.35 months was higher as compared to the United States (0 month and European Union (7.3 months. Conclusions: This study confirms that India's drug lag in the case of new antineoplastic agents is higher as compared to the US and EU. Further detailed analyses are necessary to find the reasons and impacts of drug lag for antineoplastic agents in India. [Int J Basic Clin Pharmacol 2012; 1(1.000: 13-21

  16. The Drug Sensitivity of Cyclosporine A Combined with Antineoplastic Drugs in Retinoblastoma in Vitro

    Institute of Scientific and Technical Information of China (English)

    Wanli Liu; Zhongyao Wu

    2005-01-01

    Purpose: To study cyclosporine A inhibition on the fresh retinoblastoma cells in vitro and increasing the drug sensitivity after combined with different antineoplastic drugs.Methods: To study the growth curve of cyclosporine A on 27 samples of primary retinoblastoma cells by MTT assay and to study the change of the drug sensitivity by cyclosporine A combined with seven antineoplastic drugs.Results: The average IC50 of cyclosporine A on the 27 retinoblastoma cells is 67.81μg/ml and the average inhibitive rate of these samples is 26.1% when cyclosporine A is in the concentration of 2μg/ml. The inhibitive rates all got improved after the seven antineoplastic drugs combined with cyclosporine A and the increasing average inhibitive rate is more than 5.Conclusion: Cyclosporine A can inhibit retinoblastoma cells in vitro and its inhibitive effect is dose dependent. Moreover it can enhance the inhibition of multiple antineoplastic drugs on retinoblastoma cells.

  17. Effect of solcoseryl on antitumour action and acute toxicity of some antineoplastic drugs.

    Science.gov (United States)

    Danysz, A; Sołtysiak-Pawluczuk, D; Czyzewska-Szafran, H; Jedrych, A; Jastrzebski, Z

    1991-01-01

    The in vivo effect of Solcoseryl on the antitumour activity and acute toxicity of some antineoplastic drugs was examined. It was found that Solcoseryl does not inhibit the antineoplastic effectiveness of the drugs against transplantable P 388 leukaemia in mice. Studies of the effect of Solcoseryl on acute toxicity of selected antineoplastic drugs in mice revealed that the biostimulator could exert a modifying influence. The prior administration of Solcoseryl significantly decreases the acute toxicity of methotrexate but has no effect on acute toxicity of 5-fluorouracil, increases the acute toxicity of bleomycin and vinblastine and has no effect on acute toxicity of methotrexate and mitoxantron. On the other hand, Solcoseryl administered simultaneously with the antineoplastic drugs increases acute toxicity of 5-fluorouracil, bleomycin and mitoxantron. The protective effect of the biostimulator noted exclusively against acute toxicity of 5-fluorouracil was also observed after multiple administration of this anticancer drug.

  18. Taurolidine cooperates with antineoplastic drugs in neuroblastoma cells.

    Science.gov (United States)

    Eschenburg, Georg; Luckert, Christian; Reinshagen, Konrad; Bergholz, Robert

    2014-11-01

    Neuroblastoma is the most common extracranial tumor in childhood. Outcome of stage 4 disease remains poor and the development of novel therapeutic approaches is thus urgently needed. Taurolidine (TRD), originally invented to avoid catheter infections, has shown to exhibit antineoplastic activity in various cancers. The growth of neuroblastoma cell lines is inhibited by TRD as recently demonstrated. Further analysis disclosed a significant negative growth effect of TRD on the four neuroblastoma cell lines SH-EP TET21N, SK-N-AS, SK-N-BE(2)-M17 and SK-N-SH. Detected IC50 (51-274 μM; 48 h) are promising and correspond to clinically-achievable plasma levels. Apoptosis was induced (76-86%; 48 h) in a time-dependent manner mediated by a simultaneous activation of the intrinsic and extrinsic pathways. This was confirmed by cleavage of caspases -3, -8 and -9 and abrogation of apoptosis by pan-caspase inhibition. Application of TRD resulted in a significant enhancement of cytotoxic drugs vincristine/doxorubicin (2/3 of 4 cell lines) making TRD a promising candidate to be included in neuroblastoma therapy regimens in the future.

  19. Antineoplastic effect of decoy oligonucleotide derived from MGMT enhancer.

    Directory of Open Access Journals (Sweden)

    Tamar Canello

    Full Text Available Silencing of O(6-methylguanine-DNA-methyltransferase (MGMT in tumors, mainly through promoter methylation, correlates with a better therapeutic response and with increased survival. Therefore, it is conceivable to consider MGMT as a potential therapeutic target for the treatment of cancers. Our previous results demonstrated the pivotal role of NF-kappaB in MGMT expression, mediated mainly through p65/NF-kappaB homodimers. Here we show that the non-canonical NF-KappaB motif (MGMT-kappaB1 within MGMT enhancer is probably the major inducer of MGMT expression following NF-kappaB activation. Thus, in an attempt to attenuate the transcription activity of MGMT in tumors we designed locked nucleic acids (LNA modified decoy oligonucleotides corresponding to the specific sequence of MGMT-kappaB1 (MGMT-kB1-LODN. Following confirmation of the ability of MGMT-kB1-LODN to interfere with the binding of p65/NF-kappaB to the NF-KappaB motif within MGMT enhancer, the efficacy of the decoy was studied in-vitro and in-vivo. The results of these experiments show that the decoy MGMT-kB1-LODN have a substantial antineoplastic effect when used either in combination with temozolomide or as monotherapy. Our results suggest that MGMT-kB1-LODN may provide a novel strategy for cancer therapy.

  20. Dental anomalies in children submitted to antineoplastic therapy

    Directory of Open Access Journals (Sweden)

    Camila Merida Carrillo

    2014-06-01

    Full Text Available Cancer is the third most frequent cause of death in children in Brazil. Early diagnosis and medical advances have significantly improved treatment outcomes, which has resulted in higher survival rates and the management of late side effects has become increasingly important in caring for these patients. Dental abnormalities are commonly observed as late effects of antineoplastic therapy in the oral cavity. The incidence and severity of the dental abnormalities depend on the child's age at diagnosis and the type of chemotherapeutic agent used, as well as the irradiation dose and area. The treatment duration and aggressivity should also be considered. Disturbances in dental development are characterized by changes in shape, number and root development. Enamel anomalies, such as discoloration, opacities and hypoplasia are also observed in these patients. When severe, these abnormalities can cause functional and esthetic sequelae that have an impact on the children's and adolescents' quality of life. General dentists and pediatric dentists should understand these dental abnormalities and how to identify them aiming for early diagnosis and appropriate treatment.

  1. Antineoplastic effect of decoy oligonucleotide derived from MGMT enhancer.

    Science.gov (United States)

    Canello, Tamar; Ovadia, Haim; Refael, Miri; Zrihan, Daniel; Siegal, Tali; Lavon, Iris

    2014-01-01

    Silencing of O(6)-methylguanine-DNA-methyltransferase (MGMT) in tumors, mainly through promoter methylation, correlates with a better therapeutic response and with increased survival. Therefore, it is conceivable to consider MGMT as a potential therapeutic target for the treatment of cancers. Our previous results demonstrated the pivotal role of NF-kappaB in MGMT expression, mediated mainly through p65/NF-kappaB homodimers. Here we show that the non-canonical NF-KappaB motif (MGMT-kappaB1) within MGMT enhancer is probably the major inducer of MGMT expression following NF-kappaB activation. Thus, in an attempt to attenuate the transcription activity of MGMT in tumors we designed locked nucleic acids (LNA) modified decoy oligonucleotides corresponding to the specific sequence of MGMT-kappaB1 (MGMT-kB1-LODN). Following confirmation of the ability of MGMT-kB1-LODN to interfere with the binding of p65/NF-kappaB to the NF-KappaB motif within MGMT enhancer, the efficacy of the decoy was studied in-vitro and in-vivo. The results of these experiments show that the decoy MGMT-kB1-LODN have a substantial antineoplastic effect when used either in combination with temozolomide or as monotherapy. Our results suggest that MGMT-kB1-LODN may provide a novel strategy for cancer therapy.

  2. [Blending powdered antineoplastic medicine in disposable ointment container].

    Science.gov (United States)

    Miyazaki, Yasunori; Uchino, Tomonobu; Kagawa, Yoshiyuki

    2014-01-01

    On dispensing powdered antineoplastic medicines, it is important to prevent cross-contamination and environmental exposure. Recently, we developed a method for blending powdered medicine in a disposable ointment container using a planetary centrifugal mixer. The disposable container prevents cross-contamination. In addition, environmental exposure associated with washing the apparatus does not arise because no blending blade is used. In this study, we aimed to confirm the uniformity of the mixture and weight loss of medicine in the blending procedure. We blended colored lactose powder with Leukerin(®) or Mablin(®) powders using the new method and the ordinary pestle and mortar method. Then, the blending state was monitored using image analysis. Blending variables, such as the blending ratio (1:9-9:1), container size (35-125 mL), and charging rate (20-50%) in the container were also investigated under the operational conditions of 500 rpm and 50 s. At a 20% charging rate in a 35 mL container, the blending precision of the mixtures was not influenced by the blending ratio, and was less than 6.08%, indicating homogeneity. With an increase in the charging rate, however, the blending precision decreased. The possible amount of both mixtures rose to about 17 g with a 20% charging rate in a 125 mL container. Furthermore, weight loss of medicines with this method was smaller than that with the pestle and mortar method, suggesting that this method is safer for pharmacists. In conclusion, we have established a precise and safe method for blending powdered medicines in pharmacies.

  3. The Location and Size of Pulmonary Embolism in Antineoplastic Chemotherapy Patients

    Energy Technology Data Exchange (ETDEWEB)

    Park, Yun Joo; Kwon, Woo cheol; Lee, Won Yeon; Koh, Sang Baek; Kim, Seong Ah; Kim, Myung Soon; Kim, Young Ju [Yonsei University College of Medicine, Seoul (Korea, Republic of)

    2010-02-15

    To retrospectively evaluate the prevalent location and size of pulmonary embolism (PE) in anti-neoplastic chemotherapy patients by multidetector row CT (MDCT). This study was conducted on 101 patients that were positively diagnosed with PE by CT. Among these patients, 23 had received or were undergoing chemotherapy. The location and the mean size of the largest PE were compared between anti-neoplastic chemotherapy patients and non-cancer patients using the Chisquare test and paired t-test, respectively. We also used a multiple linear regression to assess the risk posed by the other risk factors of PE. The most prevalent location of PE in patients on anti-neoplastic chemotherapy was in the lobar or segmental pulmonary arteries and was not significantly different from non-cancer patients. The size of the PE was smaller in patients on anti-neoplastic chemotherapy (1.14 mL [standard error = 0.29]) compared to non-cancer patients. (2.14 mL [standard error = 0.40]) (p < 0.05). The size of PE is smaller in anti-neoplastic chemotherapy patients than in non-cancer patients

  4. Anticancer activity of streptochlorin, a novel antineoplastic agent, in cholangiocarcinoma

    Directory of Open Access Journals (Sweden)

    Kwak TW

    2015-04-01

    Full Text Available Tae Won Kwak,1,* Hee Jae Shin,2,* Young-Il Jeong,1 Myoung-Eun Han,3 Sae-Ock Oh,3 Hyun-Jung Kim,4 Do Hyung Kim,5 Dae Hwan Kang1 1Biomedical Research Institute, Pusan National University Hospital, Busan, 2Marine Natural Products Chemistry Laboratory, Korea Institute of Ocean Science and Technology, Ansan, 3Department of Anatomy, School of Medicine, Pusan National University, Gyeongnam, 4Genewel Co Ltd. Gyeonggi-do, 5School of Medicine, Pusan National University, Yangsan, Gyeongnam, Republic of Korea *These authors contributed equally to this work Background: The aim of this study is to investigate the anticancer activity of streptochlorin, a novel antineoplastic agent, in cholangiocarcinoma. Methods: The anticancer activity of streptochlorin was evaluated in vitro in various cholangiocarcinoma cell lines for apoptosis, proliferation, invasiveness, and expression of various protein levels. A liver metastasis model was prepared by splenic injection of HuCC-T1 cholangiocarcinoma cells using a BALB/c nude mouse model to study the systemic antimetastatic efficacy of streptochlorin 5 mg/kg at 8 weeks. The antitumor efficacy of subcutaneously injected streptochlorin was also assessed using a solid tumor xenograft model of SNU478 cells for 22 days in the BALB/c nude mouse. Results: Streptochlorin inhibited growth and secretion of vascular endothelial growth factor by cholangiocarcinoma cells in a dose-dependent manner and induced apoptosis in vitro. In addition, streptochlorin effectively inhibited invasion and migration of cholangiocarcinoma cells. Secretion of vascular endothelial growth factor and activity of matrix metalloproteinase-9 in cholangiocarcinoma cells were also suppressed by treatment with streptochlorin. Streptochlorin effectively regulated metastasis of HuCC-T1 cells in a mouse model of liver metastasis. In a tumor xenograft study using SNU478 cells, streptochlorin significantly inhibited tumor growth without changes in body weight

  5. Comet assay as a human biomonitoring tool: application in occupational exposure to antineoplastic drugs

    Directory of Open Access Journals (Sweden)

    Carina Ladeira

    2015-05-01

    Occupational exposure to antineoplastic drugs is associated with genotoxic effects, although comet assay analyzed parameters were higher in exposed comparing with controls, were not significant. Also the study of the susceptibility biomarkers did not show statistical significant differences, the small size of our sample hampered the finding of a possible association, let alone a causality relationship.

  6. Infiltrative Lung Diseases: Complications of Novel Antineoplastic Agents in Patients with Hematological Malignancies

    Directory of Open Access Journals (Sweden)

    Bobbak Vahid

    2008-01-01

    Full Text Available Infiltrative lung disease is a well-known complication of antineoplastic agents in patients with hematological malignancies. Novel agents are constantly being added to available treatments. The present review discusses different pulmonary syndromes, pathogenesis and management of these novel agents.

  7. The antineoplastic effect of Naja Naja atra venom on S180 bearing mice and its mechanism

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    AIM:To observe the antineoplastic effect of Naja Naja atra venom (NNAV) on S180 bearing mice and to study the possible antineoplastic mechanism. METHODS:We observed the effect of NNAV on tumor weight、plasma nitric oxide content、plasma endothelin content and spleen index in S180 bearing mice with different concentration and different period by means of injecting into abdomen. RESULTS:Treatment with NNAV solution of different concentration could markedly inhibit S180 growth (especially in the low concentration group and by long period) and rate of inhibiting ranged from 21 63% to 49.25%; the plasma nitric oxide content, the plasma endothelin content and NO/ET ratio in tumor bearing mice were obviously higher than those of the normal control group, while after treatment with NNAV solution, the plasma nitric oxide level, the plasma endothelin level and NO/ET ratio could be reduced markedly, and it was noticed that NO/ET ratio in the group with highest inhibiting rate was most close to that of the normal control group. The spleen index was obviously increased after treatment with NNAV solution.CONCLUSION:The antineoplastic effect of NNAV on S180 bearing mice is best in long period by means of injecting into abdomen with low concentration. The mechanism of the antineoplastic effect of NNAV may be related to lowering the plasma nitric oxide and endothelin level, regulating the NO/ET ratio and enhancing the immune response.

  8. Adherence to Precautionary Guidelines for Compounding Antineoplastic Drugs: A Survey of Nurses and Pharmacy Practitioners.

    Science.gov (United States)

    Boiano, James M; Steege, Andrea L; Sweeney, Marie H

    2015-01-01

    Precautionary guidelines detailing standards of practice and equipment to eliminate or minimize exposure to antineoplastic drugs during handling activities have been available for nearly three decades. To evaluate practices for compounding antineoplastic drugs, the NIOSH Health and Safety Practices Survey of Healthcare Workers was conducted among members of professional practice organizations representing primarily oncology nurses, pharmacists, and pharmacy technicians. This national survey is the first in over 20 years to examine self-reported use of engineering, administrative, and work practice controls and PPE by pharmacy practitioners for minimizing exposure to antineoplastic drugs. The survey was completed by 241 nurses and 183 pharmacy practitioners who compounded antineoplastic drugs in the seven days prior to the survey. They reported: not always wearing two pairs of chemotherapy gloves (85%, 47%, respectively) or even a single pair (8%, 10%); not always using closed system drug-transfer devices (75%, 53%); not always wearing recommended gown (38%, 20%); I.V. lines sometimes/always primed with antineoplastic drug (19%, 30%); and not always using either a biological safety cabinet or isolator (9%, 15%). They also reported lack of: hazard awareness training (9%, 13%); safe handling procedures (20%, 11%); and medical surveillance programs (61%, 45%). Both employers and healthcare workers share responsibility for adhering to precautionary guidelines and other best practices. Employers can ensure that: workers are trained regularly; facility safe-handling procedures reflecting national guidelines are in place and support for their implementation is understood; engineering controls and PPE are available and workers know how to use them; and medical surveillance, exposure monitoring, and other administrative controls are in place. Workers can seek out training, understand and follow facility procedures, be role models for junior staff, ask questions, and report

  9. Adherence to safe handling guidelines by health care workers who administer antineoplastic drugs.

    Science.gov (United States)

    Boiano, James M; Steege, Andrea L; Sweeney, Marie H

    2014-01-01

    The toxicity of antineoplastic drugs is well documented. Many are known or suspected human carcinogens where no safe exposure level exists. Authoritative guidelines developed by professional practice organizations and federal agencies for the safe handling of these hazardous drugs have been available for nearly three decades. As a means of evaluating the extent of use of primary prevention practices such as engineering, administrative and work practice controls, personal protective equipment (PPE), and barriers to using PPE, the National Institute for Safety and Health (NIOSH) conducted a web survey of health care workers in 2011. The study population primarily included members of professional practice organizations representing health care occupations which routinely use or come in contact with selected chemical agents. All respondents who indicated that they administered antineoplastic drugs in the past week were eligible to complete a hazard module addressing self-reported health and safety practices on this topic. Most (98%) of the 2069 respondents of this module were nurses. Working primarily in hospitals, outpatient care centers, and physician offices, respondents reported that they had collectively administered over 90 specific antineoplastic drugs in the past week, with carboplatin, cyclophosphamide, and paclitaxel the most common. Examples of activities which increase exposure risk, expressed as percent of respondents, included: failure to wear nonabsorbent gown with closed front and tight cuffs (42%); intravenous (I.V.) tubing primed with antineoplastic drug by respondent (6%) or by pharmacy (12%); potentially contaminated clothing taken home (12%); spill or leak of antineoplastic drug during administration (12%); failure to wear chemotherapy gloves (12%); and lack of hazard awareness training (4%). The most common reason for not wearing gloves or gowns was "skin exposure was minimal"; 4% of respondents, however, reported skin contact during handling and

  10. Anti-neoplastic efficacy of Haimiding on gastric carcinoma and its mechanisms

    Institute of Scientific and Technical Information of China (English)

    Yu-Bin Ji; Shi-Yong Gao; Hong-Rui Ji; Qi Kong; Xiu-Juan Zhang; Bao-Feng Yang

    2004-01-01

    AIM: To study the anti-neoplastic effect of Haimiding and its mechanisms of action.METHODS: Experiments using MTT and colony formation were carried out to study thein vitro anti-neoplastic action of Haimiding, its in vivo anti-neoplastic action was studied by observing its effect on the weight of tumors in FC mice and S180, H22 tumor bearing mice, as well as their life spans.The effect of Haimiding on cell apoptosis and different stages of cell cycles in human gastric carcinoma cells were studied by flow cytometry. Its effect on [Ca2+]i of human gastric carcinoma cells and the source of Ca2+ during the change of [Ca2+]i were observed by confocal laser scanning technique.RESULTS: Haimiding showed a definite cytotoxicity to 8 human tumor cell lines, which was most prominent against BGC-823, Eca-109 and HCT-8 tumor cells. It also exhibited an obvious inhibition on colony formation of the above tumor cell lines, which was most prominent in Eca-109 tumor cells. It showed obvious inhibition on the growth of tumor in FC mice and S180 bearing mice as well as prolonged the life span of H22 bearing mice. It was able to induce apoptosis and elevate intracellular [Ca2+]i concentration of tumor cells.The source of Ca2+ came from both extracellular Ca2+ influx and intracellular Ca2+ release.CONCLUSION: Haimiding is composed of a TCM preparation and 5-flurouracil. Its anti-neoplastic potency is highly enhanced by synergism as compared with either one of its components. Its mechanisms of anti-neoplastic action can be attributed to its action to initiate apoptosis of tumor cells by opening the membrane calcium channel and inducing intracellular Ca2+ release to elevate [Ca2+]i of the tumor cells.

  11. Dental root agenesis following radiation and antineoplastic therapy: A Case Report

    Directory of Open Access Journals (Sweden)

    Abdul Hafiz

    2016-01-01

    Full Text Available The survival rates of patients suffering from various childhood neoplasms have improved dramatically with the advent of chemo-radiation therapy. The harmful effects of chemo-radiation therapy in the oro-facial region such as root agenesis, short roots, impaired amelogenesis, dentinogenesis, radiation caries, and other soft tissue pathologies are well recognized. In spite of these documented risks, the antineoplastic treatment modalities continue to serve the patient for overall improvement in survival and quality of life. However, a thorough understanding of the growth and development process and its relation with the complex antineoplastic treatment is very important for all clinicians. Such awareness could significantly improve the status of patients in the posttreatment period with the implementation of proper preventive and interceptive measures. This article intends to document a case of root agenesis that developed secondary to chemo-radiation therapy in a 12-year-old girl.

  12. Factors that affect cancer patient compliance to oral anti-neoplastic therapy

    OpenAIRE

    Marques,Patrícia Andréa Crippa; Pierin, Angela Maria Geraldo

    2008-01-01

    OBJECTIVES: To identify factors that can affect compliance to treatment with neoplastic oral drugs in a group of cancer patients. METHODS: Interviews were performed on 61 patients diagnosed with cancer and under anti-neoplastic oral therapy in a private hospital. The interviews were carried out using instruments to assess compliance. RESULTS: Most patients (95%) reported the oral treatment was not difficult. The Morisky and Green Test were positive in 28% of the patients. Factors that may aff...

  13. Adherence to Safe Handling Guidelines by Health Care Workers Who Administer Antineoplastic Drugs

    OpenAIRE

    Boiano, James M.; Steege, Andrea L.; Sweeney, Marie H.

    2014-01-01

    The toxicity of antineoplastic drugs is well documented. Many are known or suspected human carcinogens where no safe exposure level exists. Authoritative guidelines developed by professional practice organizations and federal agencies for the safe handling of these hazardous drugs have been available for nearly three decades. As a means of evaluating the extent of use of primary prevention practices such as engineering, administrative and work practice controls, personal protective equipment ...

  14. The caries experience and dentistry following evaluation of children submitted to antineoplastic therapy

    OpenAIRE

    Hanna, Leila Maués Oliveira; de Araújo, Rodolfo José Gomes; Vilarino, Ewerson Fernando Almeida; Mayhew, Andressa Soraia Barros

    2016-01-01

    Aim: To evaluate the caries experience and the dentistry following of children submitted to antineoplastic therapy of a reference Hospital to this type of treatment in Para state, Brazil.Material and Methods: The sample consisted of 46 children. It was included children in the ages of 2 to 12 years diagnosed with cancer that would be submitted to chemotherapy treatment. The evaluation was performed before the chemotherapy treatment and consisted of anamnesis and oral clinical examination. In ...

  15. Study on Chromosome Damage Among Nurses Occupationally Exposed to Antineoplastic Drugs in an Oncology Department

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    @@ INTRODUCTION Many antineoplastic agents have been shown to be mutagenic, teratogenic and carcinogenic in experimental animals and in vitro test systems. Epidemiological data on the association of secondary neoplasms with a specific chemotherapeutic treatment are available on some 30 agents. Several previous studies concerning hospital personnel have indicated that occupational exposure to cytostatic drugs may be detected by genotoxicological biomonitoring methods, e.g., comet assay, SCEs, chromosomal aberration and micronucleus test.

  16. Permeability of nitrile rubber, latex, polyurethane, and neoprene gloves to 18 antineoplastic drugs.

    Science.gov (United States)

    Connor, T H

    1999-12-01

    The permeability of four glove materials to various antineoplastic drugs was studied. Eighteen antineoplastic drugs posing potential health hazards to handlers were prepared at the highest concentrations normally encountered by hospital personnel. Four glove materials-nitrile rubber, latex, polyurethane, and neoprene-were exposed to the drugs for 30, 60, 90, and 120 minutes. Glove thickness was measured with an electronic digital caliper. Random samples of material were selected from the glove fingertips, and triplicate samples were tested for each drug at each interval. For a majority of the drugs, a bacterial mutagenicity assay was used to measure the amount of drug (if any) that permeated the material. High-performance liquid chromatography was used for drugs not tested with the bacterial assay. The nitrile gloves were the thinnest (0.12 mm), and the latex gloves were the thickest (0.18 mm). The four materials were generally impermeable to each drug. One sample of the nitrile gloves appeared to have a defect, allowing >5% of the drug solution to pass through at 30 minutes. One sample each of the latex, polyurethane, and neoprene gloves demonstrated minimal permeability (neoprene materials. Nitrile rubber, latex, polyurethane, and neoprene gloves were impermeable to 18 antineoplastic drugs in most, but not all, cases.

  17. Redox-directed cancer therapeutics: Taurolidine and Piperlongumine as broadly effective antineoplastic agents (review).

    Science.gov (United States)

    Möhler, Hanns; Pfirrmann, Rolf W; Frei, Karl

    2014-10-01

    Targeting the oxygen stress response pathway is considered a promising strategy to exert antineoplastic activity in a broad spectrum of tumor types. Supporting this view, we summarize the mechanism of action of Taurolidine and Piperlongumine, two antineoplastic agents with strikingly broad tumor selectivity. Taurolidine enhances the oxidative stress (ROS) selectively in tumor cells. Its cytotoxicity for various tumor cells in vitro and in vivo, which includes tumor stem cells, is based on the induction of programmed cell death, largely via apoptosis but also necroptosis and autophagy. The redox-directed mechanism of action of Taurolidine is apparent from the finding that reducing agents e.g., N-acetylcysteine or glutathione impair its cytotoxicity, while its effectiveness is enhanced by agents which inhibit the cellular anti‑oxidant capacity. A similar redox-directed antineoplastic action is shown by Piperlongumine, a recently described experimental drug of plant origin. Taurolidine is particularly advantageous in surgical oncology as this taurine-derivative can be applied perioperatively or systemically with good tolerability as shown in initial clinical applications.

  18. Selenium Distribution Pattern, Antineoplastic and Immunostimulatory Activities of a Novel Organoselenium Compound Eb

    Institute of Scientific and Technical Information of China (English)

    YANJun; DENGSheng-ju; KUANGBin; HEFei; LIUTao; ZENGHui-hui

    2004-01-01

    Aim To study the distribution pattern, antineoplastic activity and immtmocompetence of a novel organeselenium compotmd Eb and investigate its in vivo antineoplastic potential. Methods Eb was administered to Kunming mice (dosage, 0.1 g·kg-1·d-1) intragastrically for 7 successive days. The contents of selenium in heart, liver, spleen, kidneys, lungs, stomach, brain, muscle, and bone were determined by fluommetric method on the eighth day. MTT assay was used to study tumor growth inhibition of Eb in vitro, and lymphocyte transformation, hemolysin formation and phagocytosis assay were used to study its immunocompetence. Results After 7 days' administration of Eb, the tissue contents of selenium in liver, spleen, lungs, kidneys, and bone of mice increased, especially those in liver and spleen increased significantly, compared with controls; but no significant changes of such contents were fotmd in muscle, heart, brain, and stomach. Eb demonstrated inhibitory effects on human Bel-7402, BGC-823, and Calu-3 cancer cell lines in vitro. Eb also showed ability to enhance lymphocyte transformation and serum hemolysin formation in v/tro and increase the phagocytosis of macrophages. Conclusion The validated antitumor and immtmostimulatory activities of Eb suggest a hypothesis that Eb may behave as a biological response modifier when used as an antitumor agent. Eb is worthy of further study in developing a new antineoplastic and immunity enhancing agent in the light of its antitumor activity, immtmocompetenee and specific distribution in liver, lungs, kidneys, bone, and spleen.

  19. Evaluation of new antiemetic agents and definition of antineoplastic agent emetogenicity--state of the art.

    Science.gov (United States)

    Grunberg, Steven M; Warr, David; Gralla, Richard J; Rapoport, Bernardo L; Hesketh, Paul J; Jordan, Karin; Espersen, Birgitte T

    2011-03-01

    Antiemetic drug development can follow the same logical path as antineoplastic drug development from appropriate preclinical models through Phase I, Phase II, and Phase III testing. However, due to the marked success of antiemetic therapy over the last 25 years, placebo antiemetic treatment against highly or moderately emetogenic chemotherapy is not acceptable. Promising antiemetic agents therefore rapidly reach Phase III testing, where they are substituted into or added to effective and accepted regimens. One challenge of antiemetic drug development is determining whether substitution is indeed acceptable or whether prior regimens must be maintained intact as a basis for further antiemetic drug development. An additional challenge is the classification of emetogenic level of new antineoplastic agents. Accurate reporting of emetogenicity of such antineoplastic agents in the absence of preventive antiemetic treatment may not be available. However, at the 2009 Multinational Association of Supportive Care in Cancer (MASCC)/European Society of Medical Oncology (ESMO) Consensus Conference, an expert panel used best available data to establish rankings of emetogenicity. Oral chemotherapeutic agents are ranked separately from intravenous agents, recognizing intrinsic differences in emetogenicity as well as differing schedules of administration. Since oral chemotherapeutic agents are often administered in extended regimens, the distinction between acute and delayed emesis is less clear, and cumulative emesis must be considered. As control of vomiting has improved, attention has shifted to control of nausea, a related but distinct and equally important problem. Additional efforts will be necessary to understand mechanisms of nausea and to identify optimal remedies.

  20. Implementation of a robot for the preparation of antineoplastic drugs in the Pharmacy Service

    Directory of Open Access Journals (Sweden)

    María de la Paz Pacheco Ramos

    2015-01-01

    Full Text Available Objective: To describe the implementation of a robot for the preparation of antineoplastic drugs in the Pharmacy Service and to be able to analyze the added value to pharmacotherapy. Methods: The implementation was carried out in June 2012 at a tertiary level Hospital, taking place in two periods: 1- test period with the installation of the robot, with technical configuration of the equipment and validation of 29 active ingredients and the integration of electronic prescribing software with the robot application (9 months. 2- Usage period (22 months. On the other hand, training was given to pharmacists and nurses. The robot uses image recognition, barcode identification and gravimetric controls for proper operation. These checks provide information about the error ratio in the preparation, with a margin of ± 10%, which after a pilot study was restricted to a range of ±4%. The robot was programmed to recognize bags, infusion pumps, syringes and vials. The added value was assessed for 31 months by identifying preparation´s errors. Results: 11,865 preparations were made by the robot, which meant approximately 40% of all antineoplastic prepared from 29 different active ingredients. 1.12% (n=133 of the errors were identified by the robot and therefore didn´t reach the patient (negative desviation - 4%. These errors were corrected manually. Conclusion: The implementation of a robot in the preparation of antineoplastic drugs allows to identify errors therefore preventing them to arrive to the patient. This promotes safety and quality of the process, reducing the exposure to cytotoxic drugs from the manipulator

  1. Antineoplastic effects of an Aurora B kinase inhibitor in breast cancer

    Directory of Open Access Journals (Sweden)

    Velazquez-Torres Guermarie

    2010-02-01

    Full Text Available Abstract Background Aurora B kinase is an important mitotic kinase involved in chromosome segregation and cytokinesis. It is overexpressed in many cancers and thus may be an important molecular target for chemotherapy. AZD1152 is the prodrug for AZD1152-HQPA, which is a selective inhibitor of Aurora B kinase activity. Preclinical antineoplastic activity of AZD1152 against acute myelogenous leukemia, multiple myeloma and colorectal cancer has been reported. However, this compound has not been evaluated in breast cancer, the second leading cause of cancer deaths among women. Results The antineoplastic activity of AZD1152-HQPA in six human breast cancer cell lines, three of which overexpress HER2, is demonstrated. AZD1152-HQPA specifically inhibited Aurora B kinase activity in breast cancer cells, thereby causing mitotic catastrophe, polyploidy and apoptosis, which in turn led to apoptotic death. AZD1152 administration efficiently suppressed the tumor growth in a breast cancer cell xenograft model. In addition, AZD1152 also inhibited pulmonary metastatic nodule formation in a metastatic breast cancer model. Notably, it was also found that the protein level of Aurora B kinase declined after inhibition of Aurora B kinase activity by AZD1152-HQPA in a time- and dose-dependent manner. Investigation of the underlying mechanism suggested that AZD1152-HQPA accelerated protein turnover of Aurora B via enhancing its ubiquitination. Conclusions It was shown that AZD1152 is an effective antineoplastic agent for breast cancer, and our results define a novel mechanism for posttranscriptional regulation of Aurora B after AZD1152 treatment and provide insight into dosing regimen design for this kinase inhibitor in metastatic breast cancer treatment.

  2. Low concentration of quercetin antagonizes the cytotoxic effects of anti-neoplastic drugs in ovarian cancer.

    Directory of Open Access Journals (Sweden)

    Na Li

    Full Text Available OBJECTIVE: The role of Quercetin in ovarian cancer treatment remains controversial, and the mechanism is unknown. The aim of this study was to investigate the therapeutic effects of Quercetin in combination with Cisplatin and other anti-neoplastic drugs in ovarian cancer cells both in vitro and in vivo, along with the molecular mechanism of action. METHODS: Quercetin treatment at various concentrations was examined in combination with Cisplatin, taxol, Pirarubicin and 5-Fu in human epithelial ovarian cancer C13* and SKOV3 cells. CCK8 assay and Annexin V assay were for cell viability and apoptosis analysis, immunofluorescence assay, DCFDA staining and realtime PCR were used for reactive oxygen species (ROS-induced injury detection and endogenous antioxidant enzymes expression. Athymic BALB/c-nu nude mice were injected with C13*cells to obtain a xenograft model for in vivo studies. Immunohistochemical analysis was carried out to evaluate the ROS-induced injury and SOD1 activity of xenograft tumors. RESULTS: Contrary to the pro-apoptotic effect of high concentration (40 µM-100 µM of Quercetin, low concentrations (5 µM-30 µM of Quercetin resulted in varying degrees of attenuation of cytotoxicity of Cisplatin treatment when combined with Cisplatin. Similar anti-apoptotic effects were observed when Quercetin was combined with other anti-neoplastic agents: Taxol, Pirarubicin and 5-Fluorouracil (5-Fu. Low concentrations of Quercetin were observed to suppress ROS-induced injury, reduce intracellular ROS level and increase the expression of endogenous antioxidant enzymes, suggesting a ROS-mediated mechanism of attenuating anti-neoplastic drugs. In xenogeneic model, Quercetin led to a substantial reduction of therapeutic efficacy of Cisplatin along with enhancing the endogenous antioxidant enzyme expression and reducing ROS-induced damage in xenograft tumor tissue. CONCLUSION: Taken together, these data suggest that Quercetin at low concentrations

  3. Applying ligands profiling using multiple extended electron distribution based field templates and feature trees similarity searching in the discovery of new generation of urea-based antineoplastic kinase inhibitors.

    Directory of Open Access Journals (Sweden)

    Eman M Dokla

    Full Text Available This study provides a comprehensive computational procedure for the discovery of novel urea-based antineoplastic kinase inhibitors while focusing on diversification of both chemotype and selectivity pattern. It presents a systematic structural analysis of the different binding motifs of urea-based kinase inhibitors and the corresponding configurations of the kinase enzymes. The computational model depends on simultaneous application of two protocols. The first protocol applies multiple consecutive validated virtual screening filters including SMARTS, support vector-machine model (ROC = 0.98, Bayesian model (ROC = 0.86 and structure-based pharmacophore filters based on urea-based kinase inhibitors complexes retrieved from literature. This is followed by hits profiling against different extended electron distribution (XED based field templates representing different kinase targets. The second protocol enables cancericidal activity verification by using the algorithm of feature trees (Ftrees similarity searching against NCI database. Being a proof-of-concept study, this combined procedure was experimentally validated by its utilization in developing a novel series of urea-based derivatives of strong anticancer activity. This new series is based on 3-benzylbenzo[d]thiazol-2(3H-one scaffold which has interesting chemical feasibility and wide diversification capability. Antineoplastic activity of this series was assayed in vitro against NCI 60 tumor-cell lines showing very strong inhibition of GI(50 as low as 0.9 uM. Additionally, its mechanism was unleashed using KINEX™ protein kinase microarray-based small molecule inhibitor profiling platform and cell cycle analysis showing a peculiar selectivity pattern against Zap70, c-src, Mink1, csk and MeKK2 kinases. Interestingly, it showed activity on syk kinase confirming the recent studies finding of the high activity of diphenyl urea containing compounds against this kinase. Allover, the new series

  4. Effect of implementing a cancer chemotherapy order form on prescribing habits for parenteral antineoplastics.

    Science.gov (United States)

    Pastel, D A; Fay, P; Lee, D

    1993-12-01

    Effect of implementing a cancer chemotherapy order form on prescribing habits for parenteral antineoplastics. The purpose of this study was to determine whether the use of a cancer chemotherapy order form improved prescriber inclusion of necessary prescription information to minimize errors for parenteral antineoplastics when compared to orders written on standard treatment-order forms. Standard treatment order forms and the newly developed chemotherapy order forms were examined for differences in completeness of the following 13 prescription components: diagnosis, height, weight, body surface area, start date and time, dosage (e.g., mg/m2), dose (mg), solution diluent (drips only) and volume (drips only), infusion rate (drips only), route (i.e., IV push or IV drip), frequency of administration, and total number of scheduled doses. The results demonstrate a significant improvement in completeness of necessary prescription information when cancer chemotherapy was ordered by physicians using a chemotherapy order form compared to a standard treatment order form. Importantly, the availability of various prescription components such as height, weight, and dosage may be used by the pharmacist to verify physicians' calculations of body surface area and dose and thereby reduce the chance of serious medication dosage errors. An additional benefit of the new form is a reduction in the time pharmacists spend clarifying orders.

  5. In Vivo Antineoplastic Effects of the NSAID Sulindac in an Oral Carcinogenesis Model.

    Science.gov (United States)

    Katoumas, Konstantinos; Nikitakis, Nikolaos; Perrea, Despina; Dontas, Ismene; Sklavounou, Alexandra

    2015-07-01

    The antineoplastic properties of the NSAID sulindac have long been studied. The purpose of this study was to explore sulindac's in vivo effects on oral squamous cell carcinoma (SCC) oncogenesis using the hamster cheek pouch oral carcinogenesis model (HOCM). Thirty Syrian golden hamsters were divided into three experimental and two control groups (n = 6 each). The animals' right buccal pouches were treated with carcinogen for 9 weeks in one experimental and one control group and for 14 weeks in all other three groups. The animals of two experimental groups received sulindac from the 1st week and those of the third experimental group from the 10th week. After the end of carcinogenesis, treated buccal pouches were removed and examined. In animals treated with carcinogen for 14 weeks, development of oral SCC and tumor volume were significantly lower in animals that received sulindac from the first week of the experiment. Oral SCC developing in animals that received sulindac were more frequently well differentiated compared with the control group. In animals treated with carcinogen for 9 weeks, the animals that received sulindac developed lower grade of epithelial dysplasia. Proliferation index Ki-67 and positivity for the antiapoptotic molecule survivin were lower in the animals that received sulindac. Treatment with sulindac appears to delays the progression of oral premalignant lesions to oral SCC in the HOCM, also resulting in smaller and better differentiated tumors. These in vivo antineoplastic effects may be related to sulindac's ability to decrease cell proliferation and to prevent survivin expression.

  6. Immune-dependent antineoplastic effects of cisplatin plus pyridoxine in non-small-cell lung cancer.

    Science.gov (United States)

    Aranda, F; Bloy, N; Pesquet, J; Petit, B; Chaba, K; Sauvat, A; Kepp, O; Khadra, N; Enot, D; Pfirschke, C; Pittet, M; Zitvogel, L; Kroemer, G; Senovilla, L

    2015-06-04

    cis-Diamminedichloroplatinum(II) (CDDP), which is mostly referred to as cisplatin, is a widely used antineoplastic. The efficacy of cisplatin can be improved by combining it with the vitamin B6 precursor pyridoxine. Here, we evaluated the putative synergistic interaction of CDDP with pyridoxine in the treatment of an orthotopic mouse model of non-small-cell lung cancer (NSCLC). CDDP and pyridoxine exhibited hyperadditive therapeutic effects. However, this synergy was only observed in the context of an intact immune system and disappeared when the otherwise successful drug combination was applied to the same NSCLC cancer implanted in the lungs of athymic mice (which lack T lymphocytes). Immunocompetent mice that had been cured from NSCLC by the combined regimen of CDDP plus pyridoxine became resistant against subcutaneous rechallenge with the same (but not with an unrelated) cancer cell line. In vitro, CDDP and pyridoxine did not only cause synergistic killing of NSCLC cells but also elicited signs of immunogenic cell death including an endoplasmic reticulum stress response and exposure of calreticulin at the surface of the NSCLC cells. NSCLC cells treated with CDDP plus pyridoxine in vitro elicited a protective anticancer immune response upon their injection into immunocompetent mice. Altogether, these results suggest that the combined regimen of cisplatin plus pyridoxine mediates immune-dependent antineoplastic effects against NSCLC.

  7. Taurolidine: a novel anti-neoplastic agent induces apoptosis of osteosarcoma cell lines.

    Science.gov (United States)

    Walters, Denise K; Muff, Roman; Langsam, Bettina; Gruber, Philipp; Born, Walter; Fuchs, Bruno

    2007-08-01

    Taurolidine, the active agent of Taurolin, is a broad spectrum anti-biotic that has been used for over 15 years for the treatment of severe surgical infections. Recently, taurolidine has been shown to possess anti-neoplastic properties in vitro and in vivo against a variety of cancers including ovarian, colon and prostate. In this study we assessed the cytotoxic activity of taurolidine against human osteosarcoma (OS) cell lines and normal human bone cells. Treatment with taurolidine inhibited the growth of all ten osteosarcoma cell lines tested and taurolidine was equally potent against cell lines with and without distinct genetic defects (i.e. p53, Rb). Moreover, taurolidine-induced growth inhibition was found to be associated with a dose dependent increase in the number of apoptotic cells and apoptosis was shown to be caspase-dependent. Taurolidine treatment was also found to inhibit adhesion of OS cell lines. Compared to OS cell lines, normal bone cells in primary culture were found to be less sensitive to the cytotoxic and anti-adhesive effects of taurolidine. These data indicate that taurolidine possesses potent anti-neoplastic activity against osteosarcoma cell lines and may have potential as a novel OS chemotherapeutic agent.

  8. Cancer incidence and adverse pregnancy outcome in registered nurses potentially exposed to antineoplastic drugs

    Directory of Open Access Journals (Sweden)

    Le Nhu D

    2010-09-01

    Full Text Available Abstract Background To determine the relationships of potential occupational exposure to antineoplastic drugs with cancer incidence and adverse pregnancy outcomes in a historical prospective cohort study of female registered nurses (RNs from British Columbia, Canada (BC. Methods Female RNs registered with a professional regulatory body for at least one year between 1974 and 2000 formed the cohort (n = 56,213. The identifier file was linked to Canadian cancer registries. An RN offspring cohort from 1986 was created by linkages with the BC Birth and Health Status Registries. Exposure was assessed by work history in oncology or cancer agencies (method 1 and by estimating weighted duration of exposure developed from a survey of pharmacists and nursing unit administrators of all provincial hospitals and treatment centers and the work history of the nurses (method 2. Relative risks (RR were calculated using Poisson regression for cancer incidence and odds ratios (OR were calculated for congenital anomaly, stillbirth, low birth weight, and prematurity incidence, with 95% confidence intervals. Results In comparison with other female RNs, method 1 revealed that RNs who ever worked in a cancer center or in an oncology nursing unit had an increased risk of breast cancer (RR = 1.83; 95% CI = 1.03 - 3.23, 12 cases and their offspring were at risk for congenital anomalies of the eye (OR = 3.46, 95% CI = 1.08 - 11.14, 3 cases. Method 2 revealed that RNs classified as having the highest weighted durations of exposure to antineoplastic drugs had an excess risk of cancer of the rectum (RR = 1.87, 95% CI = 1.07 - 3.29, 14 cases. No statistically significant increased risks of leukemia, other cancers, stillbirth, low birth weight, prematurity, or other congenital anomalies in the RNs' offspring were noted. Conclusions Female RNs having had potential exposure to antineoplastic drugs were not found to have an excess risk of leukemia, stillbirth, or congenital

  9. Surface wipe sampling for antineoplastic (chemotherapy) and other hazardous drug residue in healthcare settings: Methodology and recommendations.

    Science.gov (United States)

    Connor, Thomas H; Zock, Matthew D; Snow, Amy H

    2016-09-01

    Surface wipe sampling for various hazardous agents has been employed in many occupational settings over the years for various reasons such as evaluation of potential dermal exposure and health risk, source determination, quality or cleanliness, compliance, and others. Wipe sampling for surface residue of antineoplastic and other hazardous drugs in healthcare settings is currently the method of choice to determine surface contamination of the workplace with these drugs. The purpose of this article is to review published studies of wipe sampling for antineoplastic and other hazardous drugs, to summarize the methods in use by various organizations and researchers, and to provide some basic guidance for conducting surface wipe sampling for these drugs in healthcare settings.  Recommendations on wipe sampling methodology from several government agencies and organizations were reviewed. Published reports on wipe sampling for hazardous drugs in numerous studies were also examined. The critical elements of a wipe sampling program and related limitations were reviewed and summarized.  Recommendations and guidance are presented concerning the purposes of wipe sampling for antineoplastic and other hazardous drugs in the healthcare setting, technical factors and variables, sampling strategy, materials required, and limitations. The reporting and interpretation of wipe sample results is also discussed.  It is recommended that all healthcare settings where antineoplastic and other hazardous drugs are handled consider wipe sampling as part of a comprehensive hazardous drug "safe handling" program. Although no standards exist for acceptable or allowable surface concentrations for these drugs in the healthcare setting, wipe sampling may be used as a method to characterize potential occupational dermal exposure risk and to evaluate the effectiveness of implemented controls and the overall safety program. A comprehensive safe-handling program for antineoplastic drugs may

  10. Integrative review of factors related to the nursing diagnosis nausea during antineoplastic chemotherapy 1

    Science.gov (United States)

    Moysés, Aline Maria Bonini; Durant, Lais Corsino; de Almeida, Ana Maria; Gozzo, Thais de Oliveira

    2016-01-01

    ABSTRACT Objective: to identify factors related to the nursing diagnosis nausea among cancer patients undergoing chemotherapy. Method: integrative review conducted in four electronic databases (PUBMED, EMBASE, CINAHL and LILACS) using the key words: neoplasia, antineoplastic agents and nausea. Results: only 30 out of 1,258 papers identified met the inclusion criteria. The most frequent related factors were: being younger than 50 years old, motion sickness, being a woman, emetogenic potential of the chemotherapy, anxiety, conditioned stimulus, and expecting nausea after treatment. Conclusion: this review's findings, coupled with the incidence of nausea among cancer patients undergoing chemotherapy, reveal an important difference between evidence found and that used by NANDA International, Inc. Even though it provides an appropriate definition of related factors, it does not mention chemotherapy, despite the various studies addressing the topic using different designs and presenting various objectives and outcomes. PMID:27737380

  11. New, expanded, and modified use of approved antineoplastic agents in ovarian cancer.

    Science.gov (United States)

    Markman, Maurie

    2007-02-01

    Over the past several years, clinical research efforts in ovarian cancer employing a number of U.S. Food and Drug Administration (FDA)-approved antineoplastic agents have permitted the development of approaches that both improve the effectiveness and decrease the toxicities of systemic therapy of ovarian cancer. These initiatives, including prospective trials and retrospective examinations of large clinical experience, have involved agents previously approved by the FDA for use in ovarian cancer (e.g., cisplatin, paclitaxel, topotecan, and liposomal doxorubicin) and the development of new strategies for drugs approved for other malignant conditions (e.g., gemcitabine, docetaxel, etoposide, irinotecan, vinorelbine, and bevacizumab). It can be anticipated that future studies involving novel approved agents will further expand the oncologist's weapons against ovarian cancer.

  12. Relevance of the OCT1 transporter to the antineoplastic effect of biguanides.

    Science.gov (United States)

    Segal, Eric D; Yasmeen, Amber; Beauchamp, Marie-Claude; Rosenblatt, Joshua; Pollak, Michael; Gotlieb, Walter H

    2011-11-04

    Epidemiologic and laboratory data suggesting that metformin has antineoplastic activity have led to ongoing clinical trials. However, pharmacokinetic issues that may influence metformin activity have not been studied in detail. The organic cation transporter 1 (OCT1) is known to play an important role in cellular uptake of metformin in the liver. We show that siRNA knockdown of OCT1 reduced sensitivity of epithelial ovarian cancer cells to metformin, but interestingly not to another biguanide, phenformin, with respect to both activation of AMP kinase and inhibition of proliferation. We observed that there is heterogeneity between primary human tumors with respect to OCT1 expression. These results suggest that there may be settings where drug uptake limits direct action of metformin on neoplastic cells, raising the possibility that metformin may not be the optimal biguanide for clinical investigation.

  13. Recent Advances on Pathophysiology, Diagnostic and Therapeutic Insights in Cardiac Dysfunction Induced by Antineoplastic Drugs

    Directory of Open Access Journals (Sweden)

    Marilisa Molinaro

    2015-01-01

    Full Text Available Along with the improvement of survival after cancer, cardiotoxicity due to antineoplastic treatments has emerged as a clinically relevant problem. Potential cardiovascular toxicities due to anticancer agents include QT prolongation and arrhythmias, myocardial ischemia and infarction, hypertension and/or thromboembolism, left ventricular (LV dysfunction, and heart failure (HF. The latter is variable in severity, may be reversible or irreversible, and can occur soon after or as a delayed consequence of anticancer treatments. In the last decade recent advances have emerged in clinical and pathophysiological aspects of LV dysfunction induced by the most widely used anticancer drugs. In particular, early, sensitive markers of cardiac dysfunction that can predict this form of cardiomyopathy before ejection fraction (EF is reduced are becoming increasingly important, along with novel therapeutic and cardioprotective strategies, in the attempt of protecting cardiooncologic patients from the development of congestive heart failure.

  14. Evaluation of an electrolysis apparatus for inactivating antineoplastics in clinical wastewater.

    Science.gov (United States)

    Kobayashi, Toyohide; Hirose, Jun; Sano, Kouichi; Hiro, Naoki; Ijiri, Yoshio; Takiuchi, Hiroya; Tamai, Hiroshi; Takenaka, Hiroshi; Tanaka, Kazuhiko; Nakano, Takashi

    2008-06-01

    We recently reported a system for inactivating antineoplastics in which sodium hypochlorite is supplied by the electrolysis of sodium chloride solution. In this study, we designed an electrolysis apparatus for inactivating the cytotoxicity of antineoplastics in clinical wastewater using the system. The apparatus consists of an electrolysis cell with platinum-iridium electrodes, a pool tank, a circulating system for wastewater, a safety system for explosive gas and overflow, and an exhaust duct. The free chlorine concentration increased linearly up to 6500 mg l(-1), and pH also increased to 9.0-10.0 within 2h, when 0.9% sodium chloride solution was electrolyzed. We examined its efficacy with model and clinical wastewaters. The reciprocal of dilution factor for disappearance of cytotoxicity using Molt-4 cells was compared before and after electrolysis. In the model wastewater, that was 9.10 x 10(4) before electrolysis, and 3.56 x 10(2) after 2h of electrolysis. In the clinical wastewater (n=26), that was 6.90 x 10(3)-1.02 x 10(6) before electrolysis, and 1.08 x 10(2)-1.45 x 10(4) after 2h of electrolysis. Poisonous and explosive gases released by the electrolysis were measured; however, they were found to be negligible in terms of safety. The environmental load was evaluated by carbon dioxide generation as an index and it was found that the carbon dioxide generated by the electrolysis method was 1/70 lower than that by the dilution method with tap water. Moreover, the cost of the electrolysis method was 1/170 lower than that of the dilution method. This method was found to be both effective and economically valuable.

  15. Histology protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Tim D. Hewitson & Ian A. Darby (Eds Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 611, 2010 Pages: 230; € 83.15 ISBN: 978-1-60327-344-2 Impressive as it can sounds in the era that Biology see a clear dominance of reductionism with the idea that complexity can be disentagled more and more thanks to the use of molecular tools, the reader will remain fascinated by this slim and agile volume devoted to bring together what apparently are two separeted words: molecular biology and histology. Simply remembering to the youngest scientists.....

  16. Antineoplastic activity of taurolidine and its derivatives on human ex vivo glioblastoma bulk cells and cancer stem cells

    OpenAIRE

    Kälin, M B

    2010-01-01

    Despite multimodal therapy, patients suffering from glioblastoma (GBM) still have a dismal prognosis. The identification of cancer stem cells (CSC) in brain tumour tissue, yielded hope that the vulnerable target to combat GBM has been found. Several study groups worldwide concentrate nowadays on therapeutic strategies that effectively target CSC. Since in our laboratory has been revealed that taurolidine, a derivate of the amino acid taurin, displays a potent antineoplastic effect in human gl...

  17. Antineoplastic Activities of MT81 and Its Structural Analogue in Ehrlich Ascites Carcinoma-Bearing Swiss Albino Mice

    OpenAIRE

    Sujata Maiti Choudhury; Malaya Gupta; Upal Kanti Majumder

    2010-01-01

    Many fungal toxins exhibit in vitro and in vivo antineoplastic effects on various cancer cell types. Luteoskyrin, a hydroxyanthraquinone has been proved to be a potent inhibitor against Ehrlich ascites tumor cells. The comparative antitumor activity and antioxidant status of MT81 and its structural analogue [Acetic acid-MT81 (Aa-MT81)] having polyhydroxyanthraquinone structure were assessed against Ehrlich ascites carcinoma (EAC ) tumor in mice. The in vitro cytotoxicity was measured by the v...

  18. Drug interactions between antineoplastic and antidepressant agents: analysis of patients seen at an oncology clinic at a general hospital

    Directory of Open Access Journals (Sweden)

    Camila de Araújo Reinert

    2015-06-01

    Full Text Available Objectives: To determine the prevalence of depressive symptoms among oncology patients and identify simultaneous use of antineoplastic and antidepressant agents.Methods: This was a cross-sectional study that interviewed 56 oncology patients using two data collection instruments: a questionnaire covering clinical and sociodemographic data and the Beck Depression Inventory-II (BDI-II, for assessment of depressive symptoms. For data analysis, descriptive statistics were used to determine the prevalence of depressive symptoms and the chi-square test was used to evaluate associations between sociodemographic and clinical variables and depressive symptoms.Results: A 26.7% (15 patients prevalence of depression was detected. Just eight of these 15 patients (53.3% were receiving treatment for depression. In the sample as a whole, 13 of the patients interviewed (23.2% were taking antidepressants and 11 of these 13 patients (19.6% were taking antidepressive and antineoplastic agents simultaneously. A total of five (8.9% of the sample contraindicated drug interactions were detected.Conclusions:Depressive symptoms are more prevalent among cancer patients than in the general population, but they are generally under-diagnosed and under-treated. Simultaneous use of antidepressant and antineoplastic agents is common and so, in order to reduce the number of harmful adverse effects, possible drug interactions must be identified before antidepressants are prescribed to cancer patients.

  19. Antineoplastic effects of the DNA methylation inhibitor hydralazine and the histone deacetylase inhibitor valproic acid in cancer cell lines

    Directory of Open Access Journals (Sweden)

    Candelaria Myrna

    2006-01-01

    Full Text Available Abstract Background Among the epigenetic alterations occurring in cancer, DNA hypermethylation and histone hypoacetylation are the focus of intense research because their pharmacological inhibition has shown to produce antineoplastic activity in a variety of experimental models. The objective of this study was to evaluate the combined antineoplastic effect of the DNA methylation inhibitor hydralazine and the histone deacetylase inhibitor valproic acid in a panel of cancer cell lines. Results Hydralazine showed no growth inhibitory effect on cervical, colon, breast, sarcoma, glioma, and head & neck cancer cell lines when used alone. On the contrary, valproic acid showed a strong growth inhibitory effect that is potentiated by hydralazine in some cell lines. Individually, hydralazine and valproic acid displayed distinctive effects upon global gene over-expression but the number of genes over-expressed increased when cells were treated with the combination. Treatment of HeLa cells with hydralazine and valproic acid lead to an increase in the cytotoxicity of gemcitabine, cisplatin and adriamycin. A higher antitumor effect of adriamycin was observed in mice xenografted with human fibrosarcoma cells when the animals were co-treated with hydralazine and valproic acid. Conclusion Hydralazine and valproic acid, two widely used drugs for cardiovascular and neurological conditions respectively have promising antineoplastic effects when used concurrently and may increase the antitumor efficacy of current cytotoxic agents.

  20. Antineoplastic effects of 1,25(OH)2D3 and its analogs in breast, prostate and colorectal cancer.

    Science.gov (United States)

    Leyssens, Carlien; Verlinden, Lieve; Verstuyf, Annemieke

    2013-04-01

    The active form of vitamin D3, 1,25-dihydroxyvitamin D3 (1,25(OH)2D3), is mostly known for its importance in the maintenance of calcium and phosphate homeostasis. However, next to its classical effects on bone, kidney and intestine, 1,25(OH)2D3 also exerts antineoplastic effects on various types of cancer. The use of 1,25(OH)2D3 itself as treatment against neoplasia is hampered by its calcemic side effects. Therefore, 1,25(OH)2D3-derived analogs were developed that are characterized by lower calcemic side effects and stronger antineoplastic effects. This review mainly focuses on the role of 1,25(OH)2D3 in breast, prostate and colorectal cancer (CRC) and the underlying signaling pathways. 1,25(OH)2D3 and its analogs inhibit proliferation, angiogenesis, migration/invasion and induce differentiation and apoptosis in malignant cell lines. Moreover, prostaglandin synthesis and Wnt/b-catenin signaling are also influenced by 1,25(OH)2D3 and its analogs. Human studies indicate an inverse association between serum 25(OH)D3 values and the incidence of certain cancer types. Given the literature, it appears that the epidemiological link between vitamin D3 and cancer is the strongest for CRC, however more intervention studies and randomized placebo-controlled trials are needed to unravel the beneficial dose of 1,25(OH)2D3 and its analogs to induce antineoplastic effects.

  1. Examination of the kinetics of degradation of the antineoplastic drug 5-fluorouracil by chlorine and bromine.

    Science.gov (United States)

    Li, Wei; Tanumihardja, Jessica; Masuyama, Takaaki; Korshin, Gregory

    2015-01-23

    This study examined the degradation of the widely used antineoplastic drug 5-fluorouracil (5FU) by chlorine and bromine. 5FU was determined to interact readily with free chlorine and bromine but was stable in the presence of chloramine. The removal of 5FU followed a second-order kinetic pattern. Apparent rates (kapp) of 5FU removal by chlorine and bromine were strongly pH dependent and had maximum 14.8M(-1)s(-1) and 1.9×10(3)M(-1)s(-1)kapp values, respectively at pH 7. Modeling of the dependence of the kapp values vs. pH indicated the presence of a relatively acidic (pK 6.4 vs. 8.5 of 5FU per se) 5FU intermediate generated in the presence of halogen species. Spectrophotometric measurements confirmed the increased acidity of 5FU chlorination products and allowed proposing a degradation pathway of 5FU by chlorine. This pathway suggests that 5FU chlorination proceeds via chlorine incorporation at the 6th carbon in the heterocyclic ring of 5FU.

  2. A preliminary analysis of antineoplastic activity of parvovirus MVMp NS—1 proteins

    Institute of Scientific and Technical Information of China (English)

    SHENXIZHONG; HSIAOCHIENTSUNG; 等

    1997-01-01

    Human gastric cancer MKN-45 cells were transfected with pULB 3238,a plasmid carrying MVMp MS-1 gene with its original P4 promoter replaced by the glucocorticoid inducible promoter MMTV-LTR.After the integration and expression of NS-1 gene,some of the transfectants died,while others remained alive,but the growth features of survived cells were changed.For further study on the antineoplastic function of parvoviral NS-1 protein in vivo,transgenic mice carrying NS-1 genes were established by conventional method.Among 4 founders,one of them was found to be able to transmit the transgene to around 50% of their offsprings.RT-PCR was performed to indicate the expression of NS-1 gene in transgenic mice and its mRNA appeared in a variety of tissues.The expression of integrated NS-1 gene may correlate with the decreased incidence of tumor induced in vivo by chemical carcinogens.

  3. Adherence to oral antineoplastic agents by cancer patients: definition and literature review.

    Science.gov (United States)

    Bassan, F; Peter, F; Houbre, B; Brennstuhl, M J; Costantini, M; Speyer, E; Tarquinio, C

    2014-01-01

    Since the 1990s, oral chemotherapy has been gaining ground as cancer treatment. This therapy seems to have few toxic effects and offers patients good quality of life. However, in addition to the fears the therapy might generate in patients, oral treatment raises a new issue, which, until now, has been marginal in this field: therapeutic observance or adherence. We investigated the research into adherence to oral chemotherapy among cancer patients published between 1990 and July 2013. Studies showed considerable diversity in terms of both the definition and measurement of adherence. As well, adherence to antineoplastic therapy is affected by the patient's understanding of the treatment and ability to remember information provided by the physician, treatment length and psychological distress. Our review of the few studies on adherence to anticancer drug treatment raises some questions that could be pursued in future research. In light of our findings, patients should receive 'therapy education' to help them and their support groups better understand the disease and its treatment and to achieve optimal health management and improved treatment effectiveness.

  4. Relevance of the OCT1 transporter to the antineoplastic effect of biguanides

    Energy Technology Data Exchange (ETDEWEB)

    Segal, Eric D.; Yasmeen, Amber; Beauchamp, Marie-Claude; Rosenblatt, Joshua [Division of Gynecologic Oncology, Jewish General Hospital, McGill University, Montreal, Quebec (Canada); Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Pollak, Michael [Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Department of Oncology, McGill University, Montreal, Quebec (Canada); Gotlieb, Walter H., E-mail: walter.gotlieb@mcgill.ca [Division of Gynecologic Oncology, Jewish General Hospital, McGill University, Montreal, Quebec (Canada); Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Department of Oncology, McGill University, Montreal, Quebec (Canada)

    2011-11-04

    Highlights: Black-Right-Pointing-Pointer siRNA knockdown of OCT1 reduced sensitivity of EOC cells to metformin, but not to another biguanide, phenformin. Black-Right-Pointing-Pointer Suppression of OCT1 also affects the activation of AMP kinase in response to metformin, but not to phenformin. Black-Right-Pointing-Pointer Direct actions of metformin may be limited by low OCT1 expression in EOC tumors. Black-Right-Pointing-Pointer Phenformin could be used as an alternative biguanide. -- Abstract: Epidemiologic and laboratory data suggesting that metformin has antineoplastic activity have led to ongoing clinical trials. However, pharmacokinetic issues that may influence metformin activity have not been studied in detail. The organic cation transporter 1 (OCT1) is known to play an important role in cellular uptake of metformin in the liver. We show that siRNA knockdown of OCT1 reduced sensitivity of epithelial ovarian cancer cells to metformin, but interestingly not to another biguanide, phenformin, with respect to both activation of AMP kinase and inhibition of proliferation. We observed that there is heterogeneity between primary human tumors with respect to OCT1 expression. These results suggest that there may be settings where drug uptake limits direct action of metformin on neoplastic cells, raising the possibility that metformin may not be the optimal biguanide for clinical investigation.

  5. Reversible posterior leukoencephalopathy syndrome and anti-neoplastic agents: a review

    Directory of Open Access Journals (Sweden)

    Farheen M. Shah-Khan

    2011-12-01

    Full Text Available Reversible Posterior Leukoencephalopathy Syndrome (RPLS is a well recognized entity with a variety of benign and malignant conditions. Recently it has been found to be associated with the use of anti-neoplastic agents including targeted therapies. RPLS occurs rapidly with the use of some drugs and more slowly with others. Combined therapies are associated with a more frequent and more rapid presentation. This review was based on a literature search for English Language articles concerning RPLS and chemotherapeutic agents published from June 1996 to March 2007. We used the PubMed database with keywords: “RPLS”, “Posterior reversible encephalopathy syndrome”, “(PRES”, “Chemotherapy” and “MRI”. This syndrome has classical Clinical-Radiologic features that are easy to recognize. Early recognition and withdrawal of the offending agent is all that is needed in most cases. This review highlights the features of the syndrome. It draws our attention to an entity which is being more frequently recognized and whose exact pathologic mechanisms need to be further studied. This syndrome is associated with the use of neurotoxic as well as non-neurotoxic agents and usually runs a benign course if there is an early diagnosis and management.

  6. Significance of targeting polyamine metabolism as an antineoplastic strategy: unique targets for polyamine analogues.

    Science.gov (United States)

    Casero, Robert A; Frydman, Benjamin; Stewart, Tracy Murray; Woster, Patrick M

    2005-01-01

    The polyamines, putrescine, spermidine, and spermine, are naturally occurring polycationic alkylamines that are absolutely required for eukaryotic cell growth. Importantly, the polyamine metabolic pathway, as well as the requirement of polyamines for cell growth, is frequently dysregulated in cancer cells, thus providing a unique set of targets for therapeutic intervention. Ornithine decarboxylase (ODC), a rate-limiting enzyme in polyamine biosynthesis, is frequently up-regulated in preneoplastic cells, and has been implicated as an oncogene in multiple tumor types. Several model systems have demonstrated that inhibition of ODC's enzymatic activity and down-regulation of its expression are rational strategies for both chemotherapy and chemoprevention. Specific inhibitors of ODC, most notably 2-difluoromethylornithine (DFMO), have been used experimentally to validate polyamine metabolism as an antineoplastic strategy. However, multiple biochemical and clinical limitations to these ODC-targeting strategies minimize their value as therapeutic tools. Included among these limitations are poor bioavailability of the inhibitor, and the compensatory up-regulation of polyamine metabolism and transport that allow tumor cells to escape the growth inhibitory effects of blockers specifically targeting ODC. As a strategy to overcome the limitations of direct enzyme inhibition, several groups have pursued the design of polyamine analogues that specifically target the dysregulated polyamine metabolism found in tumors. These analogues have been developed specifically to target the specific polyamine transporter, thus competing with circulating natural polyamines. Additionally, most of the analogues examined thus far maintain the regulatory function of the natural polyamines, but are unable to functionally substitute for them in promoting growth. Specifically, individual analogues have demonstrated the ability to down-regulate each of the biosynthetic enzymes without causing

  7. Influence of Berberine on Cisplatin Antineoplastic Effect in A549 Cells

    Directory of Open Access Journals (Sweden)

    Guojun JIANG

    2015-08-01

    Full Text Available Background and objective Cisplatin is a standard first-line chemotherapeutic agents for treating advanced non-small cell lung cancer. Unfortunately, the clinical application cisplatin is restricted because it induces serious adverse reaction. The aim of this study is to investigate the influence and probable mechanism of berberine on cisplatin antineoplastic effect on lung cancer A549 cells. Methods The total Cx43 protein amount, localization of Cx43 on cell membrane, and gap junction function were observed after the A549 cells were treated with berberine. The influence of berberine on the antitumor action of cisplatin was detected by standard colony-forming assay. Protein kinase C (PKC protein, which regulates the gap junction, was subsequently determined. Results Berberine did not affect cell survival at concentrations of 0 μM to 10 μM in the A549 cells. The gap junction function between the cells was enhanced through increased Cx43 protein expression and localization of Cx43 on the membrane after berberine treatment. The intercellular dye coupling through gap junction increased when the cells exposed to 0.1 μM, 1 μM, 10 μM berberine [33.3% (P=0.002,3, 67.0% (P<0.001, 160.0% (P<0.001] compared withcontrols. This effect was associated with the PKC activity. The cisplatin-induced inhibition of colony growth was enhanced when berberine was combined with cisplatin. Conclusion Berberine can obviously increase the antitumor effect of cisplatin by enhancing the function of the gap junction possibly in A549 cells.

  8. Predictors of adherence to safe handling practices for antineoplastic drugs: A survey of hospital nurses.

    Science.gov (United States)

    Silver, Sharon R; Steege, Andrea L; Boiano, James M

    2016-01-01

    Despite growing awareness of the hazards of exposure to antineoplastic drugs (ADs), surveys continue to find incomplete adherence to recommended safe handling guidelines. A 2011 survey of healthcare workers presents an opportunity to examine factors associated with adherence among 1094 hospital nurses who administered ADs. Data for these hypothesis-generating analyses were taken from an anonymous, web-based survey of healthcare workers. Regression modeling was used to examine associations between a number of predictors (engineering controls, work practices, nurse perceptions, and nurse and hospital characteristics) and three outcomes reported by nurses: use of personal protective equipment (PPE); activities performed with gloves previously worn to administer ADs; and spills of ADs. Adherence to safe handling guidelines was not universal, and AD spills were reported by 9.5% of nurses during the week prior to the survey. Familiarity with safe handling guidelines and training in safe handling were associated with more reported PPE use. Nurse-perceived availability of PPE was associated with more reported PPE use and lower odds of reported spills. Use of closed system drug-transfer devices and luer-lock fittings also decreased the odds of self-reported AD spills, while more frequent AD administration increased the risk. AD administration frequency was also associated with performing more activities with gloves previously worn to administer ADs, and nurse perception of having adequate time for taking safety precautions with fewer such activities. The results suggest that training and familiarity with guidelines for safe handling of ADs, adequate time to adhere to guidelines, and availability of PPE and certain engineering controls are key to ensuring adherence to safe handling practices. Further assessment of training components and engineering controls would be useful for tailoring interventions targeting these areas.

  9. An evaluation of the anti-neoplastic activity of curcumin in prostate cancer cell lines

    Directory of Open Access Journals (Sweden)

    Camila B. Piantino

    2009-06-01

    Full Text Available OBJECTIVE: The aim of our study is to investigate the anti-neoplastic effect of curcumin in prostate cancer cell lines. Specifically, we are using the LNCaP cell line and another prostate cell line developed in our laboratory, PcBra1. The PcBra1 cells were derived from a localized, obstructive prostate cancer with a Gleason score of 9 (4+5. MATERIAL AND METHODS: A prostate cancer cell line was isolated from a localized, obstructive prostate cancer with a Gleason score of 9 (4+5, and it was characterized using immunohistochemistry. After six passages, the new cell line was treated with varying doses of curcumin: 10 µM, 25 µM or 50 µM. Apoptosis was detected by flow cytometry using Annexin V FITC. For comparison, the same experiment was performed using the well-established metastatic prostate cancer cell line, LNCaP. RESULTS: Increasing concentrations of curcumin promoted more apoptosis in the PcBra1 cells. Exposure to 10 and 25 µM curcumin induced apoptosis in 31.9% and 52.2% of cells, respectively. Late apoptosis was induced in 37% of cells after treatment with 10 µM curcumin and 35% of cells with a 25 µM treatment. Necrosis accounted for less than 10% of the death in these cells at those two concentrations. When curcumin was used at 50 µM, apoptosis was observed in 64.3% of the cells. Including late apoptosis and necrosis, 98.6% of the cells died in response to 50 µM curcumin. Results with the LNCaP cells were similar although late apoptosis was the main phenomenon at 25 µM. CONCLUSION: We have shown that curcumin acts on localized prostate cancer to induce apoptosis and may therefore be an option as a future therapeutic agent.

  10. Antineoplastic drugs determination by HPLC-HRMS(n) to monitor occupational exposure.

    Science.gov (United States)

    Dal Bello, Federica; Santoro, Valentina; Scarpino, Valentina; Martano, Chiara; Aigotti, Riccardo; Chiappa, Alberta; Davoli, Enrico; Medana, Claudio

    2016-07-01

    The purpose of this study was to develop a simple, direct, multiresidue highly specific procedure to evaluate the possible surface contamination of selected antineoplastic drugs in several hospital environment sites by using wipe test sampling. 5-fluorouracil (5-FU), carboplatin (C-Pt), cyclophosphamide (CYC), cytarabine (CYT), doxorubicin (DOX), gemcitabine (GEM), ifosfamide (IFO), methotrexate (MET), and mitomycin C (MIT) belong to very different chemical classes but show good ionization properties under electrospray ionization (ESI) conditions (negative ion mode for 5-FU and positive ion mode in all other cases). HPLC (high performance liquid chromatography) coupled with HRMS (high resolution mass spectrometry) appears to be the best technique for direct analysis of these analytes, because neither derivatization nor complex extraction procedure for polar compounds in samples is requested prior the analysis. Sample preparation was limited to washing wipes with appropriate solvents. Chromatographic separation was achieved on C18 reversed phase columns. The HPLC-HRMS/MS method was validated in order to obtain robustness, sensitivity and selectivity. LLOQ (lower limit of quantitation) values provided a sensitivity good enough to evidence the presence of the drugs in a very low concentration range (<1 pg/cm(2) ). The method was applied for a study of real wipe tests coming from many areas from a hospital showing some positive samples. The low quantitation limits and the high specificity due to the high resolution approach of the developed method allowed an accurate description of the working environment that can be used to define procedural rules to limit working place contamination to a minimum. Copyright © 2015 John Wiley & Sons, Ltd.

  11. Somatostatin Enhances the Antineoplastic Effects of Tamoxifen on Breast Carcinoma in Vitro

    Institute of Scientific and Technical Information of China (English)

    ZENGXizhi; YAOZhenxiang

    2002-01-01

    Objective:To study the antineoplastic effects of tamoxifen(TAM) in combination with a somatostain analogue(octreotide,OCT) on breast cancer.Methods:Estrogen receptor(ER)-positive(MCF-7) and ER-negative(MDA-MB-435S)human breast carcinoma cell lines were treated with TAM or OCT,or combination of both agents in vitro.Cell proliferation was evaluated by MTT assay,distribu-tion of cell cycle and rate of apoptosis were detemined by flow cytometry.Results:The inhibitory effect of OCT or TAM on proliferation of MCF-7 cells was associated with cell arrest in G0/G1 phase and induction of apoptosis.The inhibitory effect on proliferation of MCF-7 cells enhanced when treatment of TAM combined with OCT.The increased rate of apoptosis induced by combination of TAM and OCT was much higher than use of either TAM or OCT alone.TAM or OCT also had weak inhibitory effect on MDA-MB435S cell.The cells were arrested at S phase by TAM and at G0/G1 phase by OCT, but the induction of apoptosis was not identified.However,the rate of apoptosis was 22.7% if combined treatment of TAM and OCT applied.Conclusion:TAM and OCT can synergistically inhibit proliferation and induce apoptosis of ER-positive and ER-negative breast cancer cells.The synergism of TAM and OCT may be of interest in the clinical treatment of breast carcinoma.

  12. The antineoplastic antibiotic taurolidine promotes lung and liver metastasis in two syngeneic osteosarcoma mouse models and exhibits severe liver toxicity.

    Science.gov (United States)

    Arlt, Matthias J E; Walters, Denise K; Banke, Ingo J; Steinmann, Patrick; Puskas, Gabor J; Bertz, Josefine; Rentsch, Katharina M; Ehrensperger, Felix; Born, Walter; Fuchs, Bruno

    2012-09-01

    Osteosarcoma (OS) is the most frequent primary bone tumor. Despite multiagent neoadjuvant chemotherapy, patients with metastatic disease have a poor prognosis. Moreover, currently used chemotherapeutics have severe toxic side effects. Thus, novel agents with improved antimetastatic activity and reduced toxicity are needed. Taurolidine, a broad-spectrum antimicrobial, has recently been shown to have antineoplastic properties against a variety of tumors and low systemic toxicity. Consequently, we investigated in our study the antineoplastic potential of taurolidine against OS in two different mouse models. Although both OS cell lines, K7M2 and LM8, were sensitive for the compound in vitro, intraperitoneal application of taurolidine failed to inhibit primary tumor growth. Moreover, it enhanced the metastatic load in both models 1.7- to 20-fold and caused severe liver deformations and up to 40% mortality. Thus, systemic toxicity was further investigated in tumor-free mice histologically, by electron microscopy and by measurements of representative liver enzymes. Taurolidine dose-dependent fibrous thickening of the liver capsule and adhesions and atrophies of the liver lobes were comparable in healthy and tumor-bearing mice. Liver toxicity was further indicated by up to eightfold elevated levels of the liver enzymes alanine transaminase, aspartate transaminase and GLDH in the circulation. Ultrastructural analysis of affected liver tissue showed swollen mitochondria with cristolysis and numerous lipid vacuoles in the cytoplasm of hepatocytes. The findings of our study question the applicability of taurolidine for OS treatment and may suggest the need for caution regarding the widespread clinical use of taurolidine as an antineoplastic agent.

  13. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...... of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....

  14. Synthesis and in vitro antineoplastic evaluation of silver nanoparticles mediated by Agrimoniae herba extract

    Directory of Open Access Journals (Sweden)

    Qu D

    2014-04-01

    Full Text Available Ding Qu,1,* Wenjie Sun,1,2,* Yan Chen,1,2 Jing Zhou,1 Congyan Liu11Key Laboratory of New Drug Delivery System of Chinese Materia Medica, Jiangsu Provincial Academy of Chinese Medicine, 2Department of Pharmaceutics, School of Pharmacy, Nanjing University of Chinese Medicine, Nanjing, People's Republic of China*These authors contributed equally to this workAbstract: A rapid synthesis of silver nanoparticles (AgNPs using Agrimoniae herba extract as reducing agent and stabilizer (A. herba-conjugated AgNPs [AH-AgNPs] were designed, characterized, and evaluated for antitumor therapy feasibility. In this study, critical factors in the preparation of silver nanoparticles, including extraction time, reaction temperature, the concentration of AgNO3, and A. herba extract amount, were investigated using ultraviolet-visible spectroscopy. AH-AgNPs with well-defined spherical shape, homogeneous distributional small size (30.34 nm, narrow polydispersity index (0.142, and high negative zeta potential (−36.8 mV were observed by transmission electron microscopy and dynamic light scattering. Furthermore, the results of X-ray diffraction and Fourier-transform infrared spectroscopy further indicated successful preparation of AH-AgNPs. Acceptable long-term storage stability of AH-AgNPs was also confirmed. More importantly, AH-AgNPs displayed significantly higher antiproliferative effect against a human lung carcinoma cell line (A549 cells compared with A. herba extract and bare AgNPs prepared by sodium citrate. The half-maximal inhibitory concentrations of AH-AgNPs, bare AgNPs, and A. herba extract were 38.13 µg · mL-1, 184.87 µg · mL-1, and 1.147 × 104 µg · mL-1, respectively. It is suggested that AH-AgNPs exhibit a strong antineoplastic effect on A549 cells, pointing to feasibility of antitumor treatment in the future.Keywords: rapid synthesis, Agrimoniae herba extract, silver nanoparticles, A549 cells, antitumor

  15. The antineoplastic effect of carnosine is accompanied by induction of PDK4 and can be mimicked by L-histidine.

    Science.gov (United States)

    Letzien, Ulrike; Oppermann, Henry; Meixensberger, Jürgen; Gaunitz, Frank

    2014-04-01

    Carnosine (β-alanyl-L-histidine) is a naturally occurring dipeptide that shows antineoplastic effects in cell culture as well as in animal experiments. Since its mode of action and the targets at the molecular level have not yet been elucidated, we performed qRT-PCR experiments with RNA isolated from glioblastoma cell lines treated with carnosine, β-alanine, L-alanine, L-histidine and the dipeptide L-alanine-L-histidine. The experiments identified a strong induction of expression of the gene encoding pyruvate dehydrogenase 4 (PDK4) under the influence of carnosine and L-histidine, but not by the other substances employed. In addition, inhibition of cell viability was only detected in cells treated with carnosine and L-histidine, with the latter showing a significantly stronger effect than carnosine. Since the tumor cells expressed the tissue form of carnosinase (CN2) but almost no serum carnosinase (CN1), we conclude that cleavage by CN2 is a prerequisite for the antineoplastic effect of carnosine. In addition, enhanced expression of PDK4 under the influence of carnosine/L-histidine opens a new perspective for the interpretation of the ergogenic potential of dietary β-alanine supplementation and adds a new contribution to a growing body of evidence that single amino acids can regulate key metabolic pathways important in health and disease.

  16. Research on Protocol Migration

    Institute of Scientific and Technical Information of China (English)

    汪芸; 顾冠群; 等

    1996-01-01

    This paper elaborates the concept and model of protocol migration in network interconnection.Migration strategies and principles are discussed and several cases are studied in detail which show the basic procedure and techniques used in protocol migration.

  17. Topological Design of Protocols

    CERN Document Server

    Jaffe, Arthur; Wozniakowski, Alex

    2016-01-01

    We give a topological simulation for tensor networks that we call the two-string model. In this approach we give a new way to design protocols, and we discover a new multipartite quantum communication protocol. We introduce the notion of topologically compressed transformations. Our new protocol can implement multiple, non-local compressed transformations among multi-parties using one multipartite resource state.

  18. Postulating a dermal pathway for exposure to anti-neoplastic drugs among hospital workers. Applying a conceptual model to the results of three workplace surveys

    NARCIS (Netherlands)

    Kromhout, H.; Hoek, F.; Uitterhoeve, R.; Huijbers, R.; Overmars, R.F.; Anzion, R.; Vermeulen, R.

    2000-01-01

    Dermal exposure to anti-neoplastic drugs has been suggested as a potentially important route of exposure of hospital workers. Three small-scale workplace surveys were carried out in several hospitals focusing on contamination by leakage from IV infusion systems; contamination by spilled urine of pat

  19. The Hepatoprotection Provided by Taurine and Glycine against Antineoplastic Drugs Induced Liver Injury in an Ex Vivo Model of Normothermic Recirculating Isolated Perfused Rat Liver

    Directory of Open Access Journals (Sweden)

    Reza Heidari

    2016-03-01

    Full Text Available Taurine (2-aminoethane sulfonic acid is a non-protein amino acid found in high concentration in different tissues. Glycine (Amino acetic acid is the simplest amino acid incorporated in the structure of proteins. Several investigations indicate the hepatoprotective properties of these amino acids. On the other hand, antineoplastic agents-induced serum transaminase elevation and liver injury is a clinical complication. The current investigation was designed to screen the possible hepatoprotective properties of taurine and glycine against antineoplastic drugs-induced hepatic injury in an ex vivo model of isolated perfused rat liver. Rat liver was perfused with different concentration (10 μM, 100 μM and 1000 μM of antineoplastic drugs (Mitoxantrone, Cyclophosphamide, Cisplatin, 5 Fluorouracil, Doxorubicin and Dacarbazine via portal vein. Taurine and glycine were administered to drug-treated livers and liver perfusate samples were collected for biochemical measurements (ALT, LDH, AST, and K+. Markers of oxidative stress (reactive oxygen species formation, lipid peroxidation, total antioxidant capacity and glutathione were also assessed in liver tissue. Antineoplastic drugs caused significant pathological changes in perfusate biochemistry. Furthermore, markers of oxidative stress were significantly elevated in drug treated livers. It was found that taurine (5 and 10 mM and glycine (5 and 10 mM administration significantly mitigated the biomarkers of liver injury and attenuated drug induced oxidative stress. Our data indicate that taurine and glycine supplementation might help as potential therapeutic options to encounter anticancer drugs-induced liver injury.

  20. The antibacterial substance taurolidine exhibits anti-neoplastic action based on a mixed type of programmed cell death.

    Science.gov (United States)

    Stendel, Ruediger; Biefer, Hector Rodriguez Cetina; Dékány, Gabriela Marta; Kubota, Hisashi; Münz, Christian; Wang, Sheng; Mohler, Hanns; Yonekawa, Yasuhiro; Frei, Karl

    2009-02-01

    The antibacterial amino-acid derivative taurolidine (TAU) has been recently shown to exhibit anti-neoplastic activity based on a mechanism, which is still unknown in detail. Cytotoxicity and clonogenic assays were performed and the impact of apoptosis modulators, a radical scavenger, autophagy inhibitors, silencing of apoptosis inducing actor (AIF) and cytochrome-c (Cyt-C) by siRNA, and knockdown of autophagy related genes were evaluated in vitro. The intracellular ATP-content, release of AIF and Cyt-C, and DNA-laddering were investigated. This study could demonstrate cell killing, inhibition of proliferation, and inhibition or prevention of colony formation in human glioma cell lines and ex vivo glioblastoma cells after incubation with TAU. This effect is based on the induction of a mixed type of programmed cell death with the main preference of autophagy, and involvement of senescence, necroptosis and necrosis. This mechanism of action may open a new approach for therapeutic intervention.

  1. Regulatory and logistical issues influencing access to antineoplastic and supportive care medications for children with cancer in developing countries.

    Science.gov (United States)

    Wiernikowski, John T; MacLeod, Stuart

    2014-08-01

    Globally there are numerous impediments, both logistical, regulatory and more recently global drug shortages, hindering pediatric access to therapeutic drugs of all types. Efforts to reduce barriers are ongoing and are especially important in low and middle income countries and for children requiring treatment of conditions such as those encountered in pediatric oncology characterized by the risk of life threatening treatment failures. Progress has been made through the efforts of the World Health Organization and regulators in the US and Europe to encourage the development of therapeutic agents for use in pediatrics and measures taken have fostered the availability of stronger pediatric data to guide therapeutic decisions. Nonetheless, pharmaceuticals remain a global commodity, subject to regulation by the World Trade Organization and this has often had detrimental effects in low and middle income countries. This article emphasizes the need for closer international collaboration to address the barriers currently impeding access to antineoplastic and supportive care medicines for children.

  2. Antineoplastic Activities of MT81 and Its Structural Analogue in Ehrlich Ascites Carcinoma-Bearing Swiss Albino Mice

    Directory of Open Access Journals (Sweden)

    Sujata Maiti Choudhury

    2010-01-01

    Full Text Available Many fungal toxins exhibit in vitro and in vivo antineoplastic effects on various cancer cell types. Luteoskyrin, a hydroxyanthraquinone has been proved to be a potent inhibitor against Ehrlich ascites tumor cells. The comparative antitumor activity and antioxidant status of MT81 and its structural analogue [Acetic acid-MT81 (Aa-MT81] having polyhydroxyanthraquinone structure were assessed against Ehrlich ascites carcinoma (EAC tumor in mice. The in vitro cytotoxicity was measured by the viability of EAC cells after direct treatment of the said compounds. In in vivo study, MT81 and its structural analogue were administered (i.p. at the two different doses (5, 7 mg MT81; 8.93, 11.48 mg Aa-MT81/kg body weight for 7 days after 24 hrs. of tumor inoculation. The activities were assessed using mean survival time (MST, increased life span (ILS, tumor volume, viable tumor cell count, peritoneal cell count, protein percentage and hematological parameters. Antioxidant status was determined by malondialdehyde (MDA and reduced glutathione (GSH content, and by the activity of superoxide dismutase (SOD and catalase (CA T. MT81 and its structural analogues increased the mean survival time, normal peritoneal cell count. They decreased the tumor volume, viable tumor cell count, hemoglobin percentage and packed cell volume. Differential counts of WBC, total counts of RBC & WBC that altered by EAC inoculation, were restored in a dose-dependent manner. Increased MDA and decreased GSH content and reduced activity of SOD, and catalase in EAC bearing mice were returned towards normal after the treatment of MT81 and its structural analogue. Being less toxic than parent toxin MT81, the structural analogue showed more prominent antineoplastic activities against EAC cells compared to MT81. At the same time, both compounds exhibit to some extent antioxidant potential for the EAC-bearing mice.

  3. Grape Seed Procyanidin Extract Mediates Antineoplastic Effects against Lung Cancer via Modulations of Prostacyclin and 15-HETE Eicosanoid Pathways.

    Science.gov (United States)

    Mao, Jenny T; Smoake, Jane; Park, Heesung K; Lu, Qing-Yi; Xue, Bingye

    2016-12-01

    Grape seed procyanidin extract (GSE) has been reported to exert antineoplastic properties via the inhibition of cyclooxygenase-2 (COX-2)/prostaglandin E2 (PGE2) eicosanoid pathways. In addition, ample data link carcinogenesis to inflammatory events involving other major eicosanoid metabolic pathways, including prostacyclin (PGI2) and 15-hydroxyeicosatetraenoic acid (15-HETE). We therefore evaluated the effects of GSE on prostacyclin synthase (PTGIS)/PGI2 and 15-lipoxigenase-2 (15-LOX-2)/15-HETE productions by human lung premalignant and malignant cells and correlated the findings with antiproliferative or proapoptotic effects of GSE. The effects of GSE on PGI2 and 15-HETE productions by human bronchoalveolar lavage (BAL) cells ex vivo were also determined. We further evaluated the bioactivity of oral administration of leucoselect phytosome (a standardized GSE) in the lungs of subjects participating in a lung cancer chemoprevention trial, by comparing the antiproliferative effects of coculturing matched pre- versus posttreatment BAL fluids with lung premalignant and malignant cells. GSE significantly increased PGI2 (as measured by 6-keto PGF1α) and 15-HETE productions by these cells. Transfections of PTGIS or 15-LOX-2-specific siRNA partially abrogated the antiproliferative or proapoptotic effects of GSE in lung premalignant and malignant cells, respectively. GSE also increased PTGIS and inhibition of caspase-3, and transfection of 15-LOX-2 siRNA abrogated the GSE-induced apoptosis in A549 cells. In addition, culture supernatants from ex vivo GSE-treated baseline BAL cells, as well as BAL fluids from subjects treated with leucoselect phytosome, significantly decreased proliferations of lung premalignant and malignant cells. Our findings support the continued investigation of GSE as an anti-neoplastic and chemopreventive agent against lung cancer. Cancer Prev Res; 9(12); 925-32. ©2016 AACR.

  4. PDGF-A promoter and enhancer elements provide efficient and selective antineoplastic gene therapy in multiple cancer types.

    Science.gov (United States)

    Mishra, A; Ormerod, A K; Cibull, M L; Spear, B T; Kraner, S D; Kaetzel, D M

    2009-04-01

    Development of antineoplastic gene therapies is impaired by a paucity of transcription control elements with efficient, cancer cell-specific activity. We investigated the utility of promoter (AChP) and 5'-distal enhancer (ACE66) elements from the platelet-derived growth factor-A (PDGF-A) gene, which are hyperactive in many human cancers. Efficacy of these elements was tested in multiple tumor cell lines, both in cell culture and as tumor explants in athymic nude mice. Plasmid and viral vectors were constructed with the AChP promoter alone or in fusion with three copies of the ACE66 enhancer for expression of the prototype suicide gene, thymidine kinase (TK). ACE/AChP and AChP cassettes elicited ganciclovir (GCV)-induced cytotoxicity in multiple tumor cell lines. The ACE enhancer element also exhibited synergism with placental and liver-specific promoter elements. An adenovirus containing the AChP-TK cassette produced striking increases in GCV sensitivity in cultured tumor cell lines, as well as GCV-induced regression of U87 MG glioblastoma explants in vivo. TK expression was distributed throughout tumors receiving the therapeutic virus, whereas TdT-mediated dUTP nick end labeling (TUNEL) analysis revealed numerous regions undergoing apoptosis. Vascularization and reticulin fiber networks were less pronounced in virus-GCV-treated tumors, suggesting that both primary and stromal cell types may have been targeted. These studies provide proof-of-principle for utility of the PDGF-A promoter and ACE66 enhancer in antineoplastic gene therapy for a diverse group of human cancers.

  5. Multiparty Quantum Cryptographic Protocol

    Institute of Scientific and Technical Information of China (English)

    M. Ramzan; M. K. Khan

    2008-01-01

    We propose a multiparty quantum cryptographic protocol. Unitary operators applied by Bob and Charlie, on their respective qubits of a tripartite entangled state encoding a classical symbol that can be decoded at Alice's end with the help of a decoding matrix. Eve's presence can be detected by the disturbance of the decoding matrix. Our protocol is secure against intercept-resend attacks. Furthermore, it is efficient and deterministic in the sense that two classical bits can be transferred per entangled pair of qubits. It is worth mentioning that in this protocol, the same symbol can be used for key distribution and Eve's detection that enhances the effciency of the protocol.

  6. Transport Protocol Throughput Fairness

    Directory of Open Access Journals (Sweden)

    Saleem Bhatti

    2009-11-01

    Full Text Available Interest continues to grow in alternative transport protocols to the Transmission Control Protocol (TCP. These alternatives include protocols designed to give greater efficiency in high-speed, high-delay environments (so-called high-speed TCP variants, and protocols that provide congestion control without reliability. For the former category, along with the deployed base of ‘vanilla’ TCP – TCP NewReno – the TCP variants BIC and CUBIC are widely used within Linux: for the latter category, the Datagram Congestion Control Protocol (DCCP is currently on the IETF Standards Track. It is clear that future traffic patterns will consist of a mix of flows from these protocols (and others. So, it is important for users and network operators to be aware of the impact that these protocols may have on users. We show the measurement of fairness in throughput performance of DCCP Congestion Control ID 2 (CCID2 relative to TCP NewReno, and variants Binary Increase Congestion control (BIC, CUBIC and Compound, all in “out-of-the box” configurations. We use a testbed and endto- end measurements to assess overall throughput, and also to assess fairness – how well these protocols might respond to each other when operating over the same end-to-end network path. We find that, in our testbed, DCCP CCID2 shows good fairness with NewReno, while BIC, CUBIC and Compound show unfairness above round-trip times of 25ms.

  7. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  8. Synthesis and Anchoring of Antineoplastic Ferrocene and Phthalocyanine Derivatives on Water-Soluble Polymeric Drug Carriers Derived from Lysine and Aspartic Acid

    Science.gov (United States)

    Maree, M. David; Neuse, Eberhard W.; Erasmus, Elizabeth; Swarts, Jannie C.

    2008-01-01

    The general synthetic strategy towards water-soluble biodegradable drug carriers and the properties that they must have are discussed. The syntheses of water-soluble biodegradable copolymers of lysine and aspartic acid as potential drug-delivering devices, having amine-functionalised side chains are then described. Covalent anchoring of carboxylic acid derivatives of the antineoplastic ferrocene and photodynamically active phthalocyanine moieties to the amine-containing drug carrier copolymers under mild coupling conditions has been achieved utilising the coupling reagent O-benzotriazolyl-N,N,N′,N′-tetramethyluronium hexafluorophosphate to promote formation of the biodegradable amide bond. Even though the parent antineoplastic ferrocene and phthalocyanine derivatives are themselves insoluble in water at pH < 7, the new carrier-drug conjugates that were obtained are well water-soluble. PMID:18288243

  9. Efficacy, safety, and lack of interactions with the use of raltegravir in HIV-infected patients undergoing antineoplastic chemotherapy

    Directory of Open Access Journals (Sweden)

    Sara Bañón

    2014-11-01

    Full Text Available Introduction: Concomitant use of combination antiretroviral regimen (cART and cancer chemotherapy is difficult due to complex interactions and increased toxicity. Raltegravir could be an adequate option through its favourable drug-drug interaction profile. Methods: Prospective longitudinal study of HIV patients with cancer, AIDS related or not, undergoing chemotherapy. Patients without resistance or previous failure were switched or initiated raltegravir plus two nucleoside analogues. Plasma trough levels of raltegravir were measured. Results: Overall, 28 patients receiving a raltegravir-based regimen (4 naive with tenofovir-emtricitabine (18 cases or abacavir-lamivudine (10 cases were included. Mean age was 46.2 years (IQR, 39–52.7, and 79% were male. Median time of HIV was 201.7 months, CD4+ nadir was 268 cells/mm3, and 75% had previous AIDS. At the diagnosis of neoplasia, 17 were on protease inhibitors and 4 with efavirenz. Ten patients had a non-HIV-related cancer (three breast, two pancreatic, one Ewing sarcoma, one myeloblastic leukemia, one melanoma, one parotid adenocarcinoma, one lung, and 18 had an HIV-related cancer (nine non-Hodgkin lymphoma, seven Hodgkin disease, two anal. Overall, 43% of patients received more than one line of chemotherapy, including antimetabolites in 12 patients (5-FU, capecitabine, methotrexate, gemcitabine, alkylating agents in 12 cases (ciclophosphamide, iphosphamide, vinca alkaloids in 20 patients (vincristine, vinblastine, vindesine, antitumor antibiotics in 16 cases (adriamycin, cisplatin o carboplatin in six and monoclonal antibodies in six patients (rituximab, trastuzumab, cetuximab. Six patients modified the doses of antineoplastic agents due to toxicity (four neutropenia, not related to raltegravir. During a median follow up of 12.7 patients-year in concomitant therapy, there was only 1 case of virological failure and no patient discontinued raltegravir. Plasma concentrations of raltegravir in eight

  10. Chemosensitivity assay in mice prostate tumor: Preliminary report of flow cytometry, DNA fragmentation, ion ratiometric methods of anti-neoplastic drug monitoring

    OpenAIRE

    2004-01-01

    Abstract Flow cytometry, DNA fragmentation, ion ratiomateric analysis and NMR peaks characterized drug chemosensitivity of antineoplastic drugs. Hypotheses were: 1. The chemosensitive effect of different cancer cell lines is characteristic; 2. DNA fragmentation, ion ratiometric analysis suggest apoptosis status of tumor cells. Methods PC-3 cell lines were compared with DU-145, LNCaP cell lines in culture for the [Na]i and [Ca]i ion sensing dyes, cell death, NMR peaks and apoptosis staining fo...

  11. Accelerator mass spectrometry analysis of {sup 14}C-oxaliplatin concentrations in biological samples and {sup 14}C contents in biological samples and antineoplastic agents

    Energy Technology Data Exchange (ETDEWEB)

    Toyoguchi, Teiko, E-mail: tteiko@med.id.yamagata-u.ac.jp [Department of Pharmacy, Yamagata University Hospital, 2-2-2 Iida-Nishi, Yamagata-shi, Yamagata 990-9585 (Japan); Kobayashi, Takeshi; Konno, Noboru; Shiraishi, Tadashi [Department of Pharmacy, Yamagata University Hospital, 2-2-2 Iida-Nishi, Yamagata-shi, Yamagata 990-9585 (Japan); Kato, Kazuhiro; Tokanai, Fuyuki [Department of Physics, Faculty of Science, Yamagata University, 1-4-12 Kojirakawa-machi, Yamagata-shi, Yamagata 990-8560 (Japan)

    2015-10-15

    Accelerator mass spectrometry (AMS) is expected to play an important role in microdose trials. In this study, we measured the {sup 14}C concentration in {sup 14}C-oxaliplatin-spiked serum, urine and supernatant of fecal homogenate samples in our Yamagata University (YU) – AMS system. The calibration curves of {sup 14}C concentration in serum, urine and supernatant of fecal homogenate were linear (the correlation coefficients were ⩾0.9893), and the precision and accuracy was within the acceptance criteria. To examine a {sup 14}C content of water in three vacuum blood collection tubes and a syringe were measured. {sup 14}C was not detected from water in these devices. The mean {sup 14}C content in urine samples of 6 healthy Japanese volunteers was 0.144 dpm/mL, and the intra-day fluctuation of {sup 14}C content in urine from a volunteer was little. The antineoplastic agents are administered to the patients in combination. Then, {sup 14}C contents of the antineoplastic agents were quantitated. {sup 14}C contents were different among 10 antineoplastic agents; {sup 14}C contents of paclitaxel injection and docetaxel hydrate injection were higher than those of the other injections. These results indicate that our quantitation method using YU-AMS system is suited for microdosing studies and that measurement of baseline and co-administered drugs might be necessary for the studies in low concentrations.

  12. Medicinal electronomics bricolage design of hypoxia-targeting antineoplastic drugs and invention of boron tracedrugs as innovative future-architectural drugs.

    Science.gov (United States)

    Hori, Hitoshi; Uto, Yoshihiro; Nakata, Eiji

    2010-09-01

    We describe herein for the first time our medicinal electronomics bricolage design of hypoxia-targeting antineoplastic drugs and boron tracedrugs as newly emerging drug classes. A new area of antineoplastic drugs and treatments has recently focused on neoplastic cells of the tumor environment/microenvironment involving accessory cells. This tumor hypoxic environment is now considered as a major factor that influences not only the response to antineoplastic therapies but also the potential for malignant progression and metastasis. We review our medicinal electronomics bricolage design of hypoxia-targeting drugs, antiangiogenic hypoxic cell radiosensitizers, sugar-hybrid hypoxic cell radiosensitizers, and hypoxia-targeting 10B delivery agents, in which we design drug candidates based on their electronic structures obtained by molecular orbital calculations, not based solely on pharmacophore development. These drugs include an antiangiogenic hypoxic cell radiosensitizer TX-2036, a sugar-hybrid hypoxic cell radiosensitizer TX-2244, new hypoxia-targeting indoleamine 2,3-dioxygenase (IDO) inhibitors, and a hypoxia-targeting BNCT agent, BSH (sodium borocaptate-10B)-hypoxic cytotoxin tirapazamine (TPZ) hybrid drug TX-2100. We then discuss the concept of boron tracedrugs as a new drug class having broad potential in many areas.

  13. IPv6 Protocol Analyzer

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    With the emerging of next generation Intemet protocol (IPv6), it is expected to replace the current version of Internet protocol (IPv4) that will be exhausted in the near future. Besides providing adequate address space, some other new features are included into the new 128 bits of IP such as IP auto configuration, quality of service, simple routing capability, security, mobility and multicasting. The current protocol analyzer will not be able to handle IPv6 packets. This paper will focus on developing protocol analyzer that decodes IPv6 packet. IPv6 protocol analyzer is an application module,which is able to decode the IPv6 packet and provide detail breakdown of the construction of the packet. It has to understand the detail construction of the IPv6, and provide a high level abstraction of bits and bytes of the IPv6 packet.Thus it increases network administrators' understanding of a network protocol,helps he/she in solving protocol related problem in a IPv6 network environment.

  14. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  15. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  16. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    . In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise......Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification...... implementations that closely correspond to their legal specification, thereby increasing trust....

  17. Oxidative Stress Induced in Nurses by Exposure to Preparation and Handling of Antineoplastic Drugs in Mexican Hospitals: A Multicentric Study

    Directory of Open Access Journals (Sweden)

    Leobardo Manuel Gómez-Oliván

    2014-01-01

    Full Text Available The impact of involuntary exposure to antineoplastic drugs (AD was studied in a group of nurses in diverse hospitals in Mexico. The results were compared with a group of unexposed nurses. Anthropometric characteristics and the biochemical analysis were analyzed in both groups. Also, lipid peroxidation level (LPX, protein carbonyl content (PCC, and activity of the antioxidant enzymes superoxide dismutase (SOD, catalase (CAT, and glutathione peroxidase (GPx were evaluated in blood of study participants as oxidative stress (OS biomarkers. The group of occupationally exposed (OE nurses consisted of 30 individuals ranging in age from 25 to 35 years. The control group included 30 nurses who were not occupationally exposed to the preparation and handling of AD and whose anthropometric and biochemical characteristics were similar to those of the OE group. All biomarkers evaluated were significantly increased (P<0.5 in OE nurses compared to the control group. Results show that the assessment of OS biomarkers is advisable in order to evaluate exposure to AD in nurses.

  18. A Comprehensive Spectroscopic and Computational Investigation to Probe the Interaction of Antineoplastic Drug Nordihydroguaiaretic Acid with Serum Albumins.

    Directory of Open Access Journals (Sweden)

    Saima Nusrat

    Full Text Available Exogenous drugs that are used as antidote against chemotheray, inflammation or viral infection, gets absorbed and interacts reversibly to the major serum transport protein i.e. albumins, upon entering the circulatory system. To have a structural guideline in the rational drug designing and in the synthesis of drugs with greater efficacy, the binding mechanism of an antineoplastic and anti-inflammatory drug Nordihydroguaiaretic acid (NDGA with human and bovine serum albumins (HSA & BSA were examined by spectroscopic and computational methods. NDGA binds to site II of HSA with binding constant (Kb ~105 M-1 and free energy (ΔG ~ -7.5 kcal.mol-1. It also binds at site II of BSA but with lesser binding affinity (Kb ~105 M-1 and ΔG ~ -6.5 kcal.mol-1. The negative value of ΔG, ΔH and ΔS for both the albumins at three different temperatures confirmed that the complex formation process between albumins and NDGA is spontaneous and exothermic. Furthermore, hydrogen bonds and hydrophobic interactions are the main forces involved in complex formation of NDGA with both the albumins as evaluated from fluorescence and molecular docking results. Binding of NDGA to both the albumins alter the conformation and causes minor change in the secondary structure of proteins as indicated by the CD spectra.

  19. Concanavalin A: A potential anti-neoplastic agent targeting apoptosis, autophagy and anti-angiogenesis for cancer therapeutics

    Energy Technology Data Exchange (ETDEWEB)

    Li, Wen-wen; Yu, Jia-ying; Xu, Huai-long [School of Life Sciences and State Key Laboratory of Oral Diseases, Sichuan University, Chengdu 610064 (China); Bao, Jin-ku, E-mail: jinkubao@yahoo.com [School of Life Sciences and State Key Laboratory of Oral Diseases, Sichuan University, Chengdu 610064 (China)

    2011-10-22

    Highlights: {yields} ConA induces cancer cell death targeting apoptosis and autophagy. {yields} ConA inhibits cancer cell angiogenesis. {yields} ConA is utilized in pre-clinical and clinical trials. -- Abstract: Concanavalin A (ConA), a Ca{sup 2+}/Mn{sup 2+}-dependent and mannose/glucose-binding legume lectin, has drawn a rising attention for its remarkable anti-proliferative and anti-tumor activities to a variety of cancer cells. ConA induces programmed cell death via mitochondria-mediated, P73-Foxo1a-Bim apoptosis and BNIP3-mediated mitochondrial autophagy. Through IKK-NF-{kappa}B-COX-2, SHP-2-MEK-1-ERK, and SHP-2-Ras-ERK anti-angiogenic pathways, ConA would inhibit cancer cell survival. In addition, ConA stimulates cell immunity and generates an immune memory, resisting to the same genotypic tumor. These biological findings shed light on new perspectives of ConA as a potential anti-neoplastic agent targeting apoptosis, autophagy and anti-angiogenesis in pre-clinical or clinical trials for cancer therapeutics.

  20. Organotypic Culture of Breast Tumor Explants as a Multicellular System for the Screening of Natural Compounds with Antineoplastic Potential

    Directory of Open Access Journals (Sweden)

    Irma Edith Carranza-Torres

    2015-01-01

    Full Text Available Breast cancer is the leading cause of death in women worldwide. The search for novel compounds with antitumor activity, with less adverse effects and higher efficacy, and the development of methods to evaluate their toxicity is an area of ​​intense research. In this study we implemented the preparation and culture of breast tumor explants, which were obtained from precision-cut breast tumor slices. In order to validate the model we are proposing to screen antineoplastic effect of natural compounds, we selected caffeic acid, ursolic acid, and rosmarinic acid. Using the Krumdieck tissue slicer, precision-cut tissue slices were prepared from breast cancer samples; from these slices, 4 mm explants were obtained and incubated with the selected compounds. Viability was assessed by Alamar Blue assay, LDH release, and histopathological criteria. Results showed that the viability of the explants cultured in the presence of paclitaxel (positive control decreased significantly (P<0.05; however, tumor samples responded differently to each compound. When the explants were coincubated with paclitaxel and compounds, a synergic effect was observed. This study shows that ex vivo culture of breast cancer explants offers a suitable alternative model for evaluating natural or synthetic compounds with antitumor properties within the complex microenvironment of the tumor.

  1. Organotypic Culture of Breast Tumor Explants as a Multicellular System for the Screening of Natural Compounds with Antineoplastic Potential

    Science.gov (United States)

    Carranza-Torres, Irma Edith; Guzmán-Delgado, Nancy Elena; Coronado-Martínez, Consuelo; Bañuelos-García, José Inocente; Viveros-Valdez, Ezequiel; Morán-Martínez, Javier; Carranza-Rosales, Pilar

    2015-01-01

    Breast cancer is the leading cause of death in women worldwide. The search for novel compounds with antitumor activity, with less adverse effects and higher efficacy, and the development of methods to evaluate their toxicity is an area of intense research. In this study we implemented the preparation and culture of breast tumor explants, which were obtained from precision-cut breast tumor slices. In order to validate the model we are proposing to screen antineoplastic effect of natural compounds, we selected caffeic acid, ursolic acid, and rosmarinic acid. Using the Krumdieck tissue slicer, precision-cut tissue slices were prepared from breast cancer samples; from these slices, 4 mm explants were obtained and incubated with the selected compounds. Viability was assessed by Alamar Blue assay, LDH release, and histopathological criteria. Results showed that the viability of the explants cultured in the presence of paclitaxel (positive control) decreased significantly (P < 0.05); however, tumor samples responded differently to each compound. When the explants were coincubated with paclitaxel and compounds, a synergic effect was observed. This study shows that ex vivo culture of breast cancer explants offers a suitable alternative model for evaluating natural or synthetic compounds with antitumor properties within the complex microenvironment of the tumor. PMID:26075250

  2. Multicenter study of environmental contamination with antineoplastic drugs in 36 Canadian hospitals: a 2013 follow-up study.

    Science.gov (United States)

    Berruyer, M; Tanguay, C; Caron, N J; Lefebvre, M; Bussières, J F

    2015-01-01

    No occupational exposure limit exists for antineoplastic drugs. The main objective of this study was to describe environmental contamination with cyclophosphamide, ifosfamide, and methotrexate in pharmacy and patient care areas of Canadian hospitals in 2013. The secondary objective was to compare the 2013 environmental monitoring results with previous studies. Six standardized sites in the pharmacy and six sites on patient care areas were sampled in each participating center. Samples were analyzed for the presence of cyclophosphamide, ifosfamide, and methotrexate by UPLC-MSMS. The limit of detection (LOD) in pg/cm(2) was 1.8 for cyclophosphamide, 2.2 for ifosfamide, and 7.5 for methotrexate. The 75th percentile of cyclophosphamide concentration was compared between the 2013, 2008-2010, and 2012 studies. Thirty-six hospitals participated in the study and 422 samples were collected. Overall, 47% (198/422) of the samples were positive for cyclophosphamide, 18% (75/422) were positive for ifosfamide, and 3% (11/422) were positive for methotrexate. In 2013, the 75th percentile value of cyclophosphamide surface concentration was reduced to 8.4pg/cm(2) (n = 36), compared with 9.4pg/cm(2) in 2012 (n = 33) and 40pg/cm(2) (n = 25) in 2008-2010. The 75th percentile for ifosfamide and methotrexate concentration remained lower than the LOD. The 2013 study shows an improvement in the surface contamination level, and a plateau effect in the proportion of positive samples.

  3. 1996 : Track Count Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The goal of St. Vincent National Wildlife Refuge's Track Count Protocol is to provide an index to the population size of game animals inhabiting St. Vincent Island.

  4. Quantum deniable authentication protocol

    Science.gov (United States)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2014-07-01

    The proposed quantum identity authentication schemes only involved authentication between two communicators, but communications with deniability capability are often desired in electronic applications such as online negotiation and electronic voting. In this paper, we proposed a quantum deniable authentication protocol. According to the property of unitary transformation and quantum one-way function, this protocol can provide that only the specified receiver can identify the true source of a given message and the specified receiver cannot prove the source of the message to a third party by a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Security analysis results show that this protocol satisfies the basic security requirements of deniable authentication protocol such as completeness and deniability and can withstand the forgery attack, impersonation attack, inter-resend attack.

  5. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    the secure computation. Especially we look at the communication complexity of protocols in this model, and perfectly secure protocols. We show general protocols for any finite functionality with statistical security and optimal communication complexity (but exponential amount of preprocessing). And for two......This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  6. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  7. Design and synthesis of highly Water-soluble Platinum antineoplastic drugs%高水溶性铂类抗肿瘤药物的设计与合成

    Institute of Scientific and Technical Information of China (English)

    张启飞; 鲁彦会; 刘朋兴; 王松青; 高清志

    2012-01-01

    目的 设计与合成具有高水溶性的铂类抗肿瘤药物.方法 通过在丙二酸铂结构中偶联糖分子设计出目标化合物并合成取得水溶性抗肿瘤药物.结果 得到了迄今水溶性最好的金属铂类抗肿瘤化合物,其动物模型抗肿瘤活性和安全性均优于顺铂和卡铂.结论 通过糖分子偶联设计取得的新型铂类抗肿瘤药物能够解决一般铂类药物的低水溶性问题.经初步动物模型抗肿瘤药效实验证明该类药物具有理想的抗肿瘤效果.%Objective To design and synthesize Platinum antineoplastic drugs with high water solubility. Methods Sugar molecular was coupled to the malonic acid Platinum structure to design and synthesize Platinum antineoplastic drugs with high water solubility. Results Metal Platinum antineoplastic compound with best water-solubility was produced, and its antineoplastic activity and safety were better than those of Cisplatin and Carboplatin on animal model. Conclusion Neotype Platinum antineoplastic drug, which is produced through the sugar molecule coupling design, can solve low water-solubility problem of general Platinum drugs. Preliminary antineoplastic efficacy experiment on animal model demonstrates that this kind of medicine has ideal antineoplastic effect.

  8. HER Specific TKIs Exert Their Antineoplastic Effects on Breast Cancer Cell Lines through the Involvement of STAT5 and JNK.

    Directory of Open Access Journals (Sweden)

    Daphne Gschwantler-Kaulich

    Full Text Available HER-targeted tyrosine kinase inhibitors (TKIs have demonstrated pro-apoptotic and antiproliferative effects in vitro and in vivo. The exact pathways through which TKIs exert their antineoplastic effects are, however, still not completely understood.Using Milliplex assays, we have investigated the effects of the three panHER-TKIs lapatinib, canertinib and afatinib on signal transduction cascade activation in SKBR3, T47D and Jurkat neoplastic cell lines. The growth-inhibitory effect of blockade of HER and of JNK and STAT5 signaling was measured by proliferation- and apoptosis-assays using formazan dye labeling of viable cells, Western blotting for cleaved PARP-1 and immunolabeling for active caspase 3, respectively.All three HER-TKIs clearly inhibited proliferation and increased apoptosis in HER2 overexpressing SKBR3 cells, while their effect was less pronounced on HER2 moderately expressing T47D cells where they exerted only a weak antiproliferative and essentially no pro-apoptotic effect. Remarkably, phosphorylation/activation of JNK and STAT5A/B were inhibited by HER-TKIs only in the sensitive, but not in the resistant cells. In contrast, phosphorylation/activation of ERK/MAPK, STAT3, CREB, p70 S6 kinase, IkBa, and p38 were equally affected by HER-TKIs in both cell lines. Moreover, we demonstrated that direct pharmacological blockade of JNK and STAT5 abrogates cell growth in both HER-TKI-sensitive as well as -resistant breast cancer cells, respectively.We have shown that HER-TKIs exert a HER2 expression-dependent anti-cancer effect in breast cancer cell lines. This involves blockade of JNK and STAT5A/B signaling, which have been found to be required for in vitro growth of these cell lines.

  9. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  10. Blind Cognitive MAC Protocols

    CERN Document Server

    Mehanna, Omar; Gamal, Hesham El

    2008-01-01

    We consider the design of cognitive Medium Access Control (MAC) protocols enabling an unlicensed (secondary) transmitter-receiver pair to communicate over the idle periods of a set of licensed channels, i.e., the primary network. The objective is to maximize data throughput while maintaining the synchronization between secondary users and avoiding interference with licensed (primary) users. No statistical information about the primary traffic is assumed to be available a-priori to the secondary user. We investigate two distinct sensing scenarios. In the first, the secondary transmitter is capable of sensing all the primary channels, whereas it senses one channel only in the second scenario. In both cases, we propose MAC protocols that efficiently learn the statistics of the primary traffic online. Our simulation results demonstrate that the proposed blind protocols asymptotically achieve the throughput obtained when prior knowledge of primary traffic statistics is available.

  11. Cytoskeleton - Methods and Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-03-01

    Full Text Available Cytoskeleton - Methods and ProtocolsSecond edition, 2010; Ray H. Gavin (Ed; Springer Protocols methods in molecular biology, vol. 586 Humana press, Totowa, New Jersey (USA; Pages: 390; €95.44; ISBN: 978-1-60761-375-6Ray H. Gavin, from the Brooklyn College of The City University of New York, Brooklyn, NY, USA, wrote a few line as preface of this book. This is quite understandable: there is not a great need of words when there are facts that sustain and favour the dissemination of a cultural product. This is the case of the second edition of Cytoskeleton - Methods and Protocols, which appears just ten years after the first edition...

  12. Apoptosis - Methods and Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-03-01

    Full Text Available Apoptosis - Methods and ProtocolsSecond edition, 2009; Peter Erhardt and Ambrus Toth (Eds; Springer Protocols - Methods in molecular biology, vol. 559; Humana press, Totowa, New Jersey (USA; Pages: 400; €88.35; ISBN: 978-1-60327-016-8The editors rightly begin the preface telling us that: “The ability to detect and quantify apoptosis, to understand its biochemistry and to identify its regulatory genes and proteins is crucial to biomedical research”. Nowadays this is a grounding concept of biology and medicine. What is particularly remarkable...

  13. IP Routing Protocols

    Science.gov (United States)

    Nolasco Pinto, Armando

    2002-03-01

    Uyless Black is a widely known expert in computer networks and data communications. He is author of more than ten books in the communication technologies field, which puts him in a good position to address this topic. In IP Routing Protocols he starts by providing the background and concepts required for understanding TCP/IP technology. This is done clearly and assumes little prior knowledge of the area. As might be expected, he emphasizes the IP route discovery problem. Later he details several routing protocols.

  14. Synergistic antineoplastic action of 5-aza-2'deoxycytidine (decitabine in combination with different inhibitors of enhancer of zeste homolog 2 (EZH2 on human lung carcinoma cells

    Directory of Open Access Journals (Sweden)

    Nascimento ASF

    2016-10-01

    Full Text Available Patients with metastatic lung cancer have a very poor prognosis indicating an urgent need to develop more effective chemotherapy. Aberrant promoter DNA methylation can result in the epigenetic silencing of tumor suppressor genes (TSGs in lung cancer. 5-Aza-2’deoxycytidine (5-Aza-CdR, decitabine, an inhibitor of DNA methylation, is able to reactivate silent TSGs. Trimethylation of histone H3 on lysine 27 (H3K27me3 by enhancer of zeste homolog 2 (EZH2 histone methyltransferase can also silence TSGs in lung cancer. 3-Deazaneplanocin-A (DZNep, an inhibitor of EZH2, up-regulates the expression of genes silenced by H3K27me3. In this study we compared the in vitro antineoplastic activity of different inhibitors of EZH2; DZNep, U-4149 and Gsk-126, alone and in combination with 5-Aza-CdR, on the human A549 lung adenocarcinoma cells. U-4149, an analogue of DZNep, was more potent than either DZNep or Gsk-126. The reduction in colony formation was dose- and time-dependent for each EZH2 inhibitors. Combination treatment of 5-Aza-CdR with the EZH2 inhibitors showed a synergistic antineoplastic activity. 5-Aza-CdR and U-4149 was the most potent combination. The in vitro antineoplastic activity of these agents was evaluated by inhibition of growth, colony formation, induction of senescence and apoptosis. All the drug combinations induced signs of senescence and apoptosis. Analysis by gene expression by qRT-PCR showed that the combinations increased the expression of several TSGs to a greater extent that either agent alone. In conclusion, epigenetic therapy that specifically targets DNA and histone methylation has interesting potential for the treatment of lung cancer and merits further investigation.

  15. Protocol Materials: A Clarification.

    Science.gov (United States)

    Innerd, Wilfred; O'Gorman, David

    "Protocol materials" are records or recordings of a wide variety of behavioral situations. Characteristically they are neither simulated nor extensively edited. They are to be used for the empirical verification of concepts derived from both educational theory and the social sciences. They are attempts to capture reality so that it may be studied…

  16. THE MASTER PROTOCOL CONCEPT

    Science.gov (United States)

    Allegra, Carmen J.

    2015-01-01

    During the past decade, biomedical technologies have undergone an explosive evolution---from the publication of the first complete human genome in 2003, after more than a decade of effort and at a cost of hundreds of millions of dollars---to the present time, where a complete genomic sequence can be available in less than a day and at a small fraction of the cost of the original sequence. The widespread availability of next generation genomic sequencing has opened the door to the development of precision oncology. The need to test multiple new targeted agents both alone and in combination with other targeted therapies, as well as classic cytotoxic agents, demand the development of novel therapeutic platforms (particularly Master Protocols) capable of efficiently and effectively testing multiple targeted agents or targeted therapeutic strategies in relatively small patient subpopulations. Here, we describe the Master Protocol concept, with a focus on the expected gains and complexities of the use of this design. An overview of Master Protocols currently active or in development is provided along with a more extensive discussion of the Lung Master Protocol (Lung-MAP study). PMID:26433553

  17. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  18. Security Protocol Design: A Case Study Using Key Distribution Protocols

    Directory of Open Access Journals (Sweden)

    Reiner Dojen

    2009-10-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities that lead to theattacks are analyzed and guidelines for effective security protocol design are proposed. The presented guidelines are applied to the Andrew Secure RPC protocol and its adapted versions. It is demonstrated that compliance with the guidelines successfully avoidsfreshness and parallel session attacks.

  19. A family of quantum protocols

    CERN Document Server

    Devetak, I; Winter, A

    2003-01-01

    We introduce two dual, purely quantum protocols: for entanglement distillation assisted by quantum communication (``mother'' protocol) and for entanglement assisted quantum communication (``father'' protocol). We show how a large class of ``children'' protocols (including many previously known ones) can be derived from the two by direct application of teleportation or super-dense coding. Furthermore, the parent may be recovered from most of the children protocols by making them ``coherent''. We also summarize the various resource trade-offs these protocols give rise to.

  20. Antineoplastic-related cardiotoxicity, morphofunctional aspects in a murine model: contribution of the new tool 2D-speckle tracking

    Directory of Open Access Journals (Sweden)

    Coppola C

    2016-11-01

    Full Text Available Carmela Coppola,1 Gennaro Riccio,1 Antonio Barbieri,2 Maria Gaia Monti,3 Giovanna Piscopo,1 Domenica Rea,2 Claudio Arra,2 Carlo Maurea,1 Claudia De Lorenzo,4,5 Nicola Maurea1 1Division of Cardiology, Istituto Nazionale per lo Studio e la Cura dei Tumori “Fondazione G. Pascale”, IRCCS, Naples, Italy; 2Animal Facility Unit, Department of Experimental Oncology, Istituto Nazionale per lo Studio e la Cura dei Tumori “Fondazione G. Pascale”, IRCCS, Naples, Italy; 3Department of Translational Medical Sciences, University Federico II, Naples, Italy; 4Department of Molecular Medicine and Medical Biotechnology, University Federico II, Naples, Italy; 5CEINGE Biotecnologie Avanzate, Naples, Italy Objective: Considering that global left ventricular systolic radial strain is a sensitive technique for the early detection of left ventricular dysfunction due to antineoplastics and the analysis of segmental myocardial contractility, we evaluated this technique for early detection of trastuzumab-related cardiotoxicity by comparing it with cardiac structural damage.Methods: Groups of six mice were injected with trastuzumab or doxorubicin, used either as single agents or in combination. Cardiac function was evaluated by transthoracic echocardiography measurements before and after treatment for 2 or 7 days, by using a Vevo 2100 high-resolution imaging system. After echocardiography, mice were euthanized, and hearts were processed for histological evaluations, such as cardiac fibrosis, apoptosis, capillary density, and inflammatory response.Results: Trastuzumab-related cardiotoxicity was detected early by 2D strain imaging. Radial strain was reduced after 2 days in mice treated with trastuzumab alone (21.2%±8.0% vs 40.5%±4.8% sham; P<0.01. Similarly, trastuzumab was found to induce apoptosis, capillary density reduction, and inflammatory response in cardiac tissue after 2 days of treatment, in a fashion similar to doxorubicin. On the contrary, fractional

  1. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  2. Mitosis Methods & Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Mitosis Methods & Protocols Andrew D. McAinsh (Edt Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 545, 2009 ISBN: 978-1-60327-992-5   It is quite clear from the contents of this book that the remarkably fascinating phenomenon of mitosis (that captured, and still is capturing, the attention of entire generations of scientists is still open to research. This is mainly due to our lack of knowledge of so many multifaced events of this extraordinarly complex process. The reader giving a glace through the Contents and Contributors sections is speechless: All of the first-class models (i.e., budding yeast, Caenorabditis, Drosophila, Xenopus and Human are presented..... 

  3. Cognitive Protocol Stack Design

    Science.gov (United States)

    2015-12-30

    SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS (ES) U.S. Army Research Office P.O. Box 12211 Research Triangle Park , NC 27709-2211 cognitive...related to mobility and topology changes in a wireless multi-hop ad hoc network. (xv) We used a cross-layer formulation to design transmission...the transmission parameters, the implemented protocol and the network topology . The solution adopted involves a heuristic metric to measure how the

  4. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  5. Reduced Expression of the Retinoblastoma Protein Shows That the Related Signaling Pathway Is Essential for Mediating the Antineoplastic Activity of Erufosine

    Science.gov (United States)

    Zaharieva, Maya M.; Kirilov, Milen; Chai, Minquang; Berger, Stefan M.; Konstantinov, Spiro; Berger, Martin R.

    2014-01-01

    Erufosine is a new antineoplastic agent of the group of alkylphosphocholines, which interferes with signal transduction and induces apoptosis in various leukemic and tumor cell lines. The present study was designed to examine for the first time the mechanism of resistance to erufosine in malignant cells with permanently reduced expression of the retinoblastoma (Rb) protein. Bearing in mind the high number of malignancies with reduced level of this tumor-suppressor, this investigation was deemed important for using erufosine, alone or in combination, in patients with compromised RB1 gene expression. For this purpose, clones of the leukemic T-cell line SKW-3 were used, which had been engineered to constantly express differently low Rb levels. The alkylphosphocholine induced apoptosis, stimulated the expression of the cyclin dependent kinase inhibitor p27Kip1 and inhibited the synthesis of cyclin D3, thereby causing a G2 phase cell cycle arrest and death of cells with wild type Rb expression. In contrast, Rb-deficiency impeded the changes induced by eru-fosine in the expression of these proteins and abrogated the induction of G2 arrest, which was correlated with reduced antiproliferative and anticlonogenic activities of the compound. In conclusion, analysis of our results showed for the first time that the Rb signaling pathway is essential for mediating the antineoplastic activity of erufosine and its efficacy in patients with malignant diseases may be predicted by determining the Rb status. PMID:24987858

  6. Antineoplastic effect of iodine and iodide in dimethylbenz[a]anthracene-induced mammary tumors: association between lactoperoxidase and estrogen-adduct production.

    Science.gov (United States)

    Soriano, Ofelia; Delgado, Guadalupe; Anguiano, Brenda; Petrosyan, Pavel; Molina-Servín, Edith D; Gonsebatt, Maria E; Aceves, Carmen

    2011-08-01

    Several groups, including ours, have reported that iodine exhibited antiproliferative and apoptotic effects in various cancer cells only if this element is supplemented as molecular iodine, or as iodide, to cells that are able to oxidize it with the enzyme thyroperoxidase. In this study, we analyzed the effect of various concentrations of iodine and/or iodide in the dimethylbenz[a]anthracene (DMBA) mammary cancer model in rats. The results show that 0.1% iodine or iodide increases the expression of peroxisome proliferator-activated receptor type γ (PPARγ), triggering caspase-mediated apoptosis pathways in damaged mammary tissue (DMBA-treated mammary gland) as well as in frank mammary tumors, but not in normal mammary gland. DMBA treatment induces the expression of lactoperoxidase, which participates in the antineoplastic effect of iodide and could be involved in the pro-neoplastic effect of estrogens, increasing the formation of DNA adducts. In conclusion, our results show that a supplement of 0.1% molecular iodine/potassium iodide (0.05/0.05%) exert antineoplastic effects, preventing estrogen-induced DNA adducts and inducing apoptosis through PPARγ/caspases in pre-cancer and cancerous cells. Since this iodine concentration does not modify the cytology (histology, apoptosis rate) or physiology (triiodothyronine and thyrotropin) of the thyroid gland, we propose that it be considered as an adjuvant treatment for premenopausal mammary cancer.

  7. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo;

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  8. CT protocol review and optimization.

    Science.gov (United States)

    Kofler, James M; Cody, Dianna D; Morin, Richard L

    2014-03-01

    To reduce the radiation dose associated with CT scans, much attention is focused on CT protocol review and improvement. In fact, annual protocol reviews will soon be required for ACR CT accreditation. A major challenge in the protocol review process is determining whether a current protocol is optimal and deciding what steps to take to improve it. In this paper, the authors describe methods for pinpointing deficiencies in CT protocols and provide a systematic approach for optimizing them. Emphasis is placed on a team approach, with a team consisting of at least one radiologist, one physicist, and one technologist. This core team completes a critical review of all aspects of a CT protocol and carefully evaluates proposed improvements. Changes to protocols are implemented only with consensus of the core team, with consideration of all aspects of the CT examination, including image quality, radiation dose, patient care and safety, and workflow.

  9. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 74683-79494

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  10. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  11. Stream Control Transmission Protocol Steganography

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows. This paper describes potential steganographic methods that may be applied to SCTP and may pose a threat to network security. Proposed methods utilize new, characteristic SCTP features like multi-homing and multistreaming. Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.

  12. Chemosensitivity assay in mice prostate tumor: Preliminary report of flow cytometry, DNA fragmentation, ion ratiometric methods of anti-neoplastic drug monitoring

    Directory of Open Access Journals (Sweden)

    Kline Richard

    2004-03-01

    Full Text Available Abstract Flow cytometry, DNA fragmentation, ion ratiomateric analysis and NMR peaks characterized drug chemosensitivity of antineoplastic drugs. Hypotheses were: 1. The chemosensitive effect of different cancer cell lines is characteristic; 2. DNA fragmentation, ion ratiometric analysis suggest apoptosis status of tumor cells. Methods PC-3 cell lines were compared with DU-145, LNCaP cell lines in culture for the [Na]i and [Ca]i ion sensing dyes, cell death, NMR peaks and apoptosis staining for chemotherapeutic action of different drugs. Results DNA fragmentation, ratiometric ions and fluorescence endlabelling plots were characteristic for cell lines and drug response. 31P-23Na NMR spectra showed characteristic high phospho-choline and sodium peaks. Conclusion Flow cytometry, DNA fragmentation, ion ratiometric methods and NMR peaks indicated apoptosis and offered in vivo drug monitoring method.

  13. Studies on Antineoplastic Constituents from Marine Bryozoan Bugula neritina Inhabiting South China Sea (Ⅲ): Isolation and Structural Elucidation of Bryostatins 10, 11 and 18

    Institute of Scientific and Technical Information of China (English)

    林厚文; 易杨华; 姚新生; 吴厚铭

    2001-01-01

    Six active compounds are isolated from the marine bryozoan Bugula neritina,inhabiting the Nanwan Bay in the South China Sea, using the bioassay-guided method with a combination of extraction and partitionation with suitable solvents as well as multiple column chromatographies ( Sephadex LH-20, ODS and preparative HPLC).Their structures are identified as known bryostatins-bryostatins 4, 5, 6, 10, 11 and 18 through intensive analysis of the data of high resolution 2D NMR (600 MHz, DQF-COSY,TOCSY, HMQC and ROESY) and ESI-MS. Among them, bryostatins 10, 11 and 18 are for the first time obtained from this bryozoan in the South China Sea and they show significant antineoplastic activities in vitro.

  14. Novel antineoplastic isochalcones inhibit the expression of cyclooxygenase 1,2 and EGF in human prostate cancer cell line LNCaP.

    Science.gov (United States)

    Johnson, K P; Rowe, G C; Jackson, B A; D'Agustino, J L; Campbell, P E; Guillory, B O; Williams, M V; Matthews, Q L; McKay, J; Charles, G M; Verret, C R; Deleon, M; Johnson, D E; Cooke, D B

    2001-09-01

    Experiments were conducted to determine the effects of novel anti-neoplastic isochalcones (DJ compounds), on cyclooxyegenase 1 and 2 (COX-1 and COX-2) enzyme expression in androgen receptor dependent human prostate cancer cell line LNCaP. Results from Western blot analysis and cell flow cytometry showed that DJ52 and DJ53 decreased the steady state levels of COX-1 and COX-2 protein levels in a dose dependent manner. In addition, DJ52 and DJ53 decreased the levels of epidermal growth factor (EGF) in LNCaP cells. In this study, we report that novel isochalcones decreased COX-1, COX-2 and EGF levels as well as LNCaP cellular growth in a dose responsive manner. Our findings indicate that relative decreases in COX-1, COX-2 and EGF expressions might serve as indicators of tumor growth inhibition in prostate neoplasms.

  15. Curcumol induces apoptosis in SPC-A-1 human lung adenocarcinoma cells and displays anti-neoplastic effects in tumor bearing mice.

    Science.gov (United States)

    Tang, Qi-Ling; Guo, Ji-Quan; Wang, Qi-You; Lin, Hai-Shu; Yang, Zhou-Ping; Peng, Tong; Pan, Xue-Diao; Liu, Bing; Wang, Su-Jun; Zang, Lin-Quan

    2015-01-01

    Curcumol is a sesquiterpene originally isolated from curcuma rhizomes, a component of herbal remedies commonly used in oriental medicine. Its beneficial pharmacological activities have attract significant interest recently. In this study, anti-cancer activity of curcumol was examined with both in vitro and in vivo models. It was found that curcumol exhibited time- and concentration-dependent anti-proliferative effects in SPC-A-1 human lung adenocarcinoma cells with cell cycle arrest in the G0/G1 phase while apoptosis-induction was also confirmed with flow cytometry and morphological analyses. Interestingly, curcumol did not display growth inhibition in MRC-5 human embryonic lung fibroblasts, suggesting the anti-proliferative effects of curcumol were specific to cancer cells. Anti-neoplastic effects of curcumol were also confirmed in tumor bearing mice. Curcumol (60 mg/kg daily) significantly reduced tumor size without causing notable toxicity. In conclusion, curcumol appears a favorable anti-cancer candidate for further development.

  16. Evaluation of the antineoplastic activity of mitoxantrone-L-carnitine combination therapy on an experimental solid form of ehrlich tumour in mice.

    Science.gov (United States)

    Niang, M; Melka, M; Stoklasová, A; Cerman, J; Tomsík, P

    2006-12-01

    We have commenced a series of experiments to evaluate the effect of carnitine derivatives on the antineoplastic activity of mitoxantrone (MX) on various animal cancers. This report describes the therapeutic effect of MX in combination with l-carnitine (LCAR) on the growth of a solid form of Ehrlich tumour inoculated into mice. LCAR was administered subcutaneously at doses of either 200 or 100mgkg(-1) on day 6 and 13 after tumour inoculation, 1h prior to the treatment with MX. Mitoxantrone was administered intravenously at doses of 3 or 6mgkg(-1). We found that LCAR had no potentiating effect on the efficacy of MX, in terms of either slowing tumour growth or increasing the survival of mice. Nevertheless, therapeutic effects can be assumed at higher doses of both drugs based on values calculated from an index of relative hazards.

  17. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  18. A PROGRAMMED LABOUR - PROTOCOL

    Directory of Open Access Journals (Sweden)

    Savita

    2014-12-01

    Full Text Available A Prospective randomized Clinical study of outcome of labour following. “A Programmed labour. Protocol” was done at Department of OBG, MRMC Gulbarga. The Protocol was aimed with dual. Objective of Providing Pain relief during labour and teaching the goal of safe motherhood by optimizing objective outcome. AIMS AND OBJECTIVES: Shortening of duration of labour. Effect of labour analgesia. Monitoring of the events during labour. Lowering the incidence of operative deliveries. METHODS: 100 cases primi pregnant women admitted in labour room are randomly selected. It is designed to apply to low risk primi parous, singleton cephalic presentation without evidence of CPD and spontaneous onset of labour. RESULTS: Shortened duration of all the stages of Labour, especially significant reduction in duration of active phase of labour. CONCLUSION: The programmed labour is simple easy and effective method for painless and safe delivery.

  19. Survey protocol for invasive species

    OpenAIRE

    Menza, Charles

    2009-01-01

    This protocol was developed by the Biogeography Branch of NOAA’s Center for Coastal Monitoring and Assessment to support invasive species research by the Papahānaumokuākea Marine National Monument. The protocol’s objective is to detect Carijoa riisei and Hypnea musciformis in deepwater habitats using visual surveys by technical divers. Note: This protocol is designed to detect the presence or absence of invasive species. A distinct protocol is required to collect information on abundance ...

  20. Uncaria tomentosa exerts extensive anti-neoplastic effects against the Walker-256 tumour by modulating oxidative stress and not by alkaloid activity.

    Science.gov (United States)

    Dreifuss, Arturo Alejandro; Bastos-Pereira, Amanda Leite; Fabossi, Isabella Aviles; Lívero, Francislaine Aparecida Dos Reis; Stolf, Aline Maria; Alves de Souza, Carlos Eduardo; Gomes, Liana de Oliveira; Constantin, Rodrigo Polimeni; Furman, Aline Emmer Ferreira; Strapasson, Regiane Lauriano Batista; Teixeira, Simone; Zampronio, Aleksander Roberto; Muscará, Marcelo Nicolás; Stefanello, Maria Elida Alves; Acco, Alexandra

    2013-01-01

    This study aimed to compare the anti-neoplastic effects of an Uncaria tomentosa (UT) brute hydroethanolic (BHE) extract with those of two fractions derived from it. These fractions are choroformic (CHCl3) and n-butanolic (BuOH), rich in pentacyclic oxindole alkaloids (POA) and antioxidant substances, respectively. The cancer model was the subcutaneous inoculation of Walker-256 tumour cells in the pelvic limb of male Wistar rat. Subsequently to the inoculation, gavage with BHE extract (50 mg.kg(-1)) or its fractions (as per the yield of the fractioning process) or vehicle (Control) was performed during 14 days. Baseline values, corresponding to individuals without tumour or treatment with UT, were also included. After treatment, tumour volume and mass, plasma biochemistry, oxidative stress in liver and tumour, TNF-α level in liver and tumour homogenates, and survival rates were analysed. Both the BHE extract and its BuOH fraction successfully reduced tumour weight and volume, and modulated anti-oxidant systems. The hepatic TNF-α level indicated a greater effect from the BHE extract as compared to its BuOH fraction. Importantly, both the BHE extract and its BuOH fraction increased the survival time of the tumour-bearing animals. Inversely, the CHCl3 fraction was ineffective. These data represent an in vivo demonstration of the importance of the modulation of oxidative stress as part of the anti-neoplastic activity of UT, as well as constitute evidence of the lack of activity of isolated POAs in the primary tumour of this tumour lineage. These effects are possibly resulting from a synergic combination of substances, most of them with antioxidant properties.

  1. Uncaria tomentosa exerts extensive anti-neoplastic effects against the Walker-256 tumour by modulating oxidative stress and not by alkaloid activity.

    Directory of Open Access Journals (Sweden)

    Arturo Alejandro Dreifuss

    Full Text Available This study aimed to compare the anti-neoplastic effects of an Uncaria tomentosa (UT brute hydroethanolic (BHE extract with those of two fractions derived from it. These fractions are choroformic (CHCl3 and n-butanolic (BuOH, rich in pentacyclic oxindole alkaloids (POA and antioxidant substances, respectively. The cancer model was the subcutaneous inoculation of Walker-256 tumour cells in the pelvic limb of male Wistar rat. Subsequently to the inoculation, gavage with BHE extract (50 mg.kg(-1 or its fractions (as per the yield of the fractioning process or vehicle (Control was performed during 14 days. Baseline values, corresponding to individuals without tumour or treatment with UT, were also included. After treatment, tumour volume and mass, plasma biochemistry, oxidative stress in liver and tumour, TNF-α level in liver and tumour homogenates, and survival rates were analysed. Both the BHE extract and its BuOH fraction successfully reduced tumour weight and volume, and modulated anti-oxidant systems. The hepatic TNF-α level indicated a greater effect from the BHE extract as compared to its BuOH fraction. Importantly, both the BHE extract and its BuOH fraction increased the survival time of the tumour-bearing animals. Inversely, the CHCl3 fraction was ineffective. These data represent an in vivo demonstration of the importance of the modulation of oxidative stress as part of the anti-neoplastic activity of UT, as well as constitute evidence of the lack of activity of isolated POAs in the primary tumour of this tumour lineage. These effects are possibly resulting from a synergic combination of substances, most of them with antioxidant properties.

  2. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.;

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  3. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  4. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    Science.gov (United States)

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results.

  5. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.

  6. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  7. Interoperation between AODV protocol and AOHR protocol for mobile ad hoc networks

    Science.gov (United States)

    Wu, Shaochuan; Wang, Changhong; Zhang, Jiayan

    2009-12-01

    Although AOHR protocol has some excellent performance, no actual network utilizes AOHR as routing protocol. It is because that this protocol cannot interoperate with AODV protocol, which is the most famous routing protocol and used all over the world. The cost will be very huge to replace AODV protocol with AOHR protocol for existing networks, so the only feasible method is to modify AOHR protocol to interoperate with AODV as introduced in this paper. The simulation results prove that the modified AOHR protocol can help the existing AODV protocol provide routing service, and the interoperation of these two routing protocols is realized.

  8. Active vitamin D potentiates the anti-neoplastic effects of calcium in the colon: A cross talk through the calcium-sensing receptor.

    Science.gov (United States)

    Aggarwal, Abhishek; Höbaus, Julia; Tennakoon, Samawansha; Prinz-Wohlgenannt, Maximilian; Graça, João; Price, Sally A; Heffeter, Petra; Berger, Walter; Baumgartner-Parzer, Sabina; Kállay, Enikö

    2016-01-01

    Epidemiological studies suggest an inverse correlation between dietary calcium (Ca(2+)) and vitamin D intake and the risk of colorectal cancer (CRC). It has been shown in vitro that the active vitamin D metabolite, 1,25-dihydroxyvitamin D3 (1,25-D3) can upregulate expression of the calcium-sensing receptor (CaSR). In the colon, CaSR has been suggested to regulate proliferation of colonocytes. However, during tumorigenesis colonic CaSR expression is downregulated and we hypothesized that the loss of CaSR could influence the anti-tumorigenic effects of Ca(2+) and vitamin D. Our aim was to assess the impact of CaSR expression and function on the anti-neoplastic effects of 1,25-D3 in colon cancer cell lines. We demonstrated that in the healthy colon of mice, high vitamin D diet (2500 IU/kg diet) increased expression of differentiation and apoptosis markers, decreased expression of proliferation markers and significantly upregulated CaSR mRNA expression, compared with low vitamin D diet (100 IU/kg diet). To determine the role of CaSR in this process, we transfected Caco2-15 and HT29 CRC cells with wild type CaSR (CaSR-WT) or a dominant negative CaSR mutant (CaSR-DN) and treated them with 1,25-D3 alone, or in combination with CaSR activators (Ca(2+) and NPS R-568). 1,25-D3 enhanced the anti-proliferative effects of Ca(2+) and induced differentiation and apoptosis only in cells with a functional CaSR, which were further enhanced in the presence of NPS R-568, a positive allosteric modulator of CaSR. The mutant CaSR inhibited the anti-tumorigenic effects of 1,25-D3 suggesting that the anti-neoplastic effects of 1,25-D3 are, at least in part, mediated by the CaSR. Taken together, our data provides molecular evidence to support the epidemiological observation that both, vitamin D and calcium are needed for protection against malignant transformation of the colon and that their effect is modulated by the presence of a functional CaSR. This article is part of a Special Issue

  9. Cellular uptake mechanism and comparative evaluation of antineoplastic effects of paclitaxel–cholesterol lipid emulsion on triple-negative and non-triple-negative breast cancer cell lines

    Directory of Open Access Journals (Sweden)

    Ye J

    2016-08-01

    Full Text Available Jun Ye,1,2 Xuejun Xia,1,2 Wujun Dong,1,2 Huazhen Hao,1,2 Luhua Meng,1,2 Yanfang Yang,1,2 Renyun Wang,1,2 Yuanfeng Lyu,3 Yuling Liu1,2 1State Key Laboratory of Bioactive Substance and Function of Natural Medicines, 2Beijing Key Laboratory of Drug Delivery Technology and Novel Formulation, Institute of Materia Medica, Chinese Academy of Medical Sciences, Peking Union Medical College, Beijing, 3School of Pharmacy, China Pharmaceutical University, Nanjing, People’s Republic of China Abstract: There is no effective clinical therapy for triple-negative breast cancers (TNBCs, which have high low-density lipoprotein (LDL requirements and express relatively high levels of LDL receptors (LDLRs on their membranes. In our previous study, a novel lipid emulsion based on a paclitaxel–cholesterol complex (PTX-CH Emul was developed, which exhibited improved safety and efficacy for the treatment of TNBC. To date, however, the cellular uptake mechanism and intracellular trafficking of PTX-CH Emul have not been investigated. In order to offer powerful proof for the therapeutic effects of PTX-CH Emul, we systematically studied the cellular uptake mechanism and intracellular trafficking of PTX-CH Emul and made a comparative evaluation of antineoplastic effects on TNBC (MDA-MB-231 and non-TNBC (MCF7 cell lines through in vitro and in vivo experiments. The in vitro antineoplastic effects and in vivo tumor-targeting efficiency of PTX-CH Emul were significantly more enhanced in MDA-MB-231-based models than those in MCF7-based models, which was associated with the more abundant expression profile of LDLR in MDA-MB-231 cells. The results of the cellular uptake mechanism indicated that PTX-CH Emul was internalized into breast cancer cells through the LDLR-mediated internalization pathway via clathrin-coated pits, localized in lysosomes, and then released into the cytoplasm, which was consistent with the internalization pathway and intracellular trafficking of native

  10. Process for Reviewing Survey Protocols

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document describes the process for conducting two types of reviews of survey protocols. A quick assessment is used to acknowledge and describe to potential...

  11. Assessment of Established Survey Protocols

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — A form and instructions for quickly and briefly assessing a previously (prior to 2013) reviewed or approved survey protocol for use as a National or Regional survey...

  12. National Elk Refuge vaccination protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Proposal by the State of Wyoming, Wyoming Game and Fish Department, to vaccinate elk on the National Elk Refuge. The proposal provides a protocol for vaccinating elk...

  13. Analysis of the Utilization of Antineoplastic Chinese Patent Medicine in Our Hospital during the Period of 2008-2011%我院2008-2011年抗肿瘤口服中成药使用分析

    Institute of Scientific and Technical Information of China (English)

    郭玉霞; 张磊; 齐伟; 吴志恒

    2012-01-01

    OBJECTIVE: To evaluate the status quo of the utilization of antineoplastic Chinese patent medicine in our hospital and to promote rational use of drugs. METHODS: The consumption sum, DDDs.DDC and DUI of antineoplastic Chinese patent medicine in our hospital during the period of 2008—2010 were analyzed statistically. RESULTS: The variety of antineoplastic Chinese patent medicine in our hospital was stable during 2008—2011, the consumption sum of drugs increased year by year, suitable price and effective therapeutic efficacy of Chinese patent medicine took the lead on the list of DDDs and DDC. CONCLUSION: In our hospital, the utilization of antineoplastic Chinese patent medicine is rational on the whole. Comprehensive considerations including good effect and reasonable cost should be taken into account during clinical drug use.%目的:评价我院抗肿瘤口服中成药的使用现状,促进合理用药.方法:对我院2008-2011年抗肿瘤口服中成药的销售金额、用药频度(DDDs)、日用药金额(DDC)、药物利用指数(DUI)进行排序和分析.结果:我院2008-2011年抗肿瘤口服中成药品种基本固定,销售金额呈逐年上升趋势,疗效确切、价格适中的中成药DDDs、DDC、DUI排序靠前.结论:我院抗肿瘤中成药的应用基本合理,在临床用药过程中要综合考虑疗效和经济两方面.

  14. Improved Authenticated Multi-Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  15. Formal Modeling of Communication Protocols.

    Science.gov (United States)

    1981-03-01

    problems have been developed. 4 FORMAL MODELING OF COMMUNICATION PROTOCOLS The state machine model is motivated by the observation that protocols may be...simplest types of state machine model because they have only a single state variable (the state) which takes on a relatively small range of values. For...grammar, this correspondence is very apparent. For each state of the state machine model , we define a nonterminal symbol in the grammar. The inputs

  16. Identification of differential anti-neoplastic activity of copper bis(thiosemicarbazones) that is mediated by intracellular reactive oxygen species generation and lysosomal membrane permeabilization.

    Science.gov (United States)

    Stefani, Christian; Al-Eisawi, Zaynab; Jansson, Patric J; Kalinowski, Danuta S; Richardson, Des R

    2015-11-01

    Bis(thiosemicarbazones) and their copper (Cu) complexes possess unique anti-neoplastic properties. However, their mechanism of action remains unclear. We examined the structure-activity relationships of twelve bis(thiosemicarbazones) to elucidate factors regarding their anti-cancer efficacy. Importantly, the alkyl substitutions at the diimine position of the ligand backbone resulted in two distinct groups, namely, unsubstituted/monosubstituted and disubstituted bis(thiosemicarbazones). This alkyl substitution pattern governed their: (1) Cu(II/I) redox potentials; (2) ability to induce cellular (64)Cu release; (3) lipophilicity; and (4) anti-proliferative activity. The potent anti-cancer Cu complex of the unsubstituted bis(thiosemicarbazone) analog, glyoxal bis(4-methyl-3-thiosemicarbazone) (GTSM), generated intracellular reactive oxygen species (ROS), which was attenuated by Cu sequestration by a non-toxic Cu chelator, tetrathiomolybdate, and the anti-oxidant, N-acetyl-l-cysteine. Fluorescence microscopy suggested that the anti-cancer activity of Cu(GTSM) was due, in part, to lysosomal membrane permeabilization (LMP). For the first time, this investigation highlights the role of ROS and LMP in the anti-cancer activity of bis(thiosemicarbazones).

  17. Determination of MKT-077, a novel antineoplastic agent, in plasma samples by high-performance liquid chromatography and its application to pharmacokinetics in rats.

    Science.gov (United States)

    Tatsuta, N; Suzuki, N; Koya, K; Kawakami, M; Shishido, T; Chen, L B

    1999-03-01

    A simple high-performance liquid chromatographic method was developed for determination of a novel antineoplastic agent MKT-077 in plasma. MKT-077 was extracted from 50 microl of plasma with acetonitrile containing 1 ml trifluoroacetic acid per liter. Chromatographic separation was achieved within 13.5 min using a reverse-phase Puresil C18 analytical column. A visible detector operated at 490 nm was used. The linearity of the calibration curve was obtained (r2 = 0.99986) over the analytical range of 10-500 ng/ml(-1). The intra- and inter-assay precision was in the range of 0.9-11.1 and 0.3-4.4%, respectively. The intra- and inter-assay bias ranged from -7.3 to 11.1% and from 0.4 to 11.6%, respectively. The utility of this assay was demonstrated after the administration of a single dose of MKT-077 to rats. The plasma elimination half-life of MKT-077 was 1.8-4 h.

  18. Prevention of disease progression in a patient with a gastric cancer-re-recurrence. Outcome after intravenous treatment with the novel antineoplastic agent taurolidine. Report of a case

    Directory of Open Access Journals (Sweden)

    Menenakos Charalambos

    2006-06-01

    Full Text Available Abstract Background Taurolidine (TRD is a novel agent with multimodal antineoplastic effects. We present the case of a tumor remission after intravenous administration of taurolidine in a patient with gastric cancer re-recurrence. Case presentation A 58 years old male patient suffering from a gastric adenocarcinoma was submitted to partial gastrectomy and partial liver resection (pT2, pN1, pM1L (liver segment 2, N0, V0. 24 months later a local recurrence was diagnosed and the patient was reoperated. Postoperatively the patient underwent a palliative chemotherapy with eloxatin, FU, and leucovorin. A subsequent CT-revealed a liver metastasis and a recurrence adjacent to the hepatic artery. After successful radiofrequency ablation of the liver metastasis the patient was intravenously treated with 2% taurolidine. The patient endured the therapy well and no toxicity was observed. CT-scans revealed a stable disease without a tumor progression or metastatic spread. After 39 cycles the patient was submitted to left nephrectomy due to primary urothelial carcinoma and died 2 days later due to myocardial infarction. Postmortem histology of the esophageal-jejunal anastomosis and liver revealed complete remission of the known metastasized gastric adenocarcinoma. Conclusion The intravenous treatment with 2% taurolidine led to a histological remission of the tumor growth without any toxicity for the patient.

  19. [Example of safety measures for antineoplastic agents immediately after market launch--a case of TS-1 capsule all example use result investigation that executes safety monitoring--].

    Science.gov (United States)

    Ito, Kunio

    2006-01-01

    As a measure to ensure safe use of TS-1 during the early marketing period, a drug use investigation was conducted on an all-case basis. Extra safety monitoring,rarely included in the use investigation,was also planned for patients who began therapy with this agent. Of the 4,177 subjects registered during the year beginning in March 1999, 3,882 started TS-1 therapy. Aside from 74 dropouts, 3,808 cases were evaluable for safety. The overall incidence of adverse reactions, with high frequencies of myelosuppression and gastrointestinal disorders, was 74.3%: a result similar to an incidence of 77.5% (100/129) found in the early phase II trial with gastric cancer patients. Safety monitoring made it possible to check if a given patients was eligible for proper use before treatment is begun. During TS-1 administration,collaboration was formed between physicians and medical representatives to ensure regular laboratory testing and to check the test findings. Measures were considered necessary to secure the safe use of drugs with manifest risk of serious adverse reactions, such as antineoplastic agents, during the initial period of market introduction. Our present approach proved effective as one of such measures.

  20. The mesh network protocol evaluation and development

    OpenAIRE

    Pei Ping; PETRENKO Y.N.

    2015-01-01

    In this paper, we introduce a Mesh network protocol evaluation and development. It has a special protocol. We could easily to understand that how different protocols are used in mesh network. In addition to our comprehension, Multi – hop routing protocol could provide robustness and load balancing to communication in wireless mesh networks.

  1. Cryptographic Protocols under Quantum Attacks

    CERN Document Server

    Lunemann, Carolin

    2011-01-01

    The realm of this thesis is cryptographic protocol theory in the quantum world. We study the security of quantum and classical protocols against adversaries that are assumed to exploit quantum effects to their advantage. Security in the quantum world means that quantum computation does not jeopardize the assumption, underlying the protocol construction. But moreover, we encounter additional setbacks in the security proofs, which are mostly due to the fact that some well-known classical proof techniques are forbidden by certain properties of a quantum environment. Interestingly, we can exploit some of the very same properties to the benefit of quantum cryptography. Thus, this work lies right at the heart of the conflict between highly potential effects but likewise rather demanding conditions in the quantum world.

  2. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  3. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  4. Protocol Writing in Clinical Research

    Science.gov (United States)

    Al-Jundi, Azzam

    2016-01-01

    Writing a research proposal is probably one of the most challenging and difficult task as research is a new area for the majority of postgraduates and new researchers. The purpose of this article is to summarize the most important steps and necessary guidelines for producing a standard research protocol. Academic and administrative success of any project is usually determined by acquiring a grant for the related field of research. Hence, the quality of a protocol is primarily required to achieve success in this scientific competition. PMID:28050522

  5. Developing protocols for obstetric emergencies.

    Science.gov (United States)

    Roth, Cheryl K; Parfitt, Sheryl E; Hering, Sandra L; Dent, Sarah A

    2014-01-01

    There is potential for important steps to be missed in emergency situations, even in the presence of many health care team members. Developing a clear plan of response for common emergencies can ensure that no tasks are redundant or omitted, and can create a more controlled environment that promotes positive health outcomes. A multidisciplinary team was assembled in a large community hospital to create protocols that would help ensure optimum care and continuity of practice in cases of postpartum hemorrhage, shoulder dystocia, emergency cesarean surgical birth, eclamptic seizure and maternal code. Assignment of team roles and responsibilities led to the evolution of standardized protocols for each emergency situation.

  6. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  7. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  8. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  9. Probability Distributions over Cryptographic Protocols

    Science.gov (United States)

    2009-06-01

    exception. Cryptyc integrates use of pattern- matching in the spi calculus framework , which in turn allows the specification of nested cryptographic...programs too: the metaheuristic search for security protocols,” Information and Software Technology, vol. 43, pp. 891– 904, December 2001. 131 [9] X

  10. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  11. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  12. Metabolomics protocols for filamentous fungi.

    Science.gov (United States)

    Gummer, Joel P A; Krill, Christian; Du Fall, Lauren; Waters, Ormonde D C; Trengove, Robert D; Oliver, Richard P; Solomon, Peter S

    2012-01-01

    Proteomics and transcriptomics are established functional genomics tools commonly used to study filamentous fungi. Metabolomics has recently emerged as another option to complement existing techniques and provide detailed information on metabolic regulation and secondary metabolism. Here, we describe broad generic protocols that can be used to undertake metabolomics studies in filamentous fungi.

  13. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    BACKGROUND: Unacknowledged inconsistencies in the reporting of clinical trials undermine the validity of the results of the trials. Little is known about inconsistency in the reporting of academic clinical drug trials. Therefore, we investigated the prevalence of consistency between protocols and...

  14. Protocol biopsies for renal transplantation

    Directory of Open Access Journals (Sweden)

    Rush David

    2010-01-01

    Full Text Available Protocol biopsies in renal transplantation are those that are procured at predetermined times post renal transplantation, regardless of renal function. These biopsies have been useful to study the natural history of the transplanted kidney as they have detected unexpected - i.e. "subclinical" pathology. The most significant subclinical pathologies that have been detected with protocol biopsies have been acute lesions, such as cellular and antibody mediated rejection, and chronic lesions, such as interstitial fibrosis and tubular atrophy, and transplant glomerulopathy. The potential benefit of early recognition of the above lesions is that their early treatment may result in improved long-term outcomes. Conversely, the identification of normal histology on a protocol biopsy, may inform us about the safety of reduction in overall immunosuppression. Our centre, as well as others, is attempting to develop non-invasive methods of immune monitoring of renal transplant patients. However, we believe that until such methods have been developed and validated, the protocol biopsy will remain an indispensable tool for the complete care of renal transplant patients.

  15. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrat...

  16. Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2004-01-01

    This paper introduces a process calculus with recursion which allows us to express an unbounded number of runs of the ping-pong protocols introduced by Dolev and Yao. We study the decidability issues associated with two common approaches to checking security properties, namely reachability analys...

  17. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison pr

  18. Automata-theoretic protocol programming

    NARCIS (Netherlands)

    Jongmans, Sung-Shik Theodorus Quirinus

    2016-01-01

    Parallel programming has become essential for writing scalable programs on general hardware. Conceptually, every parallel program consists of workers, which implement primary units of sequential computation, and protocols, which implement the rules of interaction that workers must abide by. As progr

  19. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  20. The Kyoto Protocol and China

    Institute of Scientific and Technical Information of China (English)

    佘巧云

    2005-01-01

    The kyoto Protocol is an agreement to the United Nations Framework Convention on CLimate Change (UNFCCC)2,an international treaty on global warming .It is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by an average of 5.2% compared to the level of 1990 during the 2008-12 period.

  1. Formally Generating Adaptive Security Protocols

    Science.gov (United States)

    2013-03-01

    a proven version of leader election and 2/3 consensus. In 2011 we did the same for a simple version of Paxos. At each stage of the evolution as our... leader election [2] and authentication [4] would suffice for Paxos as well. In preparation for the harder protocols, we had added expressive power to the

  2. Dexamethasone-(C21-phosphoramide-[anti-EGFR]: molecular design, synthetic organic chemistry reactions, and antineoplastic cytotoxic potency against pulmonary adenocarcinoma (A549

    Directory of Open Access Journals (Sweden)

    Coyne CP

    2016-08-01

    did not significantly modify the ex vivo antineoplastic cytotoxicity of dexamethasone against pulmonary adenocarcinoma at and between the standardized dexamethasone equivalent concentrations of 10-9 M and 10-5 M. Rapid increases in antineoplastic cytotoxicity were observed at and between the dexamethasone equivalent concentrations of 10-9 M and 10-7 M where cancer cell death increased from 7.7% to a maximum of 64.9% (92.3%–35.1% residual survival, respectively, which closely paralleled values for “free” noncovalently bound dexamethasone. Discussion: Organic chemistry reaction regimens were optimized to develop a multiphase synthesis regimen for dexamethasone-(C21-phosphoramide-[anti-EGFR]. Attributes of dexamethasone-(C21-phosphoramide-[anti-EGFR] include a high dexamethasone molar incorporation-index, lack of extraneous chemical group introduction, retained EGFR-binding avidity (“targeted” delivery properties, and potential to enhance long-term pharmaceutical moiety effectiveness. Keywords: dexamethasone, anti-EGFR, organic chemistry reactions, synthesis, selective “targeted” delivery, covalent immunopharmaceuticals, EGFR 

  3. Carcinogenicity of the antineoplastic agent, 5-(3,3-dimethyl-1-triazeno)-imidazole-4-carboxamide, and its metabolites in rats.

    Science.gov (United States)

    Beal, D D; Skibba, J L; Croft, W A; Cohen, S M; Bryan, G T

    1975-04-01

    Chronic oral administration of the antineoplastic agent, 5-(3,3-dimethyl-1-triazeno)imidazole-4-carboxamide (NSC-45388, DTIC), induced predominantly thymic and mammary tumors as demonstrated previously. Male and female Sprague-Dawley and female Buffalo rats were susceptible to the carcinogenicity of DTIC. A 50% incidence of mammary adenocarcinomas was induced in males within 18 weeks. Type of tumor and tumor incidence were dose dependent. Single and multiple intraperitoneal injections of DTIC did not alter organ specificity. DTIC-induced thymic lymphosarcomas and mammary adenocarcinomas were transplantable. Tissue distribution studies revealed no correlation between uptake of DTIC by a given tissue and its susceptibility to carcinogenicity. Metabolites of DTIC were tested for carcinogenic activity. Animals administered 5-diazoimidazole-4-carboxamide orally, intraperitoneally, or intragastrically developed low incidences of thymic, stomach, bladder, or mammary tumors. A low incidence of mammary tumors developed in rats fed 2-azahypoxanthine. A variety of tumors, including several ependymoblastomas, were induced in rats that received 5-aminoimidazole-4-carboxamide orally. 5-(3-Methyl-1-triazeno)imidazole-4-carboxamide (MTIC), when fed or given in single or multiple intraperitoneal injections, induced a high incidence of mammary adenofibromas and a low incidence of uterine leiomyosarcomas. Control rats had low incidences of mammary adenocarcinomas and adenofibromas after 52 weeks. These data show that the carcinogenic properties of DTIC resemble those of carcinogenic N-nitroso compounds, hydrazine, azo, and azoxy-alkanes and aryltriazenes and thus suggest similar mechanism(s) of action. These data also indicate that MTIC is involved in the induction of mammary adenofibromas and uterine leiomyosarcomas by DTIC.

  4. Antineoplastic Activity of Compound Recipe Xingqi Preparation%复方星芪制剂抗肿瘤活性的研究

    Institute of Scientific and Technical Information of China (English)

    任小巧; 侯凤飞; 高增平; 胡京红

    2012-01-01

    目的:探讨民间验方复方星芪制剂的抗肿瘤活性.方法:采用小鼠腋下接种肿瘤细胞法测定复方星芪制剂的抗肿瘤活性,MTT法测定复方星芪制剂提取物对小鼠脾细胞的增殖活性.结果:复方星芪方对移植性肿瘤(肉瘤S180和肝癌H22)具有显著的抑制作用,对小鼠脾细胞的增殖具有促进作用,并有较好的剂量依赖关系.结论:复方星芪制剂有抗肿瘤作用,其抗肿瘤作用可能与促进机体免疫有关.%Objective:To study the antineoplastic activity of compound recipe Xingqi preparation. Methods;Use tumor cells vaccination of mice armpit to determine anti-tumor activity and MTT method to determine proliferation activity for spleen cell. Results:The compound recipe Xingqi preparation has significant inhibitory action on portability tumor (sarcoma SI 80 and liver cancer H22) , but promoting effect for spleen cell proliferation and good dose-response relationship. Conclusion: The compound recipe Xingqi preparation has antitu-mor effect and its anti-tumor effects may be concerned with immunization promotion.

  5. Performance Evaluation of MANET Routing Protocols Based on Internet Protocols

    Directory of Open Access Journals (Sweden)

    Hilal Bello Said,

    2015-11-01

    Full Text Available The topology of mobile ad hoc network (MANET changes rapidly and unpredictably due to nodes mobility. This makes routing protocols very important to analyze so as to communicate efficiently between the wireless nodes. Another important issue in the MANET is the internet protocols IPv4 and IPV6. The former which have been conventionally in use for long and the latter which is seen as the future standard for network architecture is studied due to its improved protection and huge address space support. In this paper, performance of AODV, DYMO, OLSRv2 and OLSR are analyzed under the IPv4 and IPv6 standards using the Qualnet simulator. Distinct performance metrics viz. Packet delivery ratio, Throughput, Average End-to-End Delay, and Average jitter are selected for the experiment. The results are then analyzed and scrutinized to provide qualitative assessment of their performances.

  6. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  7. Novel analysis and improvement of Yahalom protocol

    Institute of Scientific and Technical Information of China (English)

    CHEN Chun-ling; YU Han; L(U) Heng-shan; WANG Ru-chuan

    2009-01-01

    The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a novel method of analyzing protocol's security. First, a mathematical model of BAN-Yahalom protocol is constructed. Second, penetrators' abilities are restricted with a rigorous and formalized definition. Moreover, to increase the security of this protocol against potential attackers in practice, a further improvement is made to the protocol. Future application of this re-improved protocol is also discussed.

  8. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    Science.gov (United States)

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-09-08

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency.

  9. Kioto protocol; Protocolo de Kioto

    Energy Technology Data Exchange (ETDEWEB)

    Romero, A.

    2005-07-01

    Atmospheric contamination by greenhouse gases is a global problem, and thus its solution requires global measures. Although the consequences of climate change are questioned and the foreseeable effects are not excessively serious, there are plenty of scientific reasons for all countries to make the necessary efforts to meet the objectives established by the Kyoto Protocol of reducing the six greenhouse gases over the period 2008-2012. Therefore, it seems essential that we understand the nature of the transformation that are occurring in the different systems, what changes they are causing and what costs they incur. Independently of its effectiveness and realism, the Kyoto Protocol is the first regulatory step in the direction of globalization in the environmental field. (Author)

  10. Chapter 14: Chiller Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  11. On using Mobile IP Protocols

    Directory of Open Access Journals (Sweden)

    Fayza A. Nada

    2006-01-01

    Full Text Available The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol has been designed within the IETF to support the mobility of users who wish to connect to the Internet and maintain communications as they move from place to place. This study describes and summarizes the current Internet draft for mobile IP (MIPv4 with its major components: agent discovery, registration and tunneling. In addition, we outline the available encapsulation techniques and route optimization procedure. In the end, we describe the design of the new protocol for transparent routing of IPv6 packets to mobile IPv6 nodes operating in the Internet.

  12. Heuristic Methods for Security Protocols

    Directory of Open Access Journals (Sweden)

    Qurat ul Ain Nizamani

    2009-10-01

    Full Text Available Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  13. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  14. Heuristic Methods for Security Protocols

    OpenAIRE

    Qurat ul Ain Nizamani; Emilio Tuosto

    2009-01-01

    Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  15. New Models for Protocol Security

    Science.gov (United States)

    2015-06-18

    protocols and primitives (e.g., Schnorrs identification scheme, commitment schemes secure against selective openings, Chaum Blind Signatures , etc...Theory 156: 246-268 (2015) 5 3. Samantha Leung, Edward Lui, Rafael Pass: Voting with Coarse Beliefs. ITCS 2015: 61 4. Jing Chen, Silvio Micali, Rafael...Schneider: Multi-Verifier Signatures . J. Cryptology 25(2): 310-348 (2012) 7 37. Rafael Pass, Muthuramakrishnan Venkitasubramaniam: A Parallel Repetition

  16. Automatic analysis of distance bounding protocols

    CERN Document Server

    Malladi, Sreekanth; Kothapalli, Kishore

    2010-01-01

    Distance bounding protocols are used by nodes in wireless networks to calculate upper bounds on their distances to other nodes. However, dishonest nodes in the network can turn the calculations both illegitimate and inaccurate when they participate in protocol executions. It is important to analyze protocols for the possibility of such violations. Past efforts to analyze distance bounding protocols have only been manual. However, automated approaches are important since they are quite likely to find flaws that manual approaches cannot, as witnessed in literature for analysis pertaining to key establishment protocols. In this paper, we use the constraint solver tool to automatically analyze distance bounding protocols. We first formulate a new trace property called Secure Distance Bounding (SDB) that protocol executions must satisfy. We then classify the scenarios in which these protocols can operate considering the (dis)honesty of nodes and location of the attacker in the network. Finally, we extend the const...

  17. DSTC Layering Protocols in Wireless Cooperative Networks

    CERN Document Server

    Elamvazhuthi, P S; Dey, B K

    2008-01-01

    In adhoc wireless relay networks, layers of relays are used to communicate from a source to a destination to achieve better reliability. In this paper, we consider five protocols derived from an earlier proposed protocol, where the relays do a simple processing before transmitting and as a result achieve distributed space-time code. Four of the protocols discussed utilize more complicated relaying schemes than simple layered protocols proposed in earlier literature. We have analyzed the effectiveness of these protocols in various power loss configurations among the paths. Optimum power allocation of the total power among various transmissions have been found by reasonable fine search for all the protocols. Bit error rate plots are compared under optimum power allocation for these protocols. From the simulation results, we draw some guidelines as to which protocol is good for what kind of environment.

  18. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    used to give a formal semantics to security protocols which supports proofs of their correctness. More precisely, we give a compositional event-based semantics to an economical, but expressive, language for describing security protocols (SPL); so the events and dependency of a wide range of protocols......Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  19. The reliable multicast protocol application programming interface

    Science.gov (United States)

    Montgomery , Todd; Whetten, Brian

    1995-01-01

    The Application Programming Interface for the Berkeley/WVU implementation of the Reliable Multicast Protocol is described. This transport layer protocol is implemented as a user library that applications and software buses link against.

  20. ACSEPP On-Line Electronic Payment Protocol

    Institute of Scientific and Technical Information of China (English)

    WANG Shao-bin; ZHU Xian; HONG Fan

    2004-01-01

    With analyzing the existing on-line electronic payment protocols, this paper presents a new on-line electronic payment protocol named ACSEPP: Anonymous, Convenient and Secure Electronic Payment Protocol.Its aim is to design a practical electronic payment protocol which is both secure and convenient.Without using PKI_CA frame, it realized the anonymity of consumer and merchant, the convenient of handling, the low cost of maintenance and the security.

  1. Security Verification of Secure MANET Routing Protocols

    Science.gov (United States)

    2012-03-22

    the destination. The route discovery phase is complete upon receipt of the RREP at the requesting node. The DYMO protocol is a simpler version of AODV ...described in this appendix. The protocols are Secure AODV (SAODV), Secure Efficient Distance Vector (SEAD), and Secure Link State Routing Protocol (SLSP...SECURITY VERIFICATION OF SECURE MANET ROUTING PROTOCOLS THESIS Matthew F. Steele, Captain, USAF AFIT/GCS/ENG/12-03 DEPARTMENT OF THE AIR FORCE AIR

  2. A father protocol for quantum broadcast channels

    CERN Document Server

    Dupuis, F; Dupuis, Fr\\'ed\\'eric; Hayden, Patrick

    2006-01-01

    We present a new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communication. Regularized versions of all three rate regions are provably optimal.

  3. Model checking the HAVi leader election protocol

    OpenAIRE

    Romijn, J.M.T.

    1999-01-01

    The HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the tools Spin and Xtl (from the Caesar/Aldebaran package). It turns out that the protocol does not meet some safety properties and that there are situations in which the protocol may never converge to designate a l...

  4. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  5. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol is formali...

  6. Somatostatin receptor expression in vivo and response to somatostatin analog therapy with or without other antineoplastic treatments in advanced medullary thyroid carcinoma.

    Science.gov (United States)

    Vainas, I; Koussis, Ch; Pazaitou-Panayiotou, K; Drimonitis, A; Chrisoulidou, A; Iakovou, I; Boudina, M; Kaprara, A; Maladaki, A

    2004-12-01

    The long-term treatment of metastatic medullary thyroid carcinoma (MTC) with somatostatin (SST) analogs was evaluated in 22 patients with persistant or relapsed disease and with in vivo positive SST receptor (SSTR) tumors. After surgical intervention all patients but one, initially or at a later time, had persistenly (15) or after relapse (7) elevated serum calcitonin (CT, 252-69482 pg/ml) and carcinoembryonic antigen (CEA, 8-1130 ng/ml) concentrations; also, all of them showed positive uptake in 111In-pentetreotide scanning. Daily doses of 0.4-1.0 mg octreotide subcutaneously, or monthly doses of 20-30 mg long-acting octreotide (LAR) intramuscularly for 3-21 months were administered. Systemic chemotherapy (Ch) with or without external radiotherapy (eRT) was given to 13 patients simultaneously. A beneficial effect on pre-existing diarrhea was observed in 8 patients (subjective partial remmission, sPR 36.4%); 10 other patients showed stable disease, while in 4 a worsening of pre-existing diarrhea was observed. CT and CEA concentrations decreased more than 25% in 4 out of 22 patients (18%) and 11 patients showed a decrease of less than 25% (biological SD). No objective response in tumour growth was demonstrated. Patients (10 survivors in group B) treated with Ch+eRT plus Octerotide showed higher sR (92.5%), lower mortality (23.1%), longer mean time to death (130 months) and longer mean total survival (mts) time (145 months) in comparison to group A patients who had 66.7% sR, 33.3% mortality, only 88.5 months mean time to death and 101 months mts-time. Long-term octreotide and octreotide-LAR treatment offers a subjective and biological partial remission in one third and in one fourth of the MTC patients respectively, but it does not improve the natural course of the tumor. It remains to be answered if these drugs, combined with other antineoplastic therapies, have a synergistic effect relating to treatment response and to patient survival and mortality.

  7. Sequence Patterns of Identity Authentication Protocols

    Institute of Scientific and Technical Information of China (English)

    Tao Hongcai; He Dake

    2006-01-01

    From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication,and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then , according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.

  8. Analysing ZigBee Key Establishment Protocols

    CERN Document Server

    Yüksel, Ender

    2012-01-01

    In this report, we present our approach for protocol analysis together with a real example where we find an important flow in a contemporary wireless sensor network security protocol. We start by modelling protocols using a specific process algebraic formalism called LySa process calculus. We then apply an analysis based on a special program analysis technique called control flow analysis. We apply this technique to the ZigBee-2007 End-to-End Application Key Establishment Protocol and with the help of the analysis discover an unknown flaw. Finally we suggest a fix for the protocol, and verify that the fix works by using the same technique.

  9. INEEL AIR MODELING PROTOCOL ext

    Energy Technology Data Exchange (ETDEWEB)

    C. S. Staley; M. L. Abbott; P. D. Ritter

    2004-12-01

    Various laws stemming from the Clean Air Act of 1970 and the Clean Air Act amendments of 1990 require air emissions modeling. Modeling is used to ensure that air emissions from new projects and from modifications to existing facilities do not exceed certain standards. For radionuclides, any new airborne release must be modeled to show that downwind receptors do not receive exposures exceeding the dose limits and to determine the requirements for emissions monitoring. For criteria and toxic pollutants, emissions usually must first exceed threshold values before modeling of downwind concentrations is required. This document was prepared to provide guidance for performing environmental compliance-driven air modeling of emissions from Idaho National Engineering and Environmental Laboratory facilities. This document assumes that the user has experience in air modeling and dose and risk assessment. It is not intended to be a "cookbook," nor should all recommendations herein be construed as requirements. However, there are certain procedures that are required by law, and these are pointed out. It is also important to understand that air emissions modeling is a constantly evolving process. This document should, therefore, be reviewed periodically and revised as needed. The document is divided into two parts. Part A is the protocol for radiological assessments, and Part B is for nonradiological assessments. This document is an update of and supersedes document INEEL/INT-98-00236, Rev. 0, INEEL Air Modeling Protocol. This updated document incorporates changes in some of the rules, procedures, and air modeling codes that have occurred since the protocol was first published in 1998.

  10. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  11. Authenticating Tripartite Key Agreement Protocol with Pairings

    Institute of Scientific and Technical Information of China (English)

    Sheng-Li Liu; Fang-Guo Zhang; Ke-Fei Chen

    2004-01-01

    In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.

  12. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  13. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    of formal protocol verification. Verification, however, is usually carried out on an abstract model not at all related with a protocol’s implementation. Experience shows that security breaches introduced in implementations of successfully verified models are rather common. The χ-Spaces framework...... is an implementation of SPL (Security Protocol Language), a formal model for studying security protocols. In this paper we discuss the use of χ-Spaces as a tool for developing robust security protocol implementations. To make the case, we take a family of key-translation protocols due to Woo and Lam and show how χ-Spaces......It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  14. A Secure Short Message Communication Protocol

    Institute of Scientific and Technical Information of China (English)

    Chao-Wen Chang; Heng Pan; Hong-Yong Jia

    2008-01-01

    According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway are realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application.

  15. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order......We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... to ensure the finiteness of the protocol state-spaces while still being able to verify interesting protocol properties. The translations for different kinds of communication media have been implemented and successfully tested, among others, on agreement protocols from WS-Business Activity....

  16. Research on Container Behaviors Protocol

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With the development of middleware technology, there are some new features to be adopted on demand in middleware platform based on container component. Aiming at the adaptation of middleware platform, from the nature of component container, this paper begins with behaviors features of EJB (Enterprise Java Bean) container, extracts general behaviors protocol of container, and defines its formal behaviors specification. In the end, the interactive relationship of components is described by WRIGHT language, and the configuration of whole system is shown. The method proposed in this paper mines the hidden features of framework of component container, and applies to refactor middleware platform in reflection and aspect-oriented programming technology.

  17. New Models for Population Protocols

    CERN Document Server

    Michail, Othon

    2010-01-01

    Wireless sensor networks are about to be part of everyday life. Homes and workplaces capable of self-controlling and adapting air-conditioning for different temperature and humidity levels, sleepless forests ready to detect and react in case of a fire, vehicles able to avoid sudden obstacles or possibly able to self-organize routes to avoid congestion, and so on, will probably be commonplace in the very near future. Mobility plays a central role in such systems and so does passive mobility, that is, mobility of the network stemming from the environment itself. The population protocol model was

  18. Experimental quantum multiparty communication protocols

    Science.gov (United States)

    Smania, Massimiliano; Elhassan, Ashraf M.; Tavakoli, Armin; Bourennane, Mohamed

    2016-06-01

    Quantum information science breaks limitations of conventional information transfer, cryptography and computation by using quantum superpositions or entanglement as resources for information processing. Here we report on the experimental realisation of three-party quantum communication protocols using single three-level quantum system (qutrit) communication: secret-sharing, detectable Byzantine agreement and communication complexity reduction for a three-valued function. We have implemented these three schemes using the same optical fibre interferometric setup. Our realisation is easily scalable without compromising on detection efficiency or generating extremely complex many-particle entangled states.

  19. A structured data transfer protocol

    Science.gov (United States)

    Barrett, P.; Rots, A.

    1992-01-01

    The transfer of data between different computers and programs can be a major obstacle during data analysis. We present a new data transfer protocol which is based on a simple structure containing a value, an error, and a unit. Each of these members can be arrays or another structure. The ability to nest structures allows for the concept of objects. When using an object-oriented language such as C++, reference can be made to the object name instead of each element explicitly. Prototype code has been written which implements the basic design with enhancements planned for the future.

  20. [Adherence to oral antineoplastic therapy].

    Science.gov (United States)

    Olivera-Fernandez, R; Fernandez-Ribeiro, F; Piñeiro-Corrales, G; Crespo-Diz, C

    2014-11-03

    Introducción: Los tratamientos antineoplasicos orales presentan ventajas en cuanto a coste, comodidad y mejora potencial en la calidad de vida respecto al tratamiento endovenoso, pero es mas dificil controlar la adherencia y monitorizar los efectos adversos. El objetivo de este estudio fue conocer la adherencia real en pacientes con antineoplasicos orales en nuestro centro, analizar la influencia de las caracteristicas del paciente y del tratamiento, identificar motivos de no adherencia, oportunidades de mejora en la atencion farmaceutica y evaluar la posible relacion adherencia y respuesta al tratamiento. Método: estudio prospectivo observacional de cuatro meses de duracion, en los pacientes con tratamiento antineoplasico oral dispensado desde la consulta de farmacia oncologica. Para la recogida de datos se utilizaron: orden medica, historia clinica y visita con entrevistas al paciente. Resultados: Se evaluaron un total de 141 pacientes. Un 72% se considero totalmente adherente, mientras que en un 28% se detecto algun tipo de no adherencia. El tiempo desde el diagnostico y la presencia de efectos adversos fueron las variables que afectaron a la adherencia. No se pudo demostrar relacion entre adherencia y respuesta al tratamiento. Conclusiones: La adherencia al tratamiento antineoplasico oral en nuestro centro fue del 72%, identificando oportunidades de mejora en la atencion farmaceutica dirigidas a prevenir los efectos adversos y a potenciar la adherencia de nuestros pacientes.

  1. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  2. Research on Routing Protocol of Mobile Ad Hoc Network

    OpenAIRE

    Tuo Ming Fu; Che Min

    2016-01-01

    Routing protocol is an important content of mobile Ad Hoc. The typical mobile Ad Hoc network routing protocols is introduced. The advantages and disadvantages of these routing protocols are analyzed. A hybrid routing protocol is put forward based on this.

  3. VANET Routing Protocols: Pros and Cons

    CERN Document Server

    Paul, Bijan; Bikas, Md Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol has taken significant attention. So, it is very necessary to identify the pros and cons of routing protocols which can be used for further improvement or development of any new routing protocol. This paper presents the pros and cons of VANET routing protocols for inter vehicle communication.

  4. Developing practice protocols for advanced practice nursing.

    Science.gov (United States)

    Paul, S

    1999-08-01

    In most states, the role of an advanced practice nurse is dependent on practice protocols that provide an organized method for analyzing and managing a disease or major symptom. They are also used to control the process of medical care and to specify steps in the delivery of that care. Creating appropriate practice protocols is one of the most important precursors to implementing the advanced practice role, because they virtually drive the clinician's ability to treat or manage clinical situations or disease states. This article outlines the steps involved in developing practice protocols and discusses the content that should be included in a protocol, providing an example of narrative and algorithm format protocols. Pros and cons, as well as legal issues related to practice protocols, are also presented.

  5. Merging Multiparty Protocols in Multiparty Choreographies

    Directory of Open Access Journals (Sweden)

    Fabrizio Montesi

    2013-02-01

    Full Text Available Choreography-based programming is a powerful paradigm for defining communication-based systems from a global viewpoint. A choreography can be checked against multiparty protocol specifications, given as behavioural types, that may be instantiated indefinitely at runtime. Each protocol instance is started with a synchronisation among the involved peers. We analyse a simple transformation from a choreography with a possibly unbounded number of protocol instantiations to a choreography instantiating a single protocol, which is the merge of the original ones. This gives an effective methodology for obtaining new protocols by composing existing ones. Moreover, by removing all synchronisations required for starting protocol instances, our transformation reduces the number of communications and resources needed to execute a choreography.

  6. Symmetric cryptographic protocols for extended millionaires' problem

    Institute of Scientific and Technical Information of China (English)

    LI ShunDong; WANG DaoShun; DAI YiQi

    2009-01-01

    Yao's millionaires' problem is a fundamental problem in secure multiparty computation, and its solutions have become building blocks of many secure multiparty computation solutions. Unfortunately,most protocols for millionaires' problem are constructed based on public cryptography, and thus are inefficient. Furthermore, all protocols are designed to solve the basic millionaires' problem, that is,to privately determine which of two natural numbers is greater. If the numbers are real, existing solutions do not directly work. These features limit the extensive application of the existing protocols. This study introduces and refines the first symmetric cryptographic protocol for the basic millionaires' problem, and then extends the symmetric cryptographic protocol to privately determining which of two real numbers is greater, which are called the extended millionaires' problem, and proposes corresponding Constructed based on symmetric cryptography, these protocols are very efficient.

  7. E-Cash Payment Protocols

    Directory of Open Access Journals (Sweden)

    Shweta Srivastava

    2012-09-01

    Full Text Available E-cash is a payment system designed and implemented for making purchases over open networks such as the Internet. Need of a payment system which enables the electronic transactions are growing at the same time that the use of Internet is growing in our daily life. Present days electronic payment systems have a major problem, they cannot handle the security and the users anonymity and at the same time these systems are secure on the cost of their users anonymity. This paper shows the payment protocols for digital cash and discusses how a digital cash system can be formed by presenting a few of the present days digital cash systems in details. We also provide a comparison and determine them together to see which one of them fulfils the properties for digital cash and the required security level.

  8. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  9. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    secret sharing in terms of simple algebraic conditions on the integer sharing coefficients, and we propose a black-box secret sharing scheme with minimal expansion factor. Note that, in contrast to the classical field-based secret sharing schemes, a black-box secret sharing scheme allows to share......, MPC can be based on arbitrary finite rings. This is in sharp contrast to the literature where essentially all MPC protocols require a much stronger mathematical structure, namely a field. Apart from its theoretical value, this can lead to efficiency improvements since it allows a greater freedom...... ones. We also construct a noninteractive distributed-verifier proof of circuit satisfiability, which—in principle—allows to prove anything that can be proven without giving away the proof....

  10. [Climate change and Kyoto protocol].

    Science.gov (United States)

    Ergasti, G; Pippia, V; Murzilli, G; De Luca D'Alessandro, E

    2009-01-01

    Due to industrial revolution and the heavy use of fossil fuels, the concentration of greenhouse gases in the atmosphere has increased dramatically during the last hundred years, and this has lead to an increase in mean global temperature. The environmental consequences of this are: the melting of the ice caps, an increase in mean sea-levels, catastrophic events such as floodings, hurricanes and earthquakes, changes to the animal and vegetable kingdoms, a growth in vectors and bacteria in water thus increasing the risk of infectious diseases and damage to agriculture. The toxic effects of the pollution on human health are both acute and chronic. The Kyoto Protocol is an important step in the campaign against climatic changes but it is not sufficient. A possible solution might be for the States which produce the most of pollution to adopt a better political stance for the environment and to use renewable resources for the production of energy.

  11. [The research protocol. Part I].

    Science.gov (United States)

    Miranda-Novales, María Guadalupe; Villasís-Keever, Miguel Ángel

    2015-01-01

    One of the principal aims in research is the publication of the study in scientific journals. This implies two challenges: the first one, the election of an adequate research design, and the second one, the concrete and simple wording of the results for the study to be accepted in the most appropriate journal according to the scope. Despite numerous supporting documents are available for both issues, the publication process is long, tiresome, and can discourage the most enthusiastic researcher. This is the first of a series of articles with the objective to describe the steps from the research question to the publication of the study. First of all, the importance of the research design will be addressed. The structure of the protocol is essential to achieve the objectives, and provides a way to organize the investigation in a logic, comprehensible and efficient manner.

  12. Liquid-liquid extraction combined with high performance liquid chromatography-diode array-ultra-violet for simultaneous determination of antineoplastic drugs in plasma

    Directory of Open Access Journals (Sweden)

    Ananda Lima Sanson

    2011-06-01

    Full Text Available A liquid-liquid extraction (LLE combined with high-performance liquid chromatography-diode array detection method for simultaneous analysis of four chemically and structurally different antineoplastic drugs (cyclophosphamide, doxorubicin, 5-fluorouracil and ifosfamide was developed. The assay was performed by isocratic elution, with a C18 column (5 µm, 250 x 4.6 mm and mobile phase constituted by water pH 4.0- acetonitrile-methanol (68:19:13, v/v/v, which allowed satisfactory separation of the compounds of interest. LLE, with ethyl acetate, was used for sample clean-up with recoveries ranging from 60 to 98%. The linear ranges were from 0.5 to 100 µg mL-1, for doxorubicin and 1 to 100 µg mL-1, for the other compounds. The relative standard deviations ranged from 5.5 to 17.7%. This method is a fast and simple alternative that can be used, simultaneously, for the determination of the four drugs in plasma, with a range enabling quantification of the drugs in pharmacokinetics, bioequivalence and therapeutic drug-monitoring studies.Um método de extração líquido-líquido (ELL combinado com cromatografia líquida de alta eficiência-detector de arranjo de diodos foi desenvolvido para análise simultânea de quatro fármacos antineoplásicos quimicamente e estruturalmente diferentes (ciclofosfamida, doxorrubicina, fluoruracila e ifosfamida. O estudo foi realizado sob condições isocráticas, com coluna C18 (5µm, 250 x 4.6 mm e fase móvel constituída por água pH 4.0-acetonitrila-metanol (68:19:13, v/v/v, que permitiu separação satisfatória dos analitos de interesse. A ELL, com acetato de etila, foi utilizada para limpeza da amostra, com recuperação variando de 60 a 98%. As faixas foram lineares de 0,5 a 100 µg mL-1 para doxorrubicina e 1 a 100 µg mL-1 para os outros compostos. O desvio padrão relativo variou de 5,5 a 17,7%. Este método é uma alternativa rápida e simples que pode ser usado, simultaneamente, para a determinação dos

  13. Experimental Study of Pharmacology of Antineoplastic Pemetrexed%抗肿瘤药培美曲塞的药理实验研究

    Institute of Scientific and Technical Information of China (English)

    宋吉; 姜雨薇; 申莹; 潘本刚

    2016-01-01

    Objective:To analyze the pharmacological basis of antineoplastic Pei pemetrexed and clinical efficacy of the drug. Methods:Through access to information and conduct pharmacological studies,analysis of the mechanism of antitumor culture of pemetrexed,pharmacodynamics,pharmacokinetics,adverse reactions,tolerance and resistance mechanisms,by clinical reports on the inspection training clinical study of pemetrexed treatment of malignant tumors,analysis of anti-tumor efficacy of the drug.Results:① Mechanism:Pemetrexed through antagonism has folic acid,can inhibit tumor cell replication;②pharmacodynamics:Pemetrexed has a broad-spectrum anti-tumor activity;③Pharmacokinetics:pemetrexed is drug metabolism in line with the multi-chamber models, limited distribution within the organization,the rapid removal of the urine,the mean half-life of 2 ~ 3h;④ adverse reactions:pemetrexed common adverse reactions,including cases of ZTE cells decreased,diarrhea,mucositis,nausea,and vomiting;⑤ tolerance:pemetrexed low severity of adverse reactions,is well tolerated;⑥resistance mechanisms:resistance mechanisms pemetrexed mainly leaf acid polyglutamate synthase.⑦ drug efficacy analysis found that pemetrexed can improve cancer patients disease treatment efficiency,prolong survival.Conclusion:The unique pharmacological effects of pemetrexed has,can effectively reduce the mortality of cancer patients.%分析了抗肿瘤药培美曲塞的药理作用以及该种药物的临床疗效。通过查阅资料以及开展药理研究,分析抗肿瘤药培美曲塞的作用机制、药效学、药代动力学、不良反应、耐受性以及耐药机制,通过查阅临床上报道的关于培美曲塞治疗恶性肿瘤的临床研究,分析该种药物的抗肿瘤功效。通过药理实验,得出以下结果:①作用机制:培美曲塞通所具有的叶酸拮抗作用,能够抑制肿瘤细胞复制;②药效学:培美曲塞具有广谱抗肿瘤活性;③药代动

  14. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Ching-Nung Yang; Su-Hsuan Chu; Bing-Ling Lu

    2005-01-01

    Kak's quantum key distribution (QKD) protocol provides not only the distribution but also the integrity of secret key simultaneously in quantum channel. Consequently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the failure of Kak's protocol and show that Kak's protocol does not have the joint distribution and integration that the author declares in [1].

  15. The Braid-Based Bit Commitment Protocol

    Institute of Scientific and Technical Information of China (English)

    WANG Li-cheng; CAO Zhen-fu; CAO Feng; QIAN Hai-feng

    2006-01-01

    With recent advances of quantum computation, new threats have closed in upon to the classical public key cryptosystems. In order to build more secure bit commitment schemes, this paper gave a survey of the new coming braid-based cryptography and then brought forward the first braid-based bit commitment protocol. The security proof manifests that the proposed protocol is computationally binding and information-theoretically hiding.Furthermore, the proposed protocol is also invulnerable to currently known quantum attacks.

  16. Reasoning about Protocol Change and Knowledge

    Science.gov (United States)

    Wang, Yanjing

    In social interactions, protocols govern our behaviour and assign meaning to actions. In this paper, we investigate the dynamics of protocols and their epistemic effects. We develop two logics, inspired by Propositional Dynamic Logic (PDL) and Public Announcement Logic (PAL), for reasoning about protocol change and knowledge updates. We show that these two logics can be translated back to the standard PDL and PAL respectively.

  17. An Identity- Based Key- Exchange Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ya-juan; ZHU Yue-fei; HUANG Qiu-sheng

    2005-01-01

    An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure(session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diffie-Hellmen) assumption is correct. Then we apply the signature-based authenticator to our protocol and obtain an identity-Based key-exchange protocol that is SK-secure in the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.

  18. Traffic Performance Analysis of Manet Routing Protocol

    CERN Document Server

    Rajeswari, S; 10.5121/ijdps.2011.2306

    2011-01-01

    The primary objective of this research work is to study and investigate the performance measures of Gossip Routing protocol and Energy Efficient and Reliable Adaptive Gossip routing protocols. We use TCP and CBR based traffic models to analyze the performance of above mentioned protocols based on the parameters of Packet Delivery Ratio, Average End-to-End Delay and Throughput. We will investigate the effect of change in the simulation time and Number of nodes for the MANET routing protocols. For Simulation, we have used ns-2 simulator.

  19. Secure Key Management Protocol in WIMAX

    Directory of Open Access Journals (Sweden)

    Noudjoud Kahya

    2012-12-01

    Full Text Available The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16, is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS to Subscriber Station (SS. In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. Wefound that PKMv2 is vulnerable to replay, DoS, Man-in-the middle attacks. At last we have proposed asecure protocol (SPKM to prevent the authorization protocol from such attacks.

  20. Status Report on the UNIDROIT Space Protocol

    Science.gov (United States)

    Larsen, Paul B.

    2002-01-01

    In my status report on the UNIDROIT Space Protocol I will describe the history and purpose of the Space Protocol; I will state the Protocol's relationship to the UNIDROIT Convention on International Interests in Mobile Equipment in particular after the 2001 Cape Town Diplomatic Conference on the Convention. I will describe the COPUOS study of possible conflicts with the existing space law treaties and explain UNIDROIT's objective of avoiding conflicts between existing space law and the Space Protocol. Finally I will describe future steps to be taken.

  1. A formal model of fair exchange protocols

    Institute of Scientific and Technical Information of China (English)

    QING Sihan; LI Gaicheng

    2005-01-01

    Based on the study of existing fair exchange protocols, this paper sets up an accurate formal model by stepwise refinement. In the process of refinement an unreliable channel is employed to simulate an attack behavior. The model provides a novel formal definition of exchanged items, and presents the formal goals for fairness, accountability,etc., reflecting the inherent requirements for fair exchange protocols across-the-board. In order to check, prove, and design fair exchange protocols effectively and efficiently, the model puts forward a novel property of abuse-freeness which applies to all fair exchange protocols, gives a formal definition for trust strand of the third party, and presents general criteria of designing a secure and effective fair exchange protocol. Taking a typical fair exchange protocol as an example, this paper presents the analysis steps of fair exchange protocols appealing to our model. An unknown attack is uncovered. The analysis reveals the process of a complete attack, discovering deeper reasons for causing an attack.Finally, we modify the flawed protocol and the revised protocol ensures the desirable properties.

  2. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  3. Wireless sensors networks MAC protocols analysis

    CERN Document Server

    Chaari, Lamia

    2010-01-01

    Wireless sensors networks performance are strictly related to the medium access mechanism. An effective one, require non-conventional paradigms for protocol design due to several constraints. An adequate equilibrium between communication improvement and data processing capabilities must be accomplished. To achieve low power operation, several MAC protocols already proposed for WSN. The aim of this paper is to survey and to analyze the most energy efficient MAC protocol in order to categorize them and to compare their performances. Furthermore we have implemented some of WSN MAC protocol under OMNET++ with the purpose to evaluate their performances.

  4. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  5. A New Watermarking Protocol against Conspiracy

    Institute of Scientific and Technical Information of China (English)

    ZHANG Jun; KOU Weidong; FAN Kai; CAO Xuefei

    2006-01-01

    A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.

  6. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  7. Inhibition of DNA and Histone Methylation by 5-Aza-2′-Deoxycytidine (Decitabine) and 3-Deazaneplanocin-A on Antineoplastic Action and Gene Expression in Myeloid Leukemic Cells

    Science.gov (United States)

    Momparler, Richard L.; Côté, Sylvie; Momparler, Louise F.; Idaghdour, Youssef

    2017-01-01

    Epigenetic alterations play an important role in the development of acute myeloid leukemia (AML) by silencing of genes that suppress leukemogenesis and differentiation. One of the key epigenetic changes in AML is gene silencing by DNA methylation. The importance of this alteration is illustrated by the induction of remissions in AML by 5-aza-2′-deoxycytidine (5-AZA-CdR, decitabine), a potent inhibitor of DNA methylation. However, most patients induced into remission by 5-AZA-CdR will relapse, suggesting that a second agent should be sought to increase the efficacy of this epigenetic therapy. An interesting candidate for this purpose is 3-deazaneplanocin A (DZNep). This analog inhibits EZH2, a histone methyltransferase that trimethylates lysine 27 histone H3 (H3K27me3), a marker for gene silencing. This second epigenetic silencing mechanism also plays an important role in leukemogenesis as shown in preclinical studies where DZNep exhibits potent inhibition of colony formation by AML cells. We reported previously that 5-AZA-CdR in combination with DZNep exhibits a synergistic antineoplastic action against human HL-60 AML cells and the synergistic activation of several tumor suppressor genes. In this report, we showed that this combination also induced a synergistic activation of apoptosis in HL-60 cells. The synergistic antineoplastic action of 5-AZA-CdR plus DZNep was also observed on a second human myeloid leukemia cell line, AML-3. In addition, 5-AZA-CdR in combination with the specific inhibitors of EZH2, GSK-126, or GSK-343, also exhibited a synergistic antineoplastic action on both HL-60 and AML-3. The combined action of 5-AZA-CdR and DZNep on global gene expression in HL-60 cells was investigated in greater depth using RNA sequencing analysis. We observed that this combination of epigenetic agents exhibited a synergistic activation of hundreds of genes. The synergistic activation of so many genes that suppress malignancy by 5-AZA-CdR plus DZNep suggests that

  8. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  9. Attempts at the production of more selective antitumourals. Part I. The antineoplastic activity of cyclophosphazenes linked to the polyamines 1,3-diaminopropane and 1,4-diaminobutane (putrescine)

    Science.gov (United States)

    Labarre, Jean-François; Guerch, Guy; Sournies, François; Spreafico, Federico; Filippeschi, Stefania

    1984-06-01

    In an attempt to design antitumour cyclophosphazenes of improved specificity by linking them to some natural tumour finders, we studied the binding of gem-N 3P 3Az 4Cl 2 to 1,3-diaminopropane and 1,4-diaminobutane (putrescine). Synthesis, mass spectrum and NMR as well as X-ray crystal structures of the two spirocyclic N 3P 3Az 4 [HN(CH 2) 3,4NH] derivatives (in which the N 3P 3Az 4 active principle is linked to the diamine in a spiro configuration) are described. Results obtained with these compounds in 3 murine tumour systems (L1210 and P388 leukaemias and P815 mastocytoma), showing their potent antineoplastic activity in vivo obtainable at well-tolerated doses, are also described.

  10. Comment on "flexible protocol for quantum private query based on B92 protocol"

    Science.gov (United States)

    Chang, Yan; Zhang, Shi-Bin; Zhu, Jing-Min

    2017-03-01

    In a recent paper (Quantum Inf Process 13:805-813, 2014), a flexible quantum private query (QPQ) protocol based on B92 protocol is presented. Here we point out that the B92-based QPQ protocol is insecure in database security when the channel has loss, that is, the user (Alice) will know more records in Bob's database compared with she has bought.

  11. Mobile IPv6 Protocols and Implementation

    CERN Document Server

    Li, Qing; Shima, Keiichi

    2009-01-01

    Mobile IPv6 has become the key enabling technology for mobile data and multimedia services and devices worldwide. This book covers the IPv6 host mobility protocol known as 'mobile IPv6' and begins with a basic description of mobile IPv6 and then details protocol specifications and data structures as well as actual implementation.

  12. Performance of a connectionless protocol over ATM

    NARCIS (Netherlands)

    Heijenk, Geert J.; Moorsel, van Aad P.A.; Niemegeers, Ignas G.

    1992-01-01

    Recent studies show the existence of a demand for a connectionless broadband service. In order to cope with this demand, a connectionless protocol for the B-ISDN needs to be designed. Such a protocol should make use of ATM and the ATM Adaptation Layer. It needs to specify destination and bandwidth o

  13. Algebraic techniques for low communication secure protocols

    NARCIS (Netherlands)

    Haan, Robbert de

    2009-01-01

    This thesis discusses new results in two areas within cryptography; securely transmitting a message between two parties and securely computing a function on the inputs of multiple parties. For both of these areas we mainly consider perfectly secure protocols, which are protocols that have a zero err

  14. Summary Report on Rational Cryptographic Protocols

    DEFF Research Database (Denmark)

    Alwen, Joël; Cachin, Christian; Pereira, Olivier

    This report gives an overview of some of the models and techniques in rational cryptography, an emerging research area which in particular uses the methodologies and techniques of game theory to analyze cryptographic protocols and which uses cryptographic protocol theory to implement game theoretic...

  15. Secure Geographic Routing Protocols: Issues and Approaches

    CERN Document Server

    sookhak, Mehdi; Haghparast, Mahboobeh; ISnin, Ismail Fauzi

    2011-01-01

    In the years, routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN) and also provide a qualitative comparison of them.

  16. Beveiliging Internet Protocol beter en beter

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    1999-01-01

    Iedereen die gebruik maakt van e-mail, internet, intranet of extranet maakt gebruik van het in de jaren 7O ontworpen IP het Internet Protocol. Dit protocol zorgt ervoor dat toegang tot de diverse internetdiensten mogelijk is. Iedere computer die op internet wordt aangesloten, krijgt een eigen IP-adr

  17. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    Pang, J.

    2002-01-01

    Needham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over insecure open netwo

  18. Diagrammatization of the Transmission Control Protocol

    Directory of Open Access Journals (Sweden)

    Sabah Al-Fedaghi

    2012-09-01

    Full Text Available With the wide spread of Internet services, developers and users need a greater understanding of the technology of networking. Acquiring a clear understanding of communication protocols is an important step in understanding how a network functions; however, many protocols are complicated, and explaining them can be demanding. In addition, protocols are often explained in terms of traffic analysis and oriented toward technical staff and those already familiar with network protocols. This paper aims at proposing a diagrammatic methodology to represent protocols in general, with a focus on the Transmission Control Protocol and Secure Sockets Layer in particular. The purpose is to facilitate understanding of protocols for learning and communication purposes. The methodology is based on the notion of flow of primitive things in a system with six stages: creation, release, transfer, arrival, acceptance, and processing. Though the method presents a basic description of protocols without in-depth analysis of all aspects and mechanisms, the resultant conceptual description is a systematic specification that utilizes a few basic notions that assist in illustrating functionality and support comprehension.

  19. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  20. Concurrent Validity of a Pragmatic Protocol.

    Science.gov (United States)

    Duncan, Julie Condon; Perozzi, Joseph A.

    1987-01-01

    The scores of 11 non-handicapped kindergarten children on the Pragmatic Protocol (used in assessing language-handicapped children) were correlated with their ratings by five experienced judges on a 7-point equal-appearing interval scale of communicative competence. The concurrent validity of the Protocol and interobserver reliability were…

  1. The Formal Specifications for Protocols of Decoders

    Institute of Scientific and Technical Information of China (English)

    YUAN Meng-ting; WU Guo-qing; SHU Feng-di

    2004-01-01

    This paper presents a formal approach, FSPD (Formal Specifications for Protocols of Decoders), to specify decoder communication protocols. Based on axiomatic, FSPD is a precise language with which programmers could use only one suitable driver to handle various types of decoders. FSPD is helpful for programmers to get high adaptability and reusability of decoder-driver software.

  2. A Survey on Distance Vector Routing Protocols

    CERN Document Server

    Tang, Linpeng

    2011-01-01

    In this paper we give a brief introduction to five different distance vector routing protocols (RIP, AODV, EIGRP, RIP-MTI and Babel) and give some of our thoughts on how to solve the count to infinity problem. Our focus is how distance vector routing protocols, based on limited information, can prevent routing loops and the count to infinity problem.

  3. Welfare monitroing system : assessment protocol for horses

    NARCIS (Netherlands)

    Livestock Research,

    2012-01-01

    This document describes the protocol for horses in more detail. For the development of the protocol the Welfare Quality® framework was used. For each measure there is a description how to assess the measure including the method of classification.

  4. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    Romijn, J.M.T.

    1999-01-01

    The HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the tools Spin a

  5. Secure Geographic Routing Protocols: Issues and Approaches

    Directory of Open Access Journals (Sweden)

    Mehdi sookhak

    2011-09-01

    Full Text Available In the years, routing protocols in wireless sensor networks (WSN have been substantially investigated by researches Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN and also provide a qualitative comparison of them.

  6. Treatment protocols for cervical cancer

    Directory of Open Access Journals (Sweden)

    Vujkov Tamara

    2002-01-01

    Full Text Available Introduction Cervical cancer is the second most common cancer in women worldwide and the second cause of cancer death among women. About 95% (90% in developed countries of invasive carcinomas are of sqamous types, and 5% (10% in developed countries are adenocarcinomas. FIGO classification of cervical carcinomas, based on clinical staging and prognostic factor dictate therapeutic procedures and help in designing treatment protocols. Therapeutic modalities Surgical therapy includes conization, radical hysterectomy with pelvic lymphadenectomy and palliative operation urinary diversion and colostomy. Radiotherapy, brachytherapy and teletherapy are most recently combined with chemotherapy as concurrent chemoradiation. Discussion and conclusion No change in therapeutic modalities will ever decrease mortality rate of cervical carcinoma as much as education, prevention and early screening. The 5-year survival for locally advanced disease has not improved during the last 40 years as a result of failure to deliver therapy to the paraaortic region. Paraaortic lymph nodes should be evaluated before therapy planning by different imaging procedures, or more exactly by surgical staging: laparoscopy or laparotomy. Radical operations of cervical carcinoma should be performed by experienced surgeons, educated for this type of operation, with sufficient number of cases.

  7. Security Weaknesses in Arbitrated Quantum Signature Protocols

    Science.gov (United States)

    Liu, Feng; Zhang, Kejia; Cao, Tianqing

    2014-01-01

    Arbitrated quantum signature (AQS) is a cryptographic scenario in which the sender (signer), Alice, generates the signature of a message and then a receiver (verifier), Bob, can verify the signature with the help of a trusted arbitrator, Trent. In this paper, we point out there exist some security weaknesses in two AQS protocols. Our analysis shows Alice can successfully disavow any of her signatures by a simple attack in the first protocol. Furthermore, we study the security weaknesses of the second protocol from the aspects of forgery and disavowal. Some potential improvements of this kind of protocols are given. We also design a new method to authenticate a signature or a message, which makes AQS protocols immune to Alice's disavowal attack and Bob's forgery attack effectively.

  8. Cryptanalysis of the arbitrated quantum signature protocols

    Science.gov (United States)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-08-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  9. Cryptanalysis of the arbitrated quantum signature protocols

    CERN Document Server

    Gao, Fei; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-01-01

    As a new model for signing quantum message, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver Bob can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender Alice can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics in future study on AQS protocols.

  10. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......, one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  11. Quantum Communication Complexity of Quantum Authentication Protocols

    CERN Document Server

    Guedes, Elloá B

    2011-01-01

    In order to perform Quantum Cryptography procedures it is often essencial to ensure that the parties of the communication are authentic. Such task is accomplished by quantum authentication protocols which are distributed algorithms based on the intrinsic properties of Quantum Mechanics. The choice of an authentication protocol must consider that quantum states are very delicate and that the channel is subject to eavesdropping. However, even in face of the various existing definitions of quantum authentication protocols in the literature, little is known about them in this perspective, and this lack of knowledge may unfavor comparisons and wise choices. In the attempt to overcome this limitation, in the present work we aim at showing an approach to evaluate quantum authentication protocols based on the determination of their quantum communication complexity. Based on our investigation, no similar methods to analyze quantum authentication protocols were found in the literature. Pursuing this further, our approa...

  12. Similarity based mixed transaction concurrency control protocol

    Institute of Scientific and Technical Information of China (English)

    PAN Yi; LU Yan-sheng

    2005-01-01

    Due to the various performance requirements and data access restrictions of different types of real-time transactions, concurrency control protocols which had been designed for the systems with single type of transactions are not sufficient for mixed real-time database systems (MRTDBS), where different types of real-time transactions coexist in the systems concurrently. In this paper, a new concurrency control protocol MRTT_CC for mixed real-time transactions is proposed. The new strategy integrates with different concurrency control protocols to meet the deadline requirements of different types of real-time transactions. The data similarity concept is also explored in the new protocol to reduce the blocking time of soft real-time transactions, which increases their chances to meet the deadlines. Simulation experiments show that the new protocol has gained good performance.

  13. Multicast Protocol for Uni-Directional Networks

    Institute of Scientific and Technical Information of China (English)

    黄皓; 陈贵海; 谢立; 孙钟秀

    2000-01-01

    A very inexpensive receive-only satellite receiver can receive high bandwidth traffic from a feeder. Therefore the connection between the feeder and the receiver is uni-directional. The existing routing protocols, such as Link-State and Distance-Vector, are designed on the premise that any links are bidirectional and they cannot handle the uni-directional links. In this paper, a dynamic multicast routing protocol is proposed, which can handle uni-directional networks. This protocol can also adapt to the dynamic change of the topology of the network and has good scalability. A formal description of the protocol by Petri net is given. Liveness,deadlock free and other properties of the protocol are proved.

  14. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  15. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus;

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number...

  16. Snakebite management in Iran: Devising a protocol

    Directory of Open Access Journals (Sweden)

    Seyed Mostafa Monzavi

    2014-01-01

    Full Text Available Background: Snakebite in Iran has been a health concern. However, management of snakebite is not standardized and varies from center to center. This study is aimed at devising an evidence-based comprehensive protocol for snakebite management in Iran, to reduce unnecessary variations in practice. Materials and Methods: A narrative search in electronic databases was performed. Fifty peer-reviewed articles, guidelines, and textbooks were reviewed and practical details were extracted. Our currently used protocol in the Mashhad Toxicology Center was supplemented with this information. Consequently an improved wide-range protocol was developed. The protocol was then discussed and amended within a focus group comprised of medical toxicologists and internal medicine specialists. The amended version was finally discussed with expert physicians specialized in different areas of medicine, to be optimized by supplementing other specific considerations. Results: During a one-year process, the protocol was finalized. The final version of the protocol, which was designed in six steps, comprised of three components: A schematic algorithm, a severity grading scale, and instructions for supportive and adjunctive treatments. The algorithm pertains to both Viperidae and Elapidae snakebite envenomations and consists of a planned course of action and dosing of antivenom, based on the severity of the envenomation. Conclusion: Snakebite envenomation is a clinical toxicologic emergency, which needs to be treated in a timely and organized manner. Hence, a multi-aspect protocol was designed to improve the clinical outcomes, reduce unnecessary administration of antivenom, and help physicians make more proper clinical judgments.

  17. Efficient Privacy Preserving Protocols for Similarity Join

    Directory of Open Access Journals (Sweden)

    Bilal Hawashin

    2012-04-01

    Full Text Available During the similarity join process, one or more sources may not allow sharing its data with other sources. In this case, a privacy preserving similarity join is required. We showed in our previous work [4] that using long attributes, such as paper abstracts, movie summaries, product descriptions, and user feedbacks, could improve the similarity join accuracy using supervised learning. However, the existing secure protocols for similarity join methods can not be used to join sources using these long attributes. Moreover, the majority of the existing privacy‐preserving protocols do not consider the semantic similarities during the similarity join process. In this paper, we introduce a secure efficient protocol to semantically join sources when the join attributes are long attributes. We provide two secure protocols for both scenarios when a training set exists and when there is no available training set. Furthermore, we introduced the multi‐label supervised secure protocol and the expandable supervised secure protocol. Results show that our protocols can efficiently join sources using the long attributes by considering the semantic relationships among the long string values. Therefore, it improves the overall secure similarity join performance.

  18. A fully efficient secure quantum cryptography protocol

    CERN Document Server

    Xiang Bin Wang

    2001-01-01

    Since Bennett and Brassard suggested their quantum key distribution protocol(BB84 protocol) in 1984, the subject has been extensively studied both theoretically and experimentally. The protocol allows two remote parties Alice and Bob to create and share a secret key using a quantum channel and public authenticated communications. The quantum key created in this way is in principle secure because eavesdroppers have no way to tap the quantum channel without disturb it. In the protocol, two level quantum bits are measured in two basis, $X$ and $Z$ randomly by Bob. So at least half of the measurement results will be discarded because Bob has a half probability taking the measurement in a wrong basis. On the other hand, the security is not the maximum in BB84 protocol. To increase the security, one may straightforwardly increase the number of basis used in the protocol. For example, six state protocol was proposed recently for two level system. However, in this way, it seems to be the case that the higher the secu...

  19. Analysis of Enhanced Associativity Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Said A. Shaar

    2006-01-01

    Full Text Available This study introduces an analysis to the performance of the Enhanced Associativity Based Routing protocol (EABR based on two factors; Operation complexity (OC and Communication Complexity (CC. OC can be defined as the number of steps required in performing a protocol operation, while CC can be defined as the number of messages exchanged in performing a protocol operation[1]. The values represent the worst-case analysis. The EABR has been analyzed based on CC and OC and the results have been compared with another routing technique called ABR. The results have shown that EABR can perform better than ABR in many circumstances during the route reconstruction.

  20. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  1. COOPERATIVE ARQ PROTOCOL FOR CORRELATED WIRELESS CHANNELS

    Institute of Scientific and Technical Information of China (English)

    Yu Guanding; Zhang Zhaoyang; Qiu Peiliang

    2006-01-01

    A novel Automatic repeat ReQuest (ARQ) protocol called cooperative ARQ is presented in this letter, where a relay terminal is requested to retransmit an erroneously received packet, instead of the source terminal. The data link layer Packet Error Rate (PER) performance of cooperative ARQ is derived in correlated wireless channel. The results show that even though the relay-destination channel is worse than the sourcedestination channel, the new protocol outperforms the traditional one as long as the average SNR of the relaydestination channel is better than a certain threshold. It is also demonstrated that a second order diversity gain can be achieved with the cooperative ARQ protocol.

  2. ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    Amit Rana

    2012-09-01

    Full Text Available The Internet Engineering Task Force (IETF has proposednew protocols for highly secured wireless networking. Thepurpose of this paper is to implement one such proposedsecurity protocol - PEAP (Protected ExtensibleAuthentication Protocol [1]. PEAP was jointly developedby Microsoft, Cisco and RSA security. The protocolimplementation is done on the server end of a Client/Servernetwork model on a RADIUS server (RemoteAuthentication Dial-in User Service. The proposedprotocol - PEAP provides for Client identity protection andkey generation thus preventing unauthorized user accessand protecting or encrypting the data against maliciousactivities.

  3. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  4. Comparison of a kayaking ergometer protocol with an arm crank protocol for evaluating peak oxygen consumption.

    Science.gov (United States)

    Forbes, Scott C; Chilibeck, Philip D

    2007-11-01

    The purpose of this study was to compare a kayak ergometer protocol with an arm crank protocol for determining peak oxygen consumption (V(.-)O2). On separate days in random order, 10 men and 5 women (16-24 years old) with kayaking experience completed the kayak ergometer protocol and a standardized arm crank protocol. The kayak protocol began at 70 strokes per minute and increased by 10 strokes per minute every 2 minutes until volitional fatigue. The arm crank protocol consisted of a crank rate of 70 revolutions per minute, initial loading of 35 W and subsequent increases of 35 W every 2 minutes until volitional fatigue. The results showed a significant difference (p kayak ergometer and the arm crank protocols for relative peak V(.-)O2 (47.5 +/- 3.9 ml x kg(-1) x min(-1) vs. 44.2 +/- 6.2 ml x kg(-1) x min(-1)) and absolute peak V(.-)O2 (3.38 L x min(-1) +/- 0.53 vs. 3.14 +/- 0.64 L x min(-1)). The correlation between kayak and arm crank protocol was 0.79 and 0.90, for relative and absolute V(.-)O2 peak, respectively (both p kayak ergometer may be due to the greater muscle mass involved compared to the arm crank ergometer. The kayak ergometer protocol may therefore be more specific to the sport of kayaking than an arm crank protocol.

  5. Privacy-Preserving Protocols for Eigenvector Computation

    CERN Document Server

    Pathak, Manas A

    2010-01-01

    In this paper, we present a protocol for computing the dominant eigenvector of a collection of private data distributed across multiple parties, with the individual parties unwilling to share their data. Our proposed protocol is based on secure multiparty computation with a trusted third-party arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We also augment the protocol with randomization to make it difficult, with a high probability, for any party to estimate properties of the data belonging to other parties from the intermediate steps. The previous approaches towards this problem were based on expensive QR decomposition of correlation matrices, we present an efficient algorithm using the power iteration method. We present an analysis of the correctness, security, efficiency of protocol and experiments over a prototype implementation.

  6. Multicast Routing Protocols in Adhoc Mobile networks

    Directory of Open Access Journals (Sweden)

    S.Nagaprasad,

    2010-11-01

    Full Text Available The majority of applications are in areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions where participants share information dynamically using their mobile devices. Well established routing protocols do exist to offer efficient multicasting service in conventional wired networks. These protocols, having been designed for fixed networks, may fails to keep up with node movements and frequent topology changes in a MANET. Therefore, adapting existing wired multicast protocols as such to a MANET, which completely lacks infrastructure, appear less promising. Providing efficient multicasting over MANET faces many challenges, includes scalability,quality of service, reliable service, security, Address configuration, Applications for multicast over MANET. The existing multicast routing protocol do not addresses these issues effectively over Mobile Adhoc Networks (MANET.

  7. Rethinking low extra delay background transport protocols

    CERN Document Server

    Carofiglio, Giovanna; Rossi, Dario; Testa, Claudio; Valenti, Silvio

    2010-01-01

    BitTorrent has recently introduced LEDBAT, a novel application-layer congestion control protocol for data exchange. The protocol design starts from the assumption that network bottlenecks are at the access of the network, and that thus user traffic competes creating self-inducing congestion. To relieve from this phenomenon, LEDBAT is designed to quickly infer that self-induced congestion is approaching (by detecting relative changes of the one-way delay in the transmission path), and to react by reducing the sending rate prior that congestion occurs. Prior work has however shown LEDBAT to be affected by a latecomer advantage, where newly arriving connections can starve already existing flows. In this work, we propose modifications to the congestion window update mechanism of the LEDBAT protocol that aim at solving this issue, guaranteeing thus intra-protocol fairness and efficiency. Closed-form expressions for the stationary throughput and queue occupancy are provided via a fluid model, whose accuracy is conf...

  8. Standardized North American Marsh Bird Monitoring Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document describes monitoring protocols for marshbirds in North America. Monitoring parameters, field procedures, survey methods, timing of surveys, recording...

  9. Reparable Key Distribution Protocols for Internet Environments

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    It has claimed that any practical way to achieve perfect reparability for key distribution protocol (KDP) could only be futile. Fortunately, this paper presents reparable KDPs for internet environments with the use of the concept of timestamps.

  10. Identity-based authentication protocol for grid

    Institute of Scientific and Technical Information of China (English)

    Li Hon; Sun Shixin; Yang Homiao

    2008-01-01

    Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol(SAP).The authentication process is very complicated,and therefore,the grid user is in a heavily loaded point both in computation and in communication.Based on identity-based architecture for grid(IBAG)and corre-sponding encryption and signature schemes,an identity-based authentication protocol for grid is proposed.Being certificate-free,the authentication protocol aligns well with the demands of grid computing.Through simulation testing,it is seen that the authentication protocol is more lightweight and efficient than SAP,especially the more lightweight user side.This contributes to the larger grid scalability.

  11. ARC Code TI: Geometry Manipulation Protocol (GMP)

    Data.gov (United States)

    National Aeronautics and Space Administration — The Geometry Manipulation Protocol (GMP) is a library which serializes datatypes between XML and ANSI C data structures to support CFD applications. This library...

  12. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  13. Protocol to Exploit Waiting Resources for UASNs.

    Science.gov (United States)

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-03-08

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  14. National Wildlife Refuge System Survey Protocol Template

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This template was developed for drafting National Wildlife Refuge System (NWRS) Survey Protocols. The template is arranged in the same order as the eight basic...

  15. Comparison of on Demand Routing Protocols

    Directory of Open Access Journals (Sweden)

    Bharat Bhushan

    2013-02-01

    Full Text Available A routing protocol is used to facilitate communication in ad hoc network. The primary goal of such a routing protocol is to provide an efficient and reliable path between a pair of nodes. The routing protocols for ad hoc network can be categorized into three categories: table driven, on demand and hybrid routing. The table driven and hybrid routing strategies require periodic exchange of hello messages between nodes of the ad hoc network and thus have high processing and bandwidth requirements. On the other hand on demand routing strategy creates routes when required and hence is very much suitable for ad hoc network. This paper therefore examines the performance of three on demand routing protocols at application layer using QualNet-5.01 simulator.

  16. Information Flow in Secret Sharing Protocols

    CERN Document Server

    Kashefi, Elham; Mhalla, Mehdi; Perdrix, Simon

    2009-01-01

    The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC), error correction and secret sharing amongst others. In addition they are at the forefront in terms of implementations. As such they represent an excellent opportunity to move towards integrated protocols involving many of these elements. In this paper we look at expressing and extending graph state secret sharing and MBQC in a common framework and graphical language related to flow. We do so with two main contributions. First we express in entirely graphical terms which set of players can access which information in graph state secret sharing protocols. These succinct graphical descriptions of access allow us to take known results from graph theory to make statements on the generalisation of the previous schemes to present new secret sharing protocols. Second, we give a set of necessary condit...

  17. How To Develop Survey Protocols: A Handbook

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This handbook provides a standard and guidance for developing and reviewing survey protocols used in the National Wildlife Refuge System. In the handbook, survey...

  18. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  19. Probabilistic Model--Checking of Quantum Protocols

    CERN Document Server

    Gay, S; Papanikolaou, N; Gay, Simon; Nagarajan, Rajagopal; Papanikolaou, Nikolaos

    2005-01-01

    We establish fundamental and general techniques for formal verification of quantum protocols. Quantum protocols are novel communication schemes involving the use of quantum-mechanical phenomena for representation, storage and transmission of data. As opposed to quantum computers, quantum communication systems can and have been implemented using present-day technology; therefore, the ability to model and analyse such systems rigorously is of primary importance. While current analyses of quantum protocols use a traditional mathematical approach and require considerable understanding of the underlying physics, we argue that automated verification techniques provide an elegant alternative. We demonstrate these techniques through the use of PRISM, a probabilistic model-checking tool. Our approach is conceptually simpler than existing proofs, and allows us to disambiguate protocol definitions and assess their properties. It also facilitates detailed analyses of actual implemented systems. We illustrate our techniqu...

  20. Hybrid protocol of remote implementations of quantum operations

    Science.gov (United States)

    Zhao, Ning Bo; Wang, An Min

    2007-12-01

    We propose a protocol of remote implementations of quantum operations by hybridizing bidirectional quantum-state teleportation (BQST) [Huelga , Phys. Rev. A 63, 042303 (2001)] and the Wang protocol [Wang, Phys. Rev. A 74, 032317 (2006)]. The protocol is available for remote implementations of quantum operations in the restricted sets specified in the paper. We also give a proof of the protocol and point out its optimization. As an extension, this hybrid protocol can be reduced to the BQST and Wang protocols.

  1. Adaptive Baud Protocol For Wireless Communication

    OpenAIRE

    Eskafi, F. H.; Nassiri-toussi, K.; G. Liu

    1998-01-01

    In this paper, the authors propose an algorithm that increases and decreases the transmission speed according to a user-specified function. The design objective is to regulate baud as efficiently as possible and ensure that in each transmission interval, transmitter and receiver bauds are equal for some period of time during data transmission. An equivalent discrete-time version of the protocol is verified by using the COSPAN software. Application for this adaptive baud protocol for wireless ...

  2. Dose protocols of acetylcholine test in Chinese

    Institute of Scientific and Technical Information of China (English)

    向定成; 龚志华; 何建新; 洪长江; 邱建; 马骏

    2004-01-01

    @@ Acetylcholine test has been widely used clinically in several countries as a practical test provoking coronary artery spasm.1-3 Although it has also been launched recently in a few hospitals in China, the dose protocol for acetylcholine test used in these hospitals were from abroad.4,5 This study was aimed at developing a dose protocol for acetylcholine test suitable for Chinese people.

  3. Quantum Key Distribution Protocol with User Authentication

    CERN Document Server

    Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

    2005-01-01

    We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

  4. Protocol for communications in potentially noisy environments

    Energy Technology Data Exchange (ETDEWEB)

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  5. Secure Fingerprint Alignment and Matching Protocols

    OpenAIRE

    Bayatbabolghani, Fattaneh; Blanton, Marina; Aliasgari, Mehrdad; Goodrich, Michael

    2017-01-01

    We present three secure privacy-preserving protocols for fingerprint alignment and matching, based on what are considered to be the most precise and efficient fingerprint recognition algorithms-those based on the geometric matching of "landmarks" known as minutia points. Our protocols allow two or more honest-but-curious parties to compare their respective privately-held fingerprints in a secure way such that they each learn nothing more than a highly-accurate score of how well the fingerprin...

  6. Mutual Authentication Protocols for RFID Systems

    Institute of Scientific and Technical Information of China (English)

    Ashrar A. Omer; Johnson P. Thomas; Ling Zhu

    2008-01-01

    With the availability of low-cost radio frequency identification (RFID) tags, security becomes an increasing concern.However, such tags do not permit complex eryptographic functions due to their computational, communications, and storage limitations.In this paper, we investigate the security issues and requirements of RFID systems, and propose ultra-light weight and light weight protocols for low-cost RFID tags. The proposed protocols has been applied to a supply chain management system.

  7. Trust Authentication Protocol on the Web

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

  8. OAuth protocol for CERN Web Applications

    OpenAIRE

    Kleszcz, Emil; Rodriguez Fernandez, Luis; Marescaux, Nicolas Bernard

    2016-01-01

    Project Specification The CERN Authentication service has recently increased his offer of SSO protocols/frameworks with OAuth2 standard. The purpose of the work is to explain the need for an authorization standard and explain how does OAuth2 protocol addresses our requirements. OAuth is an open standard for authorization which provides a secure access to server resources that belongs to a user. As a wide known and relatively new standard (2012) is used by big players in the industry a...

  9. Equilibria of Generalized Cut and Choose Protocols

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis; Kurokawa, David

    Classic cake cutting protocols — which fairly allocate a divisible good among agents with heterogeneous preferences — are susceptible to manipulation. Do their strategic outcomes still guarantee fairness? To answer this question we adopt a novel algo rithmic approach, proposing a concrete computa...... the stronger fairness notion of envy-freeness. Finally, we show that under an obliviousness restriction, which still allows the computation of approximately envy-free allocations, GCC protocols are guaranteed to have exact subgame perfect Nash equilibria...

  10. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  11. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  12. Network-topology-adaptive quantum conference protocols

    Institute of Scientific and Technical Information of China (English)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication,quantum multiparty conference has made multiparty secret communication possible.Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology.However,the topology of the quantum network significantly affects the communication efficiency,e.g.,parallel transmission in a channel with limited bandwidth.We have proposed two distinctive protocols,which work in two basic network topologies with efficiency higher than the existing ones.We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping.Another protocol,based on quantum multicasting with quantum data compression,which can improve the efficiency of the network,works in the star-like network.The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption.In general,the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols.

  13. EAR Protocol-Towards Fair Optimistic Non-Repudiation Exchange

    Institute of Scientific and Technical Information of China (English)

    WANG Hai-yan; WANG Ru-chuan

    2005-01-01

    Fairness is of crucial importance for the exchange protocols via Internet. Non-repudiation therefore becomes one of the vital premises, which are essential in the exchange of sensitive and important messages. This paper is to propose a new exchange protocol, termed "EAR" Exchange Protocol as it consists of three sub-protocols: Exchange sub-protocol, Abort sub-protocol and Recovery sub-protocol. It is to be argued that the incorporation of these three sub-protocols may effectively enables EAR to assure non-repudiation, strong fairness, timeliness, confidentiality and the minimized involvement of the Trusted Third Party (TTP).

  14. Security Analysis of Broadcaster Group Key Exchange Protocols

    Institute of Scientific and Technical Information of China (English)

    LI Li; ZHANG Huanguo

    2006-01-01

    Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.

  15. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees

    OpenAIRE

    Li, Rebecca H.; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann

    2016-01-01

    A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency...

  16. Internetworking with Internet Protocol (IP) and Transmission Control Protocol (TCP) within the Military

    OpenAIRE

    Eikenberg, Bruce R.

    1990-01-01

    Approved for public release; distribution is unlimited. The backbone of the internetworking technology widely used by the military, as well as many civilian installations, is commonly referred to as TCP/IP. Transmission Control Protocol (TCP) and Internet Protocol (IP) are the two standard communication protocols from which TCP/IP receives its name. By utilizing TCP/IP, the majority of technical issues of interconnecting various computer technologies have become transparent to the user. Th...

  17. Epidemic Protocols for Pervasive Computing Systems - Moving Focus from Architecture to Protocol

    DEFF Research Database (Denmark)

    Mogensen, Martin

    2009-01-01

    Pervasive computing systems are inherently running on unstable networks and devices, subject to constant topology changes, network failures, and high churn. For this reason, pervasive computing infrastructures need to handle these issues as part of their design. This is, however, not feasible...... epidemic protocols as distribution mechanism for pervasive systems. The nature of epidemic protocols make them easy to implement, easy to deploy, and resilient to failures. By using epidemic protocols, it is possible to mitigate a wide range of the potential issues on the protocol layer. The result...... is lower complexity of building pervasive systems and higher robustness....

  18. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  19. Protocol Independent Multicast Based States Allocation

    Directory of Open Access Journals (Sweden)

    G Hemalatha

    2012-02-01

    Full Text Available In this paper the Protocol Independent Multicast (PIM protocol is being used. The PIM protocol avoids the packet drop and diverting problem. The PIM protocol is not dependent on any specific unicast routing protocol. It is IP routing independent protocol. The PIM uses the unicast and multicast information to create a distribution tree along the reverse path from the receivers towards the source. The PIM protocol consists of three modes such as sparse mode, dense mode and bidirectional mode. The sparse mode is used to sends the file from router to a receiver. The dense mode is used to sends the file from router to multiple receivers. The bidirectional mode is used to sends the message from router to sender and then continue the other process depending on the sender requirements. The client sends the file from sender to destination via the router. First the sender selects the file name and receiver name for transmission. Then the state is assigned automatically depend upon the user selection. The state can be defined by the number of destination selected to transmit the file from the source. If the sender selects single destination, it will assign “Without forwarding state router” for transmission. Otherwise it will assign “Forwarding state router” for transmission. If the receiver is not available, the router sends a message to sender such that “the requested receiver is not available”. Then the client will decide the file is transfer or not, it will reply with transfer the file, then the file will be transferred until the file will be discarded at client side. If the sender tries the same process after two times, the router will display the warning message as “the requested receiver is not available, this file will be discarded at client side”. Then it continues the other process.

  20. Factors that affect cancer patient compliance to oral anti-neoplastic therapy Factores que influyen en la adhesión de pacientes con cáncer a la terapia antineoplásica oral Fatores que influenciam a adesão de pacientes com câncer à terapia antineoplásica oral

    OpenAIRE

    Patrícia Andréa Crippa Marques; Angela Maria Geraldo Pierin

    2008-01-01

    OBJECTIVES: To identify factors that can affect compliance to treatment with neoplastic oral drugs in a group of cancer patients. METHODS: Interviews were performed on 61 patients diagnosed with cancer and under anti-neoplastic oral therapy in a private hospital. The interviews were carried out using instruments to assess compliance. RESULTS: Most patients (95%) reported the oral treatment was not difficult. The Morisky and Green Test were positive in 28% of the patients. Factors that may aff...

  1. Eccentricity in Zone Routing Protocol for MANET

    Directory of Open Access Journals (Sweden)

    Mrs Komal Nair

    2012-06-01

    Full Text Available A Mobile Ad-Hoc Network (MANET is a decentralized network of autonomous mobile nodes, able to communicate with each other over wireless links. Due to the mobility of the nodes, the topology ofthe network changes spontaneously, therefore use of conventional routing tables maintained at fixed points (routers is not suggested. Such a network may operate in a standalone fashion. There are variousrouting protocols available for MANETs. The most popular ones are DSR, DSDV and ZRP .The zone routing protocol (ZRP is a hybrid routing protocol that proactively maintains routes within a localregion of the network. ZRP can be configured for a particular network through adjustment of a single parameter, the routing zone radius. In this paper, we address the issue of configuring the ZRP to providethe best performance for a particular network at any time with the concept of eccentricity. The results illustrate the important characteristics of different protocols based on their performance and thus suggest some improvements in the respective protocol. The tools used for the simulation are NS2 which is the main simulator, NAM (Network Animator and Tracegraph which is used for preparing the graphs from the trace files.

  2. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  3. Manet Load Balancing Parallel Routing Protocol

    Directory of Open Access Journals (Sweden)

    Hesham Arafat Ali

    2012-07-01

    Full Text Available In recent years, multi-path routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency in improving bandwidth of communication, increasing delivery reliability, responding to congestion and heavy traffic. Several protocols have been developed to address multi path routing, but it always has a problem that the discovered paths may be not 100% disjoint and sending data is done in only one path until it's broken; the discovery of multiple paths also generates more overhead on the network. Load Balancing Parallel Routing Protocol [LBPRP] tried to solve previous multi path problems, distributing traffic among multiple paths sending data in parallel form as it uses all paths in the same time. We employed a simple test scenario to be sure of proposed model efficiency and to validate the proposed Load Balancing Parallel Routing Protocol. [LBPRP] will achieve load balancing in sending data, decreasing the end-to-end delay and increasing the packet delivery ratio and throughput, thus the performance of multi-path routing protocols can be improved consequently.

  4. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  5. Performance Evaluation of Routing Protocols in MANET

    Directory of Open Access Journals (Sweden)

    Smitha Sunny

    2015-01-01

    Full Text Available Mobile Ad-Hoc Network (MANET is an autonomous system that is composed of the mobile nodes which communicates through wireless links without any preexisting infrastructure. MANET is a collection of mobile nodes which can self-organize freely and dynamically into arbitrary and temporary network topologies. Mobile nodes in ad-hoc networks function as a router and can dynamically establish routes among themselves by means of a routing protocol. Routing protocols in mobile ad-hoc network helps node to send and receive packets. Therefore, selection of an appropriate routing protocol is an integral part of establishing a MANET. A suitable and effective routing mechanism helps to extend the successful deployment of mobile ad-hoc networks. An attempt has been made to compare the performance between on-demand reactive routing protocols namely AODV, DSR and proactive routing protocol namely DSDV for Constant Bit Rate (CBR traffic by varying network scope i.e. number of participating nodes as well as by varying the speed. The parameters used for evaluation are Packet delivery ratio (PDR, Normalized routing overhead, Average end to end delay (Delay, Throughput and Average Energy consumption. The simulations are carried out using Network Simulator NS2:34.

  6. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  7. Supporting Adaptation of Wireless Communication Protocols

    Directory of Open Access Journals (Sweden)

    LACHHMAN DAS DHOMEJA

    2016-10-01

    Full Text Available Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity, Bluetooth, IrDA (Infrared, etc. In order for pervasive devices to interact with each other, they need to have matching (alike communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth from what the server has (e.g. WiFi, connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange, L2CAP (Logical Link Control and Adaptation Protocol, RFCOM (Radio Frequency Communication and WiFi protocol and can run on (J2MW (Java 2 Micro Edition enabled mobile phones which support both Bluetooth and WiFi capabilities

  8. Operational protocols for controlling accelerator equipment

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, R.; Baribaud, G.; Benincasa, G.P.; Burla, P.; Casalegno, L.; Coudert, G.; Gelato, G.; Kuhn, H.K.; Saban, R.; Spinks, A. (European Organization for Nuclear Research, Geneva (Switzerland). LEP Div.)

    1990-08-01

    The equipment used to operate an accelerator is varied. However, the different devices may be divided into a limited number of classes for which operational protocols can be defined. Operational protocols permit: (i) a uniform operation, (ii) a clear definition of responsibility between the various specialists, (iii) independent development of programs and use of the most appropriate technology, (iv) the change of hardware and the transportability of software, and (v) the fabrication of devices by industry for general use. An operational protocol should be independent of any given control system and it must not be confused with a transmission protocol. As a first step, one defines an operational model of the device to be controlled. The model must represent a high-level description of the device as seen by the user. It will be characterized by a set of parameters and a set of rules. Although the particular requirements of specialists are not included in the operational protocol, allowances should be made for them. Emphasis will be placed on studies carried out on power converters and beam instrumentation. A general-purpose control message architecture is reported. (orig.).

  9. Operational protocols for controlling accelerator equipment

    Science.gov (United States)

    Bailey, R.; Baribaud, G.; Benincasa, G. P.; Burla, P.; Casalegno, L.; Coudert, G.; Gelato, G.; Kuhn, H. K.; Saban, R.; Spinks, A.

    1990-08-01

    The equipment used to operate an accelerator is varied. However, the different devices may be divided into a limited number of classes for which operational protocols can be defined. Operational protocols permit: (i) a uniform operation, (ii) a clear definition of responsibility between the various specialists, (iii) independent development of programs and use of the most appropriate technology, (iv) the change of hardware and the transportability of software, and (v) the fabrication of devices by industry for general use. An operational protocol should be independent of any given control system and it must not be confused with a transmission protocol. As a first step, one defines an operational model of the device to be controlled. The model must represent a high-level description of the device as seen by the user. It will be characterized by a set of parameters and a set of rules. Although the particular requirements of specialists are not included in the operational protocol, allowances should be made for them. Emphasis will be placed on studies carried out on power converters and beam instrumentation. A general-purpose control message architecture is reported.

  10. Animation of Natural Language Specifications of Authentication Protocols

    Directory of Open Access Journals (Sweden)

    Mabroka A. Mayouf

    2008-01-01

    Full Text Available Problem Statement: A few visualization tools have been created for protocol design and analysis. Although these tools provide an environment for designing security protocols, each one has its own protocol definition language (its also called informal specification language. The problem is that the user should understand the language which related to the used tool in order to define an exist protocol or design a new one. For specification, a language needs to be intuitive as well as easily usable and understandable by the security protocol engineer. It must be able to precisely and unambiguously specify the behavior of security protocol. Approach: In this study, we propose an approach for protocol specification based on the Natural language definitions of protocol semantics. By using programmatic semantics together with animations, representational flexibility of different protocol demonstration is retained for as long as it is needed. Result: This study provides an environment that can be used by protocols designers to develop and investigate different scenarios of security protocols especially authentication protocols. Natural Language Protocol Specifications (NLPS approach is used to define the protocol. The environment accepts the natural language text of protocol specifications and converts it to animations of protocol behavior. Conclusions/Recommendations: NLPS environment can really help protocol designer to consider and investigate the behavior of security protocols. It can also be used for teaching-learning security protocol concepts. In further, we will consider the possibility of analyzing security protocols using our NLPS environment and animation techniques in order to improve the correctness; that is determining whether or not the intended security properties of a protocol do hold.

  11. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval.

  12. Performance Evaluation of MANET Routing Protocols

    Directory of Open Access Journals (Sweden)

    Hrituparna Paul

    2012-07-01

    Full Text Available The task of finding and sustaining routes in Mobile Ad-hoc Networks (MANETS is an important factor in determining the efficiency of any MANET protocol. MANET characteristically is an autonomous system of mobile nodes connected by wireless links without any centralised infrastructure. Absence of fixed infrastructures and host mobility thus network may experience rapid and unpredictable topology changes. Hence, routing is required in order to perform communication among the entire network. There are several routing protocols namely proactive, reactive and hybrid etc. In this paper we will discuss the active research work on these routing protocols and its performance evaluation. To this end, we adopt a simulation approach, which is more suitable to this kind of analysis

  13. Efficient Controlled Quantum Secure Direct Communication Protocols

    Science.gov (United States)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  14. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  15. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    level. In noisy-channel cryptography security proofs are based on the assumption that a given physical means of communication is at a sufficiently low level inherently noisy. In bounded-storage cryptography security proofs are based on the assumption that there exists streams of information, generated...... by computers or other physical phenomena, so intense that no one is able to fully store them. In quantum cryptography security proofs are based on the assumption that nature behaves consistently with quantum mechanics. In the following we describe the state of the art and some main open problems in the three......This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...

  16. Chapter 15: Commercial New Construction Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  17. MILITARY MULTI-HOP ROUTING PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Military tactical network is one of the most important applications of ad hoc network. Currently the existing routing protocols are put forward based on the simple and universal network model which has the ability of multi-hop routing but cannot work efficiently in the special military applications. The narrow bandwidth and limited energy of the wireless network make general routing protocols seem to be more redundant.In order to satisfy military needs properly, this letter makes a detailed analysis of physical nodes and traffic distribution in military network, uses cross-layer design concept for reference, combines traffic characteristic of application layer with routing protocol design. It categorized routing problem as crucial routes and non-crucial routes which adopted separate maintenance methods. It not only realizes basic transmission function but also works efficiently. It is quite fit for military application.

  18. Zero-Knowledge Protocols and Multiparty Computation

    DEFF Research Database (Denmark)

    Pastro, Valerio

    in a finite field, in which the third one is the product of the first two. We extend this protocol in two ways: first we consider the case where the values are integers, and then we consider tuples of values that satisfy more general algebraic relations. Our basic scheme achieves optimal amortized......This thesis presents results in two branches of cryptography. In the first part we construct two general multiparty computation protocols that can evaluate any arithmetic circuit over a finite field. Both are built in the preprocessing model and achieve active security in the setting of a dishonest......+ 13] yields a more efficient protocol than that originally proposed in [DPSZ12]. Our preprocessing phases make use of a somewhat homomorphic encryption scheme, and significantly improve on the previous state of the art, both asymptotically and in practice. The online phase we present relies...

  19. Insights From Verbal Protocols: A Case Study

    Directory of Open Access Journals (Sweden)

    Margaret Kumar

    2012-09-01

    Full Text Available This study explores a postgraduate student writer’s responses and reactions through verbal protocols as she attends to teacher feedback. Teacher feedback has been heralded as an important element in process writing. Numerous studies have been carried out on various aspects of teacher feedback such as on the effectiveness of feedback, students’ preferences for teacher feedback and students’ perceptions of feedback. However, there is still a gap in the literature in determining how students respond as they engage with teacher feedback. This paper reports on one postgraduate student’s responses on and her reactions to teacher feedback. Concurrent verbal protocols used in complement with written drafts and teacher commentaries were the main sources of data for this study. The analyses reveal that attending to feedback is a recursive process that fosters self-reflection which, in turn promotes planning for revision. Keywords: Verbal protocols, Teacher written feedback; Recursion; Reflection; Planning

  20. Chapter 22: Compressed Air Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  1. Protocol for emergency EPR dosimetry in fingernails.

    Science.gov (United States)

    Trompier, F; Kornak, L; Calas, C; Romanyukha, A; Leblanc, B; Mitchell, C A; Swartz, H M; Clairand, I

    2007-08-01

    There is an increased need for after-the-fact dosimetry because of the high risk of radiation exposures due to terrorism or accidents. In case of such an event, a method is needed to make measurements of dose in a large number of individuals rapidly and with sufficient accuracy to facilitate effective medical triage. Dosimetry based on EPR measurements of fingernails potentially could be an effective tool for this purpose. This paper presents the first operational protocols for EPR fingernail dosimetry, including guidelines for collection and storage of samples, parameters for EPR measurements, and the method of dose assessment. In a blinded test of this protocol application was carried out on nails freshly sampled and irradiated to 4 and 20 Gy; this protocol gave dose estimates with an error of less than 30%.

  2. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not....... The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA...

  3. Self Fault-Tolerance of Protocols: A Case Study

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    The prerequisite for the existing protocols' correctness is that protocols can be normally operated under the normal conditions, rather than dealing with abnormal conditions.In other words, protocols with the fault-tolerance can not be provided when some fault occurs. This paper discusses the self fault-tolerance of protocols. It describes some concepts and methods for achieving self fault tolerance of protocols. Meanwhile, it provides a case study, investigates a typical protocol that does not satisfy the self fault-tolerance, and gives a new redesign version of this existing protocol using the proposed approach.

  4. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  5. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols

    Directory of Open Access Journals (Sweden)

    Campagne Fabien

    2008-02-01

    Full Text Available Abstract Background The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC, organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. Results We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation. The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches. Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79–0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86–0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Conclusion Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT

  6. 针灸改善癌症患者抗肿瘤治疗副反应的研究进展%Acupuncture and Moxibustion in the Treatment of Side Reactions Induced by Antineoplastic Therapy among Patients with Cancer

    Institute of Scientific and Technical Information of China (English)

    刘志丹; 曹妮达; 慕晓艳; 裴建

    2012-01-01

    This paper takes a review of related clinical researches published in recent 20 years, lists out the application of acupuncture and moxibustion therapies used for treating the antineoplastic therapy induced side reactions including nausea and vomiting, sickness, pain, fatigue, xerostomia, hot flash, hiccup, etc. The paper Maaes comments on latest impact clinical researches and argues that application of acupuncture and moxibustion should be paid much attention to the multimodali'ty treatment of tumor, and methodologic advancements are required in the future clinical researches.%回顾近20余年国内外针灸治疗肿瘤的临床研究文献,总结针灸疗法在减轻放化疗引起的顽固性呃逆、恶心呕吐、疲劳、口干、潮热等方面的临床疗效;述评此间的主要临床试验;提出针灸在肿瘤临床综合治疗中存在潜力,呼吁继续深入研究和大力临床推广.

  7. A Protocol for Evaluating Contextual Design Principles

    Directory of Open Access Journals (Sweden)

    Arthur Stamps

    2014-11-01

    Full Text Available This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies.

  8. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  9. Explicit Protocol for Deterministic Entanglement Concentration

    Institute of Scientific and Technical Information of China (English)

    GU Yong-Jian; GAO Peng; GUO Guang-Can

    2005-01-01

    @@ We present an explicit protocol for extraction of an EPR pair from two partially entangled pairs in a deterministic fashion via local operations and classical communication. This protocol is constituted by a local measurement described by a positive operator-valued measure (POVM), one-way classical communication, and a corresponding local unitary operation or a choice between the two pairs. We explicitly construct the required POVM by the analysis of the doubly stochastic matrix connecting the initial and the final states. Our scheme might be useful in future quantum communication.

  10. A molecular protocol for diagnosing myotonic dystrophy.

    Science.gov (United States)

    Guida, M; Marger, R S; Papp, A C; Snyder, P J; Sedra, M S; Kissel, J T; Mendell, J R; Prior, T W

    1995-01-01

    Myotonic dystrophy (DM) is an autosomal dominant genetic disease caused by an unstable CTG repeat sequence in the 3' untranslated region of the myotonin protein kinase gene. The CTG repeat is present 5-30 times in the normal population, whereas DM patients have CTG expansions of 50 to several thousand repeats. The age of onset of the disorder and the severity of the phenotype is roughly correlated with the size of the CTG expansion. We developed a molecular protocol for the diagnosis of DM based on an initial polymerase chain reaction screen to detect normal-sized alleles and small expansions, followed by an improved Southern protocol to detect larger expansions.

  11. Social Protocols for Agile Virtual Teams

    Science.gov (United States)

    Picard, Willy

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  12. Social Protocols for Agile Virtual Teams

    CERN Document Server

    Picard, Willy

    2011-01-01

    Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model.

  13. Communication Protocols Augmentation in VLSI Design Applications

    Directory of Open Access Journals (Sweden)

    Kanhu Charan Padhy

    2015-05-01

    Full Text Available With the advancement in communication System, the use of various protocols got a sharp rise in the different applications. Especially in the VLSI design for FPGAs, ASICS, CPLDs, the application areas got expanded to FPGA based technologies. Today, it has moved from commercial application to the defence sectors like missiles & aerospace controls. In this paper the use of FPGAs and its interface with various application circuits in the communication field for data (textual & visual & control transfer is discussed. To be specific, the paper discusses the use of FPGA in various communication protocols like SPI, I2C, and TMDS in synchronous mode in Digital System Design using VHDL/Verilog.

  14. Building multiservice Internet protocol virtual private networks

    Science.gov (United States)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  15. Quantum Private Comparison Protocol with Linear Optics

    Science.gov (United States)

    Luo, Qing-bin; Yang, Guo-wu; She, Kun; Li, Xiaoyu

    2016-12-01

    In this paper, we propose an innovative quantum private comparison(QPC) protocol based on partial Bell-state measurement from the view of linear optics, which enabling two parties to compare the equality of their private information with the help of a semi-honest third party. Partial Bell-state measurement has been realized by using only linear optical elements in experimental measurement-device-independent quantum key distribution(MDI-QKD) schemes, which makes us believe that our protocol can be realized in the near future. The security analysis shows that the participants will not leak their private information.

  16. The covert channel over HTTP protocol

    Science.gov (United States)

    Graniszewski, Waldemar; Krupski, Jacek; Szczypiorski, Krzysztof

    2016-09-01

    The paper presents a new steganographic method - the covert channel is created over HTTP protocol header, i.e. trailer field. HTTP protocol is one of the most frequently used in the Internet. The popularity of the Web servers and network traffic from, and to them, is one of the requirements for undetectable message exchange. To study this kind of the information hiding technique an application in Javascript language based on the Node.js framework was written. The results of the experiment that was performed to send a message in the covert channel are also presented.

  17. NADA protocol: integrative acupuncture in addictions.

    Science.gov (United States)

    Carter, Kenneth; Olshan-Perlmutter, Michelle

    2014-01-01

    National Acupuncture Detoxification Association (NADA) acupuncture is a simple, standardized, 1- to 5-point auricular needling protocol that originated as a grass-roots response to the opiate epidemic of the 1970s. NADA acupuncture is increasingly recognized as a universally useful intervention in the treatment of addictions specifically and in behavior health more generally. It is recognized as a best practice in the treatment of substance use disorders. Integrative programs using the NADA protocol are likely to see improvements in engagement, retention, decreased drug cravings, anxiety, and less physical symptoms.

  18. A New Route Maintenance in Dynamic Source Routing Protocol

    CERN Document Server

    Shukla, Ashish

    2010-01-01

    Mobile ad-hoc network (MANET) is infrastructureless, self-organizable, multi hop packet switched network. A number of routing protocols for MANETs have been proposed in recent years. Dynamic Source Routing (DSR) protocol is one of the most popular routing protocol for ad hoc networks. This paper presents a novel method to enhance route maintenance part of DSR protocol. Our proposed route maintenance significantly increases the efficiency of the protocol at the time of route failures.

  19. Energy Consumption in Location Sharing Protocols for Android Applications

    OpenAIRE

    Prihodko, Mihails

    2012-01-01

    This thesis studies the Message Queue Telemetry Transport protocol (MQTT) as an application layer protocol in geographical location sharing applications using third generation cellular communication (3G). The MQTT protocol is compared in terms of energy efficiency and amount of data generated with the Hypertext Transfer Protocol (HTTP), which is currently used in typical location sharing applications. In order to compare the communication energy efficiency of both protocols a location sharing...

  20. Comparison of Two Hierarchical Routing Protocols for Heterogeneous MANET

    Science.gov (United States)

    2007-10-01

    protocols (e.g. Ad-Hoc On-Demand Distance Vector routing protocol , AODV ) search for and maintain routes to destination nodes upon demand from...the time it takes to find a route when data needs to be sent. Protocols such as OLSR and AODV support nodes having multiple interfaces. However they...hierarchical ad hoc routing protocols are derived from a “flat” ad routing protocol . For instance, H- AODV [8] and H-DSR [11] are examples

  1. Modify AODV Routing Protocol to Improve Motorway Surveillance System Performance

    OpenAIRE

    Layth Abdulkareem Hassnawi; R. Badlishah Ahmad; Abid Yahya

    2012-01-01

    This paper presents an algorithm to modify the Ad Hoc On-Demand Distance Vector (AODV) routing protocol in order to improve the routing performance in motorway surveillance systems. The proposed protocol has all the characteristics of the original AODV routing protocol since it follows all the steps of the route discovery and route maintenance mechanism of the original AODV routing protocol. The Modified AODV (MAODV) is different from the original AODV protocol in that it modifies the origina...

  2. Real-time communication protocols: an overview

    NARCIS (Netherlands)

    Hanssen, Ferdy; Jansen, Pierre G.

    2003-01-01

    This paper describes several existing data link layer protocols that provide real-time capabilities on wired networks, focusing on token-ring and Carrier Sense Multiple Access based networks. Existing modifications to provide better real-time capabilities and performance are also described. Finally

  3. Real-time communication protocols: an overview

    OpenAIRE

    Hanssen, Ferdy; Jansen, Pierre G.

    2003-01-01

    This paper describes several existing data link layer protocols that provide real-time capabilities on wired networks, focusing on token-ring and Carrier Sense Multiple Access based networks. Existing modifications to provide better real-time capabilities and performance are also described. Finally the pros and cons regarding the At-Home Anywhere project are discussed.

  4. Strong Robustness of Randomized Rumor Spreading Protocols

    CERN Document Server

    Doerr, Benjamin; Levavi, Ariel

    2010-01-01

    Randomized rumor spreading is a classical protocol to disseminate information across a network. At SODA 2008, a quasirandom version of this protocol was proposed and competitive bounds for its run-time were proven. This prompts the question: to what extent does the quasirandom protocol inherit the second principal advantage of randomized rumor spreading, namely robustness against transmission failures? In this paper, we present a result precise up to $(1 \\pm o(1))$ factors. We limit ourselves to the network in which every two vertices are connected by a direct link. Run-times accurate to their leading constants are unknown for all other non-trivial networks. We show that if each transmission reaches its destination with a probability of $p \\in (0,1]$, after $(1+\\e)(\\frac{1}{\\log_2(1+p)}\\log_2n+\\frac{1}{p}\\ln n)$ rounds the quasirandom protocol has informed all $n$ nodes in the network with probability at least $1-n^{-p\\e/40}$. Note that this is faster than the intuitively natural $1/p$ factor increase over th...

  5. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  6. An acid-catalyzed macrolactonization protocol.

    Science.gov (United States)

    Trost, Barry M; Chisholm, John D

    2002-10-17

    [reaction: see text] An efficient macrolactonization protocol devoid of any base was developed derived from the use of vinyl esters in transesterification. Subjecting a hydroxy acid and ethoxyacetylene to 2 mol % [RuCl(2)(p-cymene)](2) in toluene followed by addition of camphorsulfonic acid or inverse addition provided macrolactones in good yields.

  7. Secure communication protocol for mobile multimedia applications

    OpenAIRE

    Komninos, N.; Honary, B.; Darnell, M.

    2000-01-01

    Data transmission over wireless communication networks is increasing rapidly and security has become a very important issue. The main considerations of secure communication systems are authentication, key distribution, and data transfer. This paper describes a secure communication protocol (SCP), which provides privacy and data integrity for end-to-end data transmission over wireless communication systems.

  8. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...

  9. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  10. Recursion Versus Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Hüttel, Hans; Srba, Jiri

    2005-01-01

    We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbee...

  11. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom...

  12. Plant Fungal Pathogens: Methods and Protocols

    NARCIS (Netherlands)

    Bolton, M.D.; Thomma, B.P.H.J.

    2012-01-01

    Over the course of evolution, fungi have adapted to occupy specific niches, from symbiotically inhabiting the flora of the intestinal tract of mammals to saprophytic growth on leaf litter resting on the forest floor. In Plant Fungal Pathogens: Methods and Protocols, expert researchers in the field d

  13. Implementing the Environmental Protocol Domestically : An Overview

    NARCIS (Netherlands)

    Bastmeijer, C.J.; Vidas, Davor

    2000-01-01

    This book - edited by Davor Vidas of the Nansens Institute (Oslo, Norway) - is the first book that comprehensively discusses the implementation of the Environmental Protocol to the Antarctic Treaty. Part V of this book includes a number of chapters describing the measures that have been taken by sel

  14. Knowledge Sharing Protocol for Smart Spaces

    Directory of Open Access Journals (Sweden)

    Juha-Pekka Soininen

    2012-09-01

    Full Text Available In this paper we present a novel knowledge sharing protocol (KSP for semantic technology empowered ubiquitous computing systems. In particular the protocol is designed for M3 which is a blackboard based semantic interoperability solution for smart spaces. The main difference between the KSP and existing work is that KSP provides SPARQL-like knowledge sharing mechanisms in compact binary format that is designed to be suitable also for resource restricted devices and networks. In order to evaluate the KSP in practice we implemented a case study in a prototype smart space, called Smart Greenhouse. In the case study the KSP messages were on average 70.09% and 87.08% shorter than the messages in existing M3 communication protocols. Because the KSP provides a mechanism for automating the interaction in smart spaces it was also possible to implement the case study with fewer messages than with other M3 communication protocols. This makes the KSP a better alternative for resource restricted devices in semantic technology empowered smart spaces.

  15. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt high-en

  16. Smart environments technology, protocols and applications

    CERN Document Server

    Cook, Diane

    2004-01-01

    Smart Environments contains contributions from leading researchers, describing techniques and issues related to developing and living in intelligent environments. Reflecting the multidisciplinary nature of the design of smart environments, the topics covered include the latest research in smart environment philosophical and computational architecture considerations, network protocols for smart environments, intelligent sensor networks and powerline control of devices, and action prediction and identification.

  17. A Geographical Heuristic Routing Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Luis Urquiza-Aguiar

    2016-09-01

    Full Text Available Vehicular ad hoc networks (VANETs leverage the communication system of Intelligent Transportation Systems (ITS. Recently, Delay-Tolerant Network (DTN routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation.

  18. A Bayesian approach to optimizing cryopreservation protocols

    Directory of Open Access Journals (Sweden)

    Sammy Sambu

    2015-06-01

    Full Text Available Cryopreservation is beset with the challenge of protocol alignment across a wide range of cell types and process variables. By taking a cross-sectional assessment of previously published cryopreservation data (sample means and standard errors as preliminary meta-data, a decision tree learning analysis (DTLA was performed to develop an understanding of target survival using optimized pruning methods based on different approaches. Briefly, a clear direction on the decision process for selection of methods was developed with key choices being the cooling rate, plunge temperature on the one hand and biomaterial choice, use of composites (sugars and proteins as additional constituents, loading procedure and cell location in 3D scaffolding on the other. Secondly, using machine learning and generalized approaches via the Naïve Bayes Classification (NBC method, these metadata were used to develop posterior probabilities for combinatorial approaches that were implicitly recorded in the metadata. These latter results showed that newer protocol choices developed using probability elicitation techniques can unearth improved protocols consistent with multiple unidimensionally-optimized physical protocols. In conclusion, this article proposes the use of DTLA models and subsequently NBC for the improvement of modern cryopreservation techniques through an integrative approach.

  19. SECURED ELECTRONIC VOTING PROTOCOL USING HYBRID CRYPTOSYSTEM

    Directory of Open Access Journals (Sweden)

    KALAICHELVI V

    2013-04-01

    Full Text Available Electronic Voting play a really vital role in the democracy of our life. In this paper, we propose an electronic voting protocol. Our scheme does not require a special voting channel and communication can occur entirely over the current Internet. This method integrates the Internet convenience and cryptology. In the existing protocol the Tallier has to wait until the decryption key is received from the voter. So it will consume lot of time. But, the proposed protocol is based on the hybrid cryptosystem. In this, the ballot is encrypted using faster secret key algorithm and the digital envelope is encrypted using Tallier’s public key. So, the Tallier will decrypt the digital envelope using his own private key to get the secret key and then the encrypted ballot is decrypted using that secret key. So, comparatively the proposed protocol consumes less time. This paper also analyzes the various security issues involved in an electronic voting like security, privacy, authentication, anonymous, uniqueness, accuracy, fairness, efficiency and uncoercibility.

  20. Reliable multicasting in the Xpress Transport Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Atwood, J.W. [Concordia Univ., Montreal, PQ (Canada); Catrina, O. [Polytehnica Univ., Bucharest (Romania); Fenton, J. [Mentat, Inc., Los Angeles, CA (United States); Strayer, W.T. [Sandia National Labs., Livermore, CA (United States)

    1996-12-01

    The Xpress Transport Protocol (XTP) is designed to meet the needs of distributed, real-time, and multimedia systems. This paper describes the genesis of recent improvements to XTP that provide mechanisms for reliable management of multicast groups, and gives details of the mechanisms used.

  1. The Nagoya Protocol: Fragmentation or Consolidation?

    Directory of Open Access Journals (Sweden)

    Carmen Richerzhagen

    2014-02-01

    Full Text Available In October, 2010, a protocol on access and benefit-sharing (ABS of genetic resources was adopted, the so-called Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity. Before the adoption of the Nagoya Protocol, the governance architecture of ABS was already characterized by a multifaceted institutional environment. The use of genetic resources is confronted with many issues (conservation, research and development, intellectual property rights, food security, health issues, climate change that are governed by different institutions and agreements. The Nagoya Protocol contributes to increased fragmentation. However, the question arises whether this new regulatory framework can help to advance the implementation of the ABS provisions of the Convention on Biological Diversity (CBD. This paper attempts to find an answer to that question by following three analytical steps. First, it analyzes the causes of change against the background of theories of institutional change. Second, it aims to assess the typology of the architecture in order to find out if this new set of rules will contribute to a more synergistic, cooperative or conflictive architecture of ABS governance. Third, the paper looks at the problem of “fit” and identifies criteria that can be used to assess the new ABS governance architecture with regard to its effectiveness.

  2. The Kyoto protocol in a global perspective

    Directory of Open Access Journals (Sweden)

    Tjaša Redek

    2009-11-01

    Full Text Available The global climate has changed notably since the beginning of the Industrial Revolution. Atmospheric concentrations of greenhouse gasses (GHG have increased dramatically followed by an increase in global average temperature. In order to avoid negative potential outcomes of global warming, countries have adopted the United Nations Framework Convention on Climate Change that has so far been ratified by 192 countries. In 1997 the Kyoto Protocol, a binding GHG reduction plan, was adopted and entered into force in 2005. But several countries, including the USA, have had doubts about the potential negative consequences of the planned 5% global joint reduction of GHG. However, studies generally show that on a macroeconomic level: (1 welfare loss in terms of GDP and lost growth in EU is low; (2 it differs among economies; and (3 permit trading and permit price (in either global or regional markets is highly correlated with the welfare loss. The main objective of the paper is to describe the attitudes and responses to the Kyoto Protocol from a global perspective. The paper has three objectives. First, to provide an overview of global greenhouse gas emissions and the big drivers behind these emissions. Second, to present where different countries, both developed and less developed countries, such as India, China and the countries of South-east Europe currently stand as regards their efforts to achieve the Kyoto Protocol requirements. Third, to analyse the responses and attitudes to the Kyoto Protocol from a country development perspective.

  3. Protocols for communication and governance of risks

    NARCIS (Netherlands)

    Vrouwenvelder, A.C.W.M.; Lind, N.C.; Faber, M.H.

    2015-01-01

    The aim of this paper is to explain the need to organize the development of standard protocols for communication about major public risks. Tragic events, such as inadequate earthquake preparedness or great unnecessary losses of life due to public misunderstandings underline the importance of such pr

  4. Quantum Dot Solar Cell Fabrication Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Chernomordik, Boris D.; Marshall, Ashley R.; Pach, Gregory F.; Luther, Joseph M.; Beard, Matthew C.

    2017-01-10

    Colloidally synthesized quantum-confined semiconducting spherical nanocrystals, often referred to as quantum dots (QDs), offer a high degree of chemical, optical, and electronic tunability. As a result, there is an increasing interest in employing colloidal QDs for electronic and optical applications that is reflected in a growing number of publications. In this protocol we provide detailed procedures for the fabrication of QD solar cells specifically employing PbSe and PbS QDs. We include details that are learned through experience, beyond those in typical methodology sections, and include example pictures and videos to aid in fabricating QD solar cells. Although successful solar cell fabrication is ultimately learned through experience, this protocol is intended to accelerate that process. The protocol developed here is intended to be a general starting point for developing PbS and PbSe QD test bed solar cells. We include steps for forming conductive QD films via dip coating as well as spin coating. Finally, we provide protocols that detail the synthesis of PbS and PbSe QDs through a unique cation exchange reaction and discuss how different QD synthetic routes could impact the resulting solar cell performance.

  5. 21 CFR 58.120 - Protocol.

    Science.gov (United States)

    2010-04-01

    ... FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL GOOD LABORATORY PRACTICE... for acceptable levels of contaminants that are reasonably expected to be present in the dietary... methods to be used. (b) All changes in or revisions of an approved protocol and the reasons...

  6. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.;

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near...

  7. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  8. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  9. Adenosine stress protocols for myocardial perfusion imaging

    Directory of Open Access Journals (Sweden)

    Baškot Branislav

    2008-01-01

    Full Text Available Background/Aim. Treadmill test combined with myocardial perfusion scintigraphy (MPS is a commonly used technique in the assessment of coronary artery disease. There are many patients, however, who may not be able to undergo treadmill test. Such patients would benefit from pharmacological stress procedures combined with MPS. The most commonly used pharmacological agents for cardiac stress are coronary vasodilatators (adenosine, dipyridamol and catecholamines. Concomitant low-level treadmill exercise with adenosine pharmacologic stress (AdenoEX during MPS has become commonly used in recent years. A number of studies have demonstrated a beneficial impact of AdenoEX protocol. The aim of the study was, besides introducing into practice the two types of protocols of pharmatological stress test with adenosine, as a preparation for MPS, to compare and monitor the frequency of their side effects to quality, acquisition, as well as to standardize the onset time of acquisition (diagnostic imaging for both protocols. Methods. A total of 130 patients underwent pharmacological stress test with adenosine (vasodilatator. In 108 of the patients we performed concomitant exercise (AdenoEX of low level (50W by a bicycle ergometar. In 28 of the patients we performed Adenosine abbreviated protocol (AdenoSCAN. Side effects of adenosine were followed and compared between the two kinds of protocols AdenoEX and AdenoSCAN. Also compared were image quality and suggested time of acquisition after the stress test. Results. Numerous side effects were found, but being short-lived they did not require any active interventions. The benefit of AdenoEX versus AdenoSCAN included decreased side effects (62% vs 87%, improved safety and patients tolerance, improved target-to-background ratios because of less subdiaphragmatic activity, earlier acquisition, and improved sensitivity. Conclusion. The safety and efficacy of adenosine pharmacological stress is even better with concomitant

  10. Protocol for determining bull trout presence

    Science.gov (United States)

    Peterson, James; Dunham, Jason B.; Howell, Philip; Thurow, Russell; Bonar, Scott

    2002-01-01

    The Western Division of the American Fisheries Society was requested to develop protocols for determining presence/absence and potential habitat suitability for bull trout. The general approach adopted is similar to the process for the marbled murrelet, whereby interim guidelines are initially used, and the protocols are subsequently refined as data are collected. Current data were considered inadequate to precisely identify suitable habitat but could be useful in stratifying sampling units for presence/absence surveys. The presence/absence protocol builds on previous approaches (Hillman and Platts 1993; Bonar et al. 1997), except it uses the variation in observed bull trout densities instead of a minimum threshold density and adjusts for measured differences in sampling efficiency due to gear types and habitat characteristics. The protocol consists of: 1. recommended sample sizes with 80% and 95% detection probabilities for juvenile and resident adult bull trout for day and night snorkeling and electrofishing adjusted for varying habitat characteristics for 50m and 100m sampling units, 2. sampling design considerations, including possible habitat characteristics for stratification, 3. habitat variables to be measured in the sampling units, and 3. guidelines for training sampling crews. Criteria for habitat strata consist of coarse, watershed-scale characteristics (e.g., mean annual air temperature) and fine-scale, reach and habitat-specific features (e.g., water temperature, channel width). The protocols will be revised in the future using data from ongoing presence/absence surveys, additional research on sampling efficiencies, and development of models of habitat/species occurrence.

  11. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  12. A kind of universal quantum secret sharing protocol.

    Science.gov (United States)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-12

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  13. A kind of universal quantum secret sharing protocol

    Science.gov (United States)

    Chen, Xiu-Bo; Dou, Zhao; Xu, Gang; He, Xiao-Yu; Yang, Yi-Xian

    2017-01-01

    Universality is an important feature, but less researched in quantum communication protocols. In this paper, a kind of universal quantum secret sharing protocol is investigated. Firstly, we design a quantum secret sharing protocol based on the Borras-Plastino-Batle (BPB) state. Departing from previous research, our protocol has a salient feature in that participants in our protocol only need projective measurement instead of any unitary operations. It makes our protocol more flexible. Secondly, universality of quantum communication protocols is studied for the first time. More specifically, module division of quantum communication protocols and coupling between different modules are discussed. Our aforementioned protocol is analyzed as an example. On one hand, plenty of quantum states (the BPB-class states and the BPB-like-class states, which are proposed in this paper) could be used as carrier to perform our protocol. On the other hand, our protocol also could be regarded as a quantum private comparison protocol with a little revision. These features are rare for quantum communication protocols, and make our protocol more robust. Thirdly, entanglements of the BPB-class states are calculated in the Appendix.

  14. The Research and Application Design of SDL Protocol

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Aiming at overcoming the disadvantages in the Simple Data Link(SDL) protocol, we study and modify the protocol mechanism, which enhances the flexibility in carrying the packets of various network layer protocols and improves the ability to correct errors. We research the error check and error correction of CRC and the application of MPLS labels in the SDL protocol. Furthermore, we provide a method of CRC correction and application of MPLS labels in the SDL protocol. Finally, we present a scheme of realizing the SDL protocol.

  15. Energy-efficient MAC protocols for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Li De-liang; Peng Fei

    2009-01-01

    Designing energy-efficient Medium Access Control (MAC) protocols has a significant influence on the energy performance of wireless sensor network (WSN). In this paper we present a survey of the recent typical MAC protocols regarding energy efficiency for WSN. According to channel access policies, we classify these protocols into four categories: contention-based, TDMA-based, hybrid, and cross layer protocols, in which the advantages and disadvantages in each class of MAC protocols are discussed. Finally, we point out open research issues that need to carry on to achieve high energy efficiency for the design of MAC protocols in WSN.

  16. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  17. Staining protocol for organotypic hippocampal slice cultures.

    Science.gov (United States)

    Gogolla, Nadine; Galimberti, Ivan; DePaola, Vincenzo; Caroni, Pico

    2006-01-01

    This protocol details a method to immunostain organotypic slice cultures from mouse hippocampus. The cultures are based on the interface method, which does not require special equipment, is easy to execute and yields slice cultures that can be imaged repeatedly, from the time of isolation at postnatal day 6-9 up to 6 months in vitro. The preserved tissue architecture facilitates the analysis of defined hippocampal synapses, cells and entire projections. Time-lapse imaging is based on transgenes expressed in the mice or on constructs introduced through transfection or viral vectors; it can reveal processes that develop over periods ranging from seconds to months. Subsequent to imaging, the slices can be processed for immunocytochemistry to collect further information about the imaged structures. This protocol can be completed in 3 d.

  18. Internet Core Protocols Help for Network Administrators

    CERN Document Server

    Hall, Eric

    2000-01-01

    If you've ever been responsible for a network, you know that sinkingfeeling: your pager has gone off at 2 a.m., the network is broken, and you can't figure out why by using a dial-in connection from home. You drive into the office, dig out your protocol analyzer, and spend the next fourhours trying to put things back together before the staff shows up for work. When this happens, you often find yourself looking at the low-level guts of the Internet protocols: you're deciphering individual packets, trying to figure out what is (or isn't) happening. Until now, the only real guide to the protoc

  19. Integrated Routing Protocol for Opportunistic Networks

    CERN Document Server

    Verma, Anshul

    2012-01-01

    In opportunistic networks the existence of a simultaneous path is not assumed to transmit a message between a sender and a receiver. Information about the context in which the users communicate is a key piece of knowledge to design efficient routing protocols in opportunistic networks. But this kind of information is not always available. When users are very isolated, context information cannot be distributed, and cannot be used for taking efficient routing decisions. In such cases, context oblivious based schemes are only way to enable communication between users. As soon as users become more social, context data spreads in the network, and context based routing becomes an efficient solution. In this paper we design an integrated routing protocol that is able to use context data as soon as it becomes available and falls back to dissemination based routing when context information is not available. Then, we provide a comparison between Epidemic and PROPHET, these are representative of context oblivious and co...

  20. Mouse cell culture - Methods and protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-12-01

    Full Text Available The mouse is, out of any doubt, the experimental animal par excellence for many many colleagues within the scientific community, notably for those working in mammalian biology (in a broad sense, from basic genetic to modeling human diseases, starting at least from 1664 Robert Hooke experiments on air’s propertyn. Not surprising then that mouse cell cultures is a well established field of research itself and that there are several handbooks devoted to this discipline. Here, Andrew Ward and David Tosh provide a necessary update of the protocols currently needed. In fact, nearly half of the book is devoted to stem cells culture protocols, mainly embryonic, from a list of several organs (kidney, lung, oesophagus and intestine, pancreas and liver to mention some........

  1. Direct data access protocols benchmarking on DPM

    CERN Document Server

    Furano, Fabrizio; Keeble, Oliver; Mancinelli, Valentina

    2015-01-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring infor...

  2. CRYPTOGRAPHIC PROTOCOL DEPENDING ON BIOMETRIC AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    SANJUKTA PAL

    2013-02-01

    Full Text Available In modern age, security is the most challenging issue for using the secure data used by computer. This cryptographic protocol on biometric authentication is nothing but the combination of cryptography and biometric authentication. Here the same idea of cryptography is working (i.e. using key, conversion of plain textinto cipher text called encryption and the reverse, means cipher text to plain text called decryption. Here the most promising method fingerprint geometry of biometric authentication is used as the key for encryption and decryption. Here this cryptographic protocol is just an algorithm for matching the key means matching of stored fingerprint images say DB Images with further given fingerprint image say Final Image. For matching purpose we used binary conversion of images. This algorithm is suitable for any type of data (means text data, multimedia data etc.

  3. Efficient Protocols for Distributed Classification and Optimization

    CERN Document Server

    Daume, Hal; Saha, Avishek; Venkatasubramanian, Suresh

    2012-01-01

    In distributed learning, the goal is to perform a learning task over data distributed across multiple nodes with minimal (expensive) communication. Prior work (Daume III et al., 2012) proposes a general model that bounds the communication required for learning classifiers while allowing for $\\eps$ training error on linearly separable data adversarially distributed across nodes. In this work, we develop key improvements and extensions to this basic model. Our first result is a two-party multiplicative-weight-update based protocol that uses $O(d^2 \\log{1/\\eps})$ words of communication to classify distributed data in arbitrary dimension $d$, $\\eps$-optimally. This readily extends to classification over $k$ nodes with $O(kd^2 \\log{1/\\eps})$ words of communication. Our proposed protocol is simple to implement and is considerably more efficient than baselines compared, as demonstrated by our empirical results. In addition, we illustrate general algorithm design paradigms for doing efficient learning over distribute...

  4. Cryptographic Protocols Based on Root Extracting

    DEFF Research Database (Denmark)

    Koprowski, Maciej

    In this thesis we design new cryptographic protocols, whose security is based on the hardness of root extracting or more speci cally the RSA problem. First we study the problem of root extraction in nite Abelian groups, where the group order is unknown. This is a natural generalization of the...... construction based on root extracting. As an example of this, we modify Cramer-Shoup signature scheme such that it becomes a genericm algorithm. We discuss then implementing it in RSA groups without the original restriction that the modulus must be a product of safe primes. It can also be implemented in class......,  providing a currently acceptable level of security. This allows us to propose the rst practical blind signature scheme provably secure, without relying on heuristics called random oracle model (ROM). We obtain the protocol for issuing blind signatures by implementing our modi ed Fischlin's signing algorithm...

  5. Statistical principles for prospective study protocols:

    DEFF Research Database (Denmark)

    Christensen, Robin; Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research...... to quantify relationships in data. Despite an increased focus on statistical content and complexity of biomedical research these topics remain difficult for most researchers. Statistical methods enable researchers to condense large spreadsheets with data into means, proportions, and difference between means...... are "statistically significant" or not. In the present paper we outline the considerations and suggestions on how to build a trial protocol, with an emphasis on having a rigorous protocol stage, always leading to a full article manuscript, independent of statistical findings. We conclude that authors, who find...

  6. Fairness in Physical Products Delivery Protocol

    Directory of Open Access Journals (Sweden)

    Abdullah Mohammed Alaraj

    2012-12-01

    Full Text Available In an e-commerce transaction, a buyer purchases a physical product, such as a laptop, from an onlineseller. In an attempt to protect himself, any seller would prefer to collect payment from the buyer beforehe sends the product. Likewise, the buyer would prefer to have the product shipped to him before hemakes a payment to the seller. Both parties have a need to take precautions to minimize their risk in casethe other party proves to be untrustworthy. This paper proposes a new e-commerce fair exchangeprotocol based on verifiable and recoverable encryption of keys. The proposed protocol is based onoffline TTP. Only seven messages are exchanged between the parties involved in the protocol. Disputesare resolved electronically in case one party evades

  7. Bell Inequalities, Experimental Protocols and Contextuality

    CERN Document Server

    Kupczynski, Marian

    2014-01-01

    The violation of Bell, CHSH and CH inequalities indicates only that the assumption of "conterfactual definiteness" and/or the probabilistic models used in proofs were incorrect. In this paper we discuss in detail an intimate relation between experimental protocols and probabilistic models. In particular we show that local realistic and stochastic hidden variable models are inconsistent with the experimental protocols used in spin polarization correlation experiments. In particular these models neglect a contextual character of quantum theory (QT) and do not describe properly quantum measurements. We argue that the violation of various inequalities gives arguments against the irreducible randomness of act of the measurement. Therefore quantum probabilities are reducible what means that QT is emergent. In this case one could expect to discover in time series of data some unpredicted fine structures proving that QT is not predictably complete what would be a major discovery.

  8. Gamma camera performance: technical assessment protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bolster, A.A. [West Glasgow Hospitals NHS Trust, London (United Kingdom). Dept. of Clinical Physics; Waddington, W.A. [University College London Hospitals NHS Trust, London (United Kingdom). Inst. of Nuclear Medicine

    1996-12-31

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera`s computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author).

  9. COMPUTATIONALLY EFFICIENT PRIVATE INFORMATION RETRIEVAL PROTOCOL

    Directory of Open Access Journals (Sweden)

    A. V. Afanasyeva

    2016-03-01

    Full Text Available This paper describes a new computationally efficient private information retrieval protocol for one q-ary symbol retrieving. The main advantage of the proposed solution lies in a low computational complexity of information extraction procedure, as well as the constructive simplicity and flexibility in choosing the system parameters. Such results are based on cosets properties. The proposed protocol has communication complexity slightly worse than the best schemes at the moment, which is based on locally decodable codes, but it can be easily built for any parameters of the system, as opposed to codes. In comparison with similar solutions based on polynomials, the proposed method gains in computational complexity, which is important especially for servers which must service multiple requests from multiple users.

  10. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    .e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful......Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i...... considerations on the available resources, especially in meeting real-time and resource constraints, as well as cost and reliability requirements. For this reason many proposed security protocols in this domain have peculiar features, not present in traditional security literature. In this thesis we tackle...

  11. Statistical principles for prospective study protocols:

    DEFF Research Database (Denmark)

    Christensen, Robin; Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research...... are "statistically significant" or not. In the present paper we outline the considerations and suggestions on how to build a trial protocol, with an emphasis on having a rigorous protocol stage, always leading to a full article manuscript, independent of statistical findings. We conclude that authors, who find...... to quantify relationships in data. Despite an increased focus on statistical content and complexity of biomedical research these topics remain difficult for most researchers. Statistical methods enable researchers to condense large spreadsheets with data into means, proportions, and difference between means...

  12. Automated Verification of Quantum Protocols using MCMAS

    Directory of Open Access Journals (Sweden)

    F. Belardinelli

    2012-07-01

    Full Text Available We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC, an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  13. Stabilizing token schemes for population protocols

    CERN Document Server

    Canepa, Davide

    2008-01-01

    In this paper we address the stabilizing token circulation and leader election problems in population protocols model augmented with oracles. Population protocols is a recent model of computation that captures the interactions of biological systems. In this model emergent global behavior is observed while anonymous finite-state agents(nodes) perform local peer interactions. Uniform self-stabilizing leader election or token circulation are impossible in such systems without additional assumptions. Therefore, the classical model has been augmented with the eventual leader detector, $\\Omega?$, that eventually detects the presence or the absence of a leader. In this work we propose some impossibility results related to self-stabilizing implementation of leader election and token circulation in this model. Then we propose deterministic and probabilistic self-stabilizing solutions for token circulation and leader election for various topologies (chains, trees and arbitrary networks). Additionally, we prove the nece...

  14. Progress in anti-neoplastic effects and mechanisms of dihydroartemisinin%二氢青蒿素抗肿瘤作用及其机制研究进展

    Institute of Scientific and Technical Information of China (English)

    陆金健; 黄鸣清; 陈修平; 王一涛

    2012-01-01

    Dihydroartemisinin, an important artemisinin derivative, presents excellent anti-neoplastic potential. This article reviews the latest progress in the anti-cancer activity of dihydroartemisinin and the possible mechanisms including anti-proliferation, cell cycle arrest, apoptosis induction, anti-angiogenesis and anti-metastasis. Iron ( Ⅱ) or heme may be the direct target for dihydroartemisinin. The broad anti-cancer spectrum, the low toxicity to normal cells and the potential of anti-multi-drug resistant cells make it a likely new anti-cancer candidate compound.%二氢青篙素是青蒿素的重要衍生物,具有显著的抗疟作用.对多种肿瘤动物模型具有一定的肿瘤抑制作用,提示其具有抗肿瘤作用.二氢青蒿素的抗肿瘤作用机制可能与抑制肿瘤细胞增殖包括诱导肿瘤细胞周期阻滞和促进肿瘤细胞凋亡、抑制肿瘤新生血管生成以及抗肿瘤细胞侵袭和转移等有关.细胞内亚铁或亚铁血红素可能是二氢青蒿素抗肿瘤作用的直接靶点.由于二氢青蒿素具有广谱抗肿瘤作用、对正常细胞毒性小及对多药耐药细胞有效等优点,因此有可能被开发为新的抗肿瘤药物.

  15. Revisiting the structure of the anti-neoplastic glucans of Mycobacterium bovis Bacille Calmette-Guerin. Structural analysis of the extracellular and boiling water extract-derived glucans of the vaccine substrains.

    Science.gov (United States)

    Dinadayala, Premkumar; Lemassu, Anne; Granovski, Pierre; Cérantola, Stéphane; Winter, Nathalie; Daffé, Mamadou

    2004-03-26

    The attenuated strain of Mycobacterium bovis Bacille Calmette-Guérin (BCG), used worldwide to prevent tuberculosis and leprosy, is also clinically used as an immunotherapeutic agent against superficial bladder cancer. An anti-tumor polysaccharide has been isolated from the boiling water extract of the Tice substrain of BCG and tentatively characterized as consisting primarily of repeating units of 6-linked-glucosyl residues. Mycobacterium tuberculosis and other mycobacterial species produce a glycogen-like alpha-glucan composed of repeating units of 4-linked glucosyl residues substituted at some 6 positions by short oligoglucosyl units that also exhibits an anti-tumor activity. Therefore, the impression prevails that mycobacteria synthesize different types of anti-neoplastic glucans or, alternatively, the BCG substrains are singular in producing a unique type of glucan that may confer to them their immunotherapeutic property. The present study addresses this question through the comparative analysis of alpha-glucans purified from the extracellular materials and boiling water extracts of three vaccine substrains. The polysaccharides were purified, and their structural features were established by mono- and two-dimensional NMR spectroscopy and matrix-assisted laser desorption/ionization time-of-flight mass spectrometry of the enzymatic and chemical degradation products of the purified compounds. The glucans isolated by the two methods from the three substrains of BCG were shown to exhibit identical structural features shared with the glycogen-like alpha-glucan of M. tuberculosis and other mycobacteria. Incidentally, we observed an occasional release of dextrans from Sephadex columns that may explain the reported occurrence of 6-substituted alpha-glucans in mycobacteria.

  16. In vitro and in vivo studies of the antineoplastic activity of copper (II) compounds against human leukemia THP-1 and murine melanoma B16-F10 cell lines.

    Science.gov (United States)

    Borges, Layla J H; Bull, Érika S; Fernandes, Christiane; Horn, Adolfo; Azeredo, Nathalia F; Resende, Jackson A L C; Freitas, William R; Carvalho, Eulógio C Q; Lemos, Luciana S; Jerdy, Hassan; Kanashiro, Milton M

    2016-11-10

    We investigated the antineoplastic activities of a previously reported copper (II) coordination compound, [Cu(BMPA)Cl2]CH3OH (1), and a new compound, [Cu(HBPA)Cl2]H2O (2), where BMPA is bis(pyridin-2-ylmethyl)amine and HBPA is (2-hydroxybenzyl)(2-pyridylmethyl)amine, using various cellular models of human leukemia (THP-1, U937, HL60, Molt-4, JURKAT) and human colon cancer (COLO 205), as well as a murine highly metastatic melanoma (B16-F10) cell line. Compound (2) was characterized using several physical and chemical techniques, including X-ray diffraction studies. The IC50 values of the copper coordination complexes in the human leukemia cell lines ranged from 87.63 ± 1.02 to ≥400 μM at high cell concentrations and from 19.17 ± 1.06 to 97.67 ± 1.23 μM at low cell concentrations. Both compounds induced cell death, which was determined by cell cycle analyses and phosphatidylserine exposure studies. THP-1 cells released cytochrome c to the cytoplasm 12 h after treatment with 400 μM of compound (2). To evaluate the apoptosis pathway induced by compound (2), we measured the activities of initiator caspases 8 and 9 and executioner caspases 3 and 6. The results were suggestive of the activation of both intrinsic and extrinsic apoptosis pathways. To investigate the activities of the compounds in vivo, we selected two sensitive cell lines from leukemia (THP-1) and solid tumor (B16-F10) lineages. BALB/c nude bearing THP-1 tumors treated with 12 mg·kg(-1) of compound (2) showed a 92.4% inhibition of tumor growth compared with the control group.

  17. Instability Free Routing: Beyond One Protocol Instance

    Science.gov (United States)

    2008-12-01

    assigned a Rout- ing Information Base (RIB) [13]. This database is used to store the routing information related to the routing process (e.g., routes...presents routing anomalies that can derive from route selection by itself, i.e., without any route redis - tribution configured between the routing... redis - tributed into the RIP protocol, all RIP messages received from the neighbors are in fact discarded independently of the AD values. This

  18. Building America House Simulation Protocols (Revised)

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  19. A CONTRIBUTION TO SECURE THE ROUTING PROTOCOL

    Directory of Open Access Journals (Sweden)

    Mohammed ERRITALI

    2011-10-01

    Full Text Available This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter StatelessRouting for vehicular ad hoc networks, we examine the possible attacks against GPSR and securitysolutions proposed by different research teams working on ad hoc network security. Then, we propose asolution to secure GPSR packet by adding a digital signature based on symmetric cryptographygenerated using the AES algorithm and the MD5 hash function more suited to a mobile environment

  20. Acupuncture for osteoporosis: a systematic review protocol

    OpenAIRE

    Guo, Taipin; Chen, Xiao; Wu, Xiangnong; Shan, Exian; Jin, Yaju; Tai, Xiantao; Liu, Zili; Zhu, Bowen; Yuan, Kai; Chen, Zukun

    2016-01-01

    Background Osteoporosis is a global high prevalence of chronic metabolic disease with serious disability-adjusted life years losing. Acupuncture is used to treat osteoporosis broadly in China and other countries although the evidence on effectiveness cannot give a certain answer. The aim of this systematic review protocol is to appraise the efficacy and safety of acupuncture for osteoporosis. Methods A literature search of randomized controlled trials focusing on acupuncture for osteoporosis ...

  1. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  2. The EXACT description of biomedical protocols

    OpenAIRE

    Soldatova, L.N.,Aubrey, W., King, R.D. & and Clare, A.

    2008-01-01

    © 2008 The Author(s). This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/2.0/uk/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. Motivation: Many published manuscripts contain experiment protocols which are poorly described or deficient in information. This means that the published results a...

  3. Dynamic Characteristics of Explicit Control Protocol

    Institute of Scientific and Technical Information of China (English)

    CHENG Shuang-mei; LI Jian-hua; GUO Chuan-xiong

    2008-01-01

    The dynamic characteristics of eplicit control protocol (XCP) were investigated with single bottle-neck on the microscopic time-scale. Analysis and simulation results show that the bandwidth utilization of an XCP bottleneck link converges to 1 at exponential rate, persistent congestion cannot occur at the bottleneck link, and throughput of an arbitrary subset of XCP flows at the bottleneck link converges to its fair share in exponential rate. The XCP has high bandwidth utilization and good fairness properties.

  4. Typed Multiset Rewriting Specifications of Security Protocols

    Science.gov (United States)

    2011-10-01

    Cape Breton , NS, Canada, 24–26 June 2002. IEEE Computer Society Press. [12] Frederic Butler, Iliano Cervesato, Aaron D. Jaggard, and Andre Scedrov... andR an active role set. Let moreover ΣDY and PDY be the signature and protocol theory for the Dolev-Yao intruder. 1. If ` Σ, then ` Σ,ΣDY ; 2. If Σ...Computer Society Press. [4] Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, and Joe-Kai Tsay. Cryptographically Sound Security

  5. Insights From Verbal Protocols: A Case Study

    OpenAIRE

    Margaret Kumar

    2012-01-01

    This study explores a postgraduate student writer’s responses and reactions through verbal protocols as she attends to teacher feedback. Teacher feedback has been heralded as an important element in process writing. Numerous studies have been carried out on various aspects of teacher feedback such as on the effectiveness of feedback, students’ preferences for teacher feedback and students’ perceptions of feedback. However, there is still a gap in the literature in determining how students res...

  6. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  7. A dual-consistency cache coherence protocol

    OpenAIRE

    Ros, Alberto; Jimborean, Alexandra

    2015-01-01

    Weak memory consistency models can maximize system performance by enabling hardware and compiler optimizations, but increase programming complexity since they do not match programmers’ intuition. The design of an efficient system with an intuitive memory model is an open challenge. This paper proposes SPEL, a dual-consistency cache coherence protocol which simultaneously guarantees the strongest memory consistency model provided by the hardware and yields improvements in both performance and ...

  8. Protocol for Initial Purification of Bacteriocin

    Science.gov (United States)

    2015-10-01

    The new NSRDEC protocol includes filtering the lysate/ filtrate through filters with a 30,000 molecular weight cut-off (MWCO), 10,000 MWCO, and 1,000... Resistant bacteria strains survive. Over a period of repeated use, the resistant strains become the prevalent species, making the antimicrobial...lysate/ filtrate through filters with a 30,000 molecular weight cut-off (MWCO), 10,000 MWCO, and 1,000 MWCO pore size to remove unwanted protein/debris

  9. QAODV: Improved Security Routing Protocol of AODV

    OpenAIRE

    Ruihui Mu; Wuqiang Zhang

    2013-01-01

    Network control system (NCS) has higher requirements on QoS index of the network, but MANET can hardly meet the demands of control systems because of its own characteristics. The paper improves AODV and proposes AODV routing protocol QAODV with certain QoS security in combination with NCS and MANET, and expounds routing detection, routing register and routing maintenance. Simulation results show that end-to-end delay and packet loss of QAODV reduces evidently compared with AODV, and the proto...

  10. The regensburg protocol for spinal metastases

    Directory of Open Access Journals (Sweden)

    José Manuel Pérez Atanasio

    2013-12-01

    Full Text Available Metastases to the vertebrae are a common problem in the practice of a spine surgeon. Therapeutic intervention can alleviate pain, preserve or improve neurologic function, achieve mechanical stability, optimize local tumor control, and improve quality of life. Treatment options available for metastatic spine tumors include radiation therapy, chemotherapy and surgery. This article is focused on the decision making for spine surgeons and shows the protocol to treat spinal metastases at the University Hospital of Regensburg, Germany.

  11. Protocol for emergency EPR dosimetry in fingernails

    OpenAIRE

    Trompier, F; Kornak, L.; Calas, C.; Romanyukha, A.; LeBlanc, B.; Mitchell, C. A.; Swartz, H M; Clairand, I.

    2007-01-01

    There is an increased need for after-the-fact dosimetry because of the high risk of radiation exposures due to terrorism or accidents. In case of such an event, a method is needed to make measurements of dose in a large number of individuals rapidly and with sufficient accuracy to facilitate effective medical triage. Dosimetry based on EPR measurements of fingernails potentially could be an effective tool for this purpose. This paper presents the first operational protocols for EPR fingernail...

  12. CREATION OF THE MODEL ADDITIONAL PROTOCOL

    Energy Technology Data Exchange (ETDEWEB)

    Houck, F.; Rosenthal, M.; Wulf, N.

    2010-05-25

    In 1991, the international nuclear nonproliferation community was dismayed to discover that the implementation of safeguards by the International Atomic Energy Agency (IAEA) under its NPT INFCIRC/153 safeguards agreement with Iraq had failed to detect Iraq's nuclear weapon program. It was now clear that ensuring that states were fulfilling their obligations under the NPT would require not just detecting diversion but also the ability to detect undeclared materials and activities. To achieve this, the IAEA initiated what would turn out to be a five-year effort to reappraise the NPT safeguards system. The effort engaged the IAEA and its Member States and led to agreement in 1997 on a new safeguards agreement, the Model Protocol Additional to the Agreement(s) between States and the International Atomic Energy Agency for the Application of Safeguards. The Model Protocol makes explicit that one IAEA goal is to provide assurance of the absence of undeclared nuclear material and activities. The Model Protocol requires an expanded declaration that identifies a State's nuclear potential, empowers the IAEA to raise questions about the correctness and completeness of the State's declaration, and, if needed, allows IAEA access to locations. The information required and the locations available for access are much broader than those provided for under INFCIRC/153. The negotiation was completed in quite a short time because it started with a relatively complete draft of an agreement prepared by the IAEA Secretariat. This paper describes how the Model Protocol was constructed and reviews key decisions that were made both during the five-year period and in the actual negotiation.

  13. The CERN Control Protocol for power converters

    Energy Technology Data Exchange (ETDEWEB)

    Barnett, I.; Benincasa, G.; Berrig, O.; Brun, R.; Burla, P.; Coudert, G.; Pett, J.G.; Pittin, R.; Royer, J.P.; Trofimov, N. (CERN, Geneva (Switzerland))

    1993-08-01

    The Control Protocols provide, for a class of similar devices, a unique and standard access procedure from the control system. Behavioral models have been proposed for the different kinds of Power Converters and the corresponding functionalities, with their parameters, variables and attributes have been identified. The resulting data structures have been presented using the ISO ASN.1 metalanguage, that permits universal representation independent of any computer environment. Implementations in the UNIX-based CERN accelerator control systems are under development.

  14. Application Protocol Design for Collaborative Learning

    Directory of Open Access Journals (Sweden)

    Joung-Souk Sung

    2009-12-01

    Full Text Available This presentation will describe the effort to construct an effective educational support environment and to develop meaningful educational applications, This system is a framework supporting interactive collaboration which enables both teachers and students to interact in real-time from remote sites. The purpose of this collaboration is to bring interactive multimedia learning in real-time. In order to induce collaborative learning, this paperproposes protocol design process that shares knowledge awareness information for learning environments. The protocol helps learner to mediate and recognize collaborators in the shared knowledge space. We are developing an open-ended collaborative learning supportsystem, which is called prototype system for protocol design, and facilities to share individual knowledge and to learn through collaboration. This system architecture can be viewed asdivided in four logical parts: the infrastructure, the service functions, the advanced service functions and the application. The session management is creates/destroys the sessions and performs the functions controlling the QOS by detaching the network load. Session manager include: session control, floor control, media instance control, packet interpreter, event interpreter, media server instance, media interface, network interface private applicationinterface and media server control.

  15. Analyzing Interoperability of Protocols Using Model Checking

    Institute of Scientific and Technical Information of China (English)

    WUPeng

    2005-01-01

    In practical terms, protocol interoperability testing is still laborious and error-prone with little effect, even for those products that have passed conformance testing. Deadlock and unsymmetrical data communication are familiar in interoperability testing, and it is always very hard to trace their causes. The previous work has not provided a coherent way to analyze why the interoperability was broken among protocol implementations under test. In this paper, an alternative approach is presented to analyzing these problems from a viewpoint of implementation structures. Sequential and concurrent structures are both representative implementation structures, especially in event-driven development model. Our research mainly discusses the influence of sequential and concurrent structures on interoperability, with two instructive conclusions: (a) a sequential structure may lead to deadlock; (b) a concurrent structure may lead to unsymmetrical data communication. Therefore, implementation structures carry weight on interoperability, which may not gain much attention before. To some extent, they are decisive on the result of interoperability testing. Moreover, a concurrent structure with a sound task-scheduling strategy may contribute to the interoperability of a protocol implementation. Herein model checking technique is introduced into interoperability analysis for the first time. As the paper shows, it is an effective way to validate developers' selections on implementation structures or strategies.

  16. Heterogeneous LEACH Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Nishi Sharma

    2013-07-01

    Full Text Available Wireless Sensor Networks are networks of large number of tiny, battery powered sensor nodes having limited on-board storage, processing, and radio capabilities. Nodes sense and send their reports toward a processing center which is called base station. Since this transmission and reception process consumes lots of energy as compare to data processing, Designing protocols and applications for such networks has to be energy aware in order to prolong the lifetime of the network. Generally, real life applications deal with such Heterogeneity rather than Homogeneity. In this paper, a protocol is proposed, which is heterogeneous in energy. We analyze the basic distributed clustering routing protocol LEACH (Low Energy Adaptive Clustering Hierarchy, which is a homogeneous system, and then we study the impact of heterogeneity in energy of nodes to prolong the life time of WSN. Simulation results using MATLAB shows that the proposed Leach-heterogeneous system significantly reduces energy consumption and increase the total lifetime of the wireless sensor network.

  17. Voice over Internet Protocol (VOIP: Future Potential

    Directory of Open Access Journals (Sweden)

    Ms. Deepti

    2014-11-01

    Full Text Available VoIP (voice over IP delivers standard voice over telephone services over Internet Protocol (IP. VoIP is the technology of digitizing sound, compressing it, breaking it up into data packets, and sending it over an IP (internet protocol network where it is reassembled, decompressed, and converted back into an analog wave form. Gateways are the key component required to facilitate IP Telephony. A gateway is used to bridge the traditional circuit switched PSTN with the packet switched Internet. The paper covers software, hardware and protocol requirements followed by weighing the VoIP advantages such as low cost, portability, free and advanced features, bandwidth efficiency, call recording and monitoring against the VoIP disadvantages such as power dependency, quality of voice and service, security, and reliability. With ever increasing internet penetration and better broadband connectivity, VoIP is going to expand further with businesses already using VoIP standalone or in a hybrid format, although our focus and scope here remains VoIP. Mobile VoIP, an infant with less than 4% market share, has so far been focusing on increasing active subscriptions without a sustainable revenue model, but has the potential and is going to see tussle with static VoIP for space in days ahead.

  18. VOICE OVER INTERNET PROTOCOL (VOIP: FUTURE POTENTIAL

    Directory of Open Access Journals (Sweden)

    Deepti Kumari

    2015-10-01

    Full Text Available VoIP (voice over IP delivers standard voice over telephone services over Internet Protocol (IP. VoIP is the technology of digitizing sound, compressing it, breaking it up into data packets, and sending it over an IP (internet protocol network where it is reassembled, decompressed, and converted back into an analog wave form. Gateways are the key component required to facilitate IP Telephony. A gateway is used to bridge the traditional circuit switched PSTN with the packet switched Internet. The paper covers software, hardware and protocol requirements followed by weighing the VoIP advantages such as low cost, portability, free and advanced features, bandwidth efficiency, call recording and monitoring against the VoIP disadvantages such as power dependency, quality of voice and service, security, and reliability. With ever increasing internet penetration and better broadband connectivity, VoIP is going to expand further with businesses already using VoIP standalone or in a hybrid format, although our focus and scope here remains VoIP. Mobile VoIP, an infant with less than 4% market share, has so far been focusing on increasing active subscriptions without a sustainable revenue model, but has the potential and is going to see tussle with static VoIP for space in days ahead.

  19. Modeling and Verification of the Bitcoin Protocol

    Directory of Open Access Journals (Sweden)

    Kaylash Chaudhary

    2015-11-01

    Full Text Available Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.

  20. Analysis of Security Protocols for Mobile Healthcare.

    Science.gov (United States)

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  1. Comparison of CSMA based MAC protocols of wireless sensor networks

    CERN Document Server

    singh, Himanshu

    2012-01-01

    Energy conservation has been an important area of interest in Wireless Sensor networks (WSNs). Medium Access Control (MAC) protocols play an important role in energy conservation. In this paper, we describe CSMA based MAC protocols for WSN and analyze the simulation results of these protocols. We implemented S-MAC, T-MAC, B-MAC, B-MAC+, X-MAC, DMAC and Wise-MAC in TOSSIM, a simulator which unlike other simulators simulates the same code running on real hardware. Previous surveys mainly focused on the classification of MAC protocols according to the techniques being used or problem dealt with and presented a theoretical evaluation of protocols. This paper presents the comparative study of CSMA based protocols for WSNs, showing which MAC protocol is suitable in a particular environment and supports the arguments with the simulation results. The comparative study can be used to find the best suited MAC protocol for wireless sensor networks in different environments.

  2. Yoga-teaching protocol adapted for children with visual impairment

    Directory of Open Access Journals (Sweden)

    Soubhagyalaxmi Mohanty

    2016-01-01

    Conclusions: Specially designed protocol may pave the way to impart yoga in an exciting and comfortable way to children with VI. More studies are needed to further investigate the effectiveness of this new yoga protocol in similar settings.

  3. Passive Cryptanalysis of Unconditionally Secure Authentication Protocol for RFID Systems

    CERN Document Server

    Abyaneh, Mohammad Reza Sohizadeh

    2010-01-01

    Recently, Alomair et al. proposed the first UnConditionally Secure mutual authentication protocol for low-cost RFID systems(UCS-RFID). The security of the UCS-RFID relies on five dynamic secret keys which are updated at every protocol run using a fresh random number (nonce) secretly transmitted from a reader to tags. Our results show that, at the highest security level of the protocol (security parameter= 512), inferring a nonce is feasible with the probability of 0.99 by eavesdropping(observing) about 90 runs of the protocol. Finding a nonce enable a passive attacker to recover all five secret keys of the protocol. To do so, we propose a three-phase probabilistic approach in this paper. Our attack recovers the secret keys with a probability that increases by accessing to more protocol runs. We also show that tracing a tag using this protocol is also possible even with less runs of the protocol.

  4. Analysis of a key-establishment security protocol

    Directory of Open Access Journals (Sweden)

    Reiner Dojen

    2008-05-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and non-repudiation. This paper is concerned with attacks against security protocols. Security protocols are introduced and the most common attacks against security protocols are discussed. The Wide-Mouthed Frog key-establishemnt protocol of Burrows, Abadi and Needham is presented. Attacks which exploit known weaknesses in the protocol are discussed and a corrected version of the protocol by Lowe is presented. Analysis of the Lowe modified Wide-Mouthed Frog protocol in this paper reveals a new parallel session attack. The reasons for this attack and how it can be mounted are discussed.

  5. An Arbitrary 2D Structured Replica Control Protocol

    OpenAIRE

    Basmadjian, Robert; Meer, Hermann,

    2011-01-01

    Traditional replication protocols that logically arrange the replicas into a specific structure have reasonable availability, lower communication cost as well as system load than those that do not require any logical organisation of replicas. We propose in this paper the A2DS protocol: a single protocol that, unlike the existing proposed protocols, can be adapted to any 2D structure. Its read operation is carried out on any replica of every level of the structure whereas write operations are ...

  6. Performance Evaluation of the WSN Routing Protocols Scalability

    OpenAIRE

    2008-01-01

    Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSNs). A good routing protocol has to be scalable and adaptive to the changes in the network topology. Thus scalable protocol should perform well as the network grows larger or as the workload increases. In this paper, routing protocols for wireless sensor networks are simulated and their performances are evaluated to determine their capability for supporting network ...

  7. Performance Evaluation of the WSN Routing Protocols Scalability

    Directory of Open Access Journals (Sweden)

    L. Alazzawi

    2008-01-01

    Full Text Available Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSNs. A good routing protocol has to be scalable and adaptive to the changes in the network topology. Thus scalable protocol should perform well as the network grows larger or as the workload increases. In this paper, routing protocols for wireless sensor networks are simulated and their performances are evaluated to determine their capability for supporting network scalability.

  8. A Model Based Security Testing Method for Protocol Implementation

    Directory of Open Access Journals (Sweden)

    Yu Long Fu

    2014-01-01

    Full Text Available The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  9. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  10. Advanced transport protocols for space communications

    Science.gov (United States)

    Fang, Jian

    Satellite IP networks are characterized by high bit error rates, long propagation delays, low bandwidth feedback links, and persistent fades resulting from varying weather patterns. A new unicast transport protocol is designed to address all the above challenges. Two new algorithms, Jump Start and Quick Recovery, are presented to replace the traditional Slow Start algorithm and to recover rapidly from multiple segment losses within one window of data. The characteristics of satellite IP networks also distinguish satellite multicasting from multicasting in terrestrial wirelined networks. A reliable data multicast transport protocol, TCP-Peachtree, is proposed to solve the acknowledgment implosion and scalability problems in satellite IP networks. Developments in space technology are enabling the realization of deep space missions. The scientific data from these missions need to be delivered to the Earth successfully. To achieve this goal, the InterPlaNetary Internet is proposed as the Internet of the deep space planetary networks, which is characterized by extremely high propagation delays, high link errors, asymmetrical bandwidth, and blackouts. A reliable transport protocol, TP-Planet, is proposed for data traffic in the InterPlaNetary Internet. TP-Planet deploys rate-based additive-increase multiplicative-decrease (AIMD) congestion control and replaces the inefficient slow start algorithm with a novel Initial State algorithm that allows the capture of link resources in a very fast and controlled manner. A new congestion detection and control mechanism is developed and a Blackout State is incorporated into the protocol operation. Multimedia traffic is also one part of the aggregate traffic over InterPlaNetary Internet backbone links and it has additional requirements such as minimum bandwidth, smooth traffic, and error control. To address all the above challenges, RCP-Planet is proposed. RCP-Planet consists of two novel algorithms, i.e., Begin State and

  11. A correctness proof of the bakery protocol in $ mu $CRL

    NARCIS (Netherlands)

    Groote, J.F.; Korver, H.P.

    1994-01-01

    A specification of a bakery protocol is given in $mu$CRL. We provide a simple correctness criterion for the protocol. Then the protocol is proven correct using a proof system that has been developed for $mu$CRL. The proof primarily consists of algebraic manipulations based on specifications of abstr

  12. Protocol channels as a new design alternative of covert channels

    CERN Document Server

    Wendzel, Steffen

    2008-01-01

    Covert channel techniques are used by attackers to transfer hidden data. There are two main categories of covert channels: timing channels and storage channels. This paper introduces a third category called protocol channels. A protocol channel switches one of at least two protocols to send a bit combination to a destination while sent packets include no hidden information themselves.

  13. 21 CFR 814.19 - Product development protocol (PDP).

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Product development protocol (PDP). 814.19 Section...) MEDICAL DEVICES PREMARKET APPROVAL OF MEDICAL DEVICES General § 814.19 Product development protocol (PDP). A class III device for which a product development protocol has been declared completed by FDA...

  14. Assessment time of the Welfare Quality protocol for dairy cattle

    NARCIS (Netherlands)

    Vries, de M.; Engel, B.; Uijl, I.; Schaik, van G.; Dijkstra, T.; Boer, de I.J.M.; Bokkers, E.A.M.

    2013-01-01

    The Welfare Quality® (WQ) protocols are increasingly used for assessing welfare of farm animals. These protocols are time consuming (about one day per farm) and, therefore, costly. Our aim was to assess the scope for reduction of on-farm assessment time of the WQ protocol for dairy cattle. Seven tra

  15. The MAC framework: redefining MAC protocols for wireless sensor networks

    NARCIS (Netherlands)

    Parker, T.; Halkes, G.; Bezemer, M.; Langendoen, K.

    2010-01-01

    Most current WSN MAC protocol implementations have multiple tasks to perform—deciding on correct timing, sending of packets, sending of acknowledgements, etc. However, as much of this is common to all MAC protocols, there is duplication of functionality, which leads to larger MAC protocol code size

  16. Implementation of Siemens USS protocol into LabVIEW.

    Science.gov (United States)

    Hosek, P; Diblik, M

    2011-10-01

    This article gives basic overview of the USS protocol as a communication interface to drive Siemens frequency inverters. It presents our implementation of this protocol into LabVIEW, as there was permanent demand from the community of the users to have native LabVIEW implementation of the USS protocol. It also states encountered problems and their solutions.

  17. Caltech computer scientists develop FAST protocol to speed up Internet

    CERN Multimedia

    2003-01-01

    "Caltech computer scientists have developed a new data transfer protocol for the Internet fast enough to download a full-length DVD movie in less than five seconds. The protocol is called FAST, standing for Fast Active queue management Scalable Transmission Control Protocol" (1 page).

  18. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo;

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain ...

  19. ASYNCHRONOUS BYZANTINE AGREEMENT PROTOCOL BASED ON VERIFIABLE SIGNATURE SHARING

    Institute of Scientific and Technical Information of China (English)

    Ji Dongyao; Feng Dengguo

    2006-01-01

    An ([n / 3]- 1 )-resilient Asynchronous Byzantine Agreement Protocol (ABAP) that combines verifiable signature sharing and random secret sharing is proposed. The protocol works in the asynchronous network environment and produces Byzantine agreement within a fixed expected number of computational rounds. The correctness of the protocol is proved in theory.

  20. An improved AODV routing protocol based on tower structure

    Directory of Open Access Journals (Sweden)

    Li Yong Qiang

    2016-01-01

    Full Text Available The paper proposed a new routing protocol(IAODV based on tower structure in the Ad Hoc network for the problem which Location Routing Protocol need hardware and Complex algorithm. By the simulation, The complexity of the new routing protocol is reduced without reducing the performance of the network.

  1. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane;

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature of the...

  2. Coping with threats of terrorism: a protocol for group intervention.

    Science.gov (United States)

    Ottenstein, Richard J

    2003-01-01

    This article presents a group protocol designed to assist people in coping with direct and ongoing threats of terrorism. The protocol is intended to enable participants to address the psychological issues necessary to cope during periods of extreme threat. A step-by-step description of the protocol is provided.

  3. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco;

    2015-01-01

    a protocol language based on a dependent type system for message-passing parallel programs, which includes various communication operators, such as point-to-point messages, broadcast, reduce, array scatter and gather. For the verification of a program against a given protocol, the protocol is first...

  4. Going Online with Protocols: New Tools for Teaching and Learning

    Science.gov (United States)

    McDonald, Joseph P.; Zydney, Janet Mannheimer; Dichter, Alan; McDonald, Elizabeth C.

    2012-01-01

    Many users of the popular professional development book, "The Power of Protocols," discovered that protocols are also very useful for online teaching. This new book, by three of the same authors, focuses on using protocols to enhance learning with their students in multiple environments including online--a growing sector of the educational world.…

  5. Spacelab system analysis: The modified free access protocol: An access protocol for communication systems with periodic and Poisson traffic

    Science.gov (United States)

    Ingels, Frank; Owens, John; Daniel, Steven

    1989-01-01

    The protocol definition and terminal hardware for the modified free access protocol, a communications protocol similar to Ethernet, are developed. A MFA protocol simulator and a CSMA/CD math model are also developed. The protocol is tailored to communication systems where the total traffic may be divided into scheduled traffic and Poisson traffic. The scheduled traffic should occur on a periodic basis but may occur after a given event such as a request for data from a large number of stations. The Poisson traffic will include alarms and other random traffic. The purpose of the protocol is to guarantee that scheduled packets will be delivered without collision. This is required in many control and data collection systems. The protocol uses standard Ethernet hardware and software requiring minimum modifications to an existing system. The modification to the protocol only affects the Ethernet transmission privileges and does not effect the Ethernet receiver.

  6. EXTENDED DYNAMIC SOURCE ROUTING PROTOCOL FOR AD HOC NETWORK

    Directory of Open Access Journals (Sweden)

    Puja Kumari Sharma

    2012-07-01

    Full Text Available MANET is a collection of self-configurable mobile nodes. Several routing protocols are proposed for ad hoc network among which DSR and AODV On demand routing protocols are mostly used. Existing Dynamic source routing protocol is not suitable for large network because packet size gets increased according to the number of nodes travelled by route discovery packet. In this paper, extended DSR routing protocol is proposed to eliminate the above limitation of existing DSR. Proposed protocol will be suitable for small and large both types of networks.

  7. Model Checking Data Consistency for Cache Coherence Protocols

    Institute of Scientific and Technical Information of China (English)

    Hong Pan; Hui-Min Lin; Yi Lv

    2006-01-01

    A method for automatic verification of cache coherence protocols is presented, in which cache coherence protocols are modeled as concurrent value-passing processes, and control and data consistency requirement are described as formulas in first-orderμ-calculus. A model checker is employed to check if the protocol under investigation satisfies the required properties. Using this method a data consistency error has been revealed in a well-known cache coherence protocol.The error has been corrected, and the revised protocol has been shown free from data consistency error for any data domain size, by appealing to data independence technique.

  8. A New Formal Method for Communication Protocol Specification

    Institute of Scientific and Technical Information of China (English)

    李腊元

    1989-01-01

    A new formal method for communication protocol specification is presented.FSM,CSP and ADT are mixed and the best features of these approaches can be offered in the fomal method.First,we briefly describe the formal techniques of communication protocol.We then put forward the hybrid method of protocol specification.Finally,an example,i.e.,IEEE 802.3 MAC protocol for LAN described by the proposed formal method,is given.The results of studies show that this hybrid formal method for protocol specification is a correct,unambiguous and complete approach.

  9. Performance Evaluation of Routing Protocols in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Laiali Almazaydeh

    2010-04-01

    Full Text Available The efficiency of sensor networks strongly depends on the routing protocol used. In this paper, we analyze three different types of routing protocols: LEACH, PEGASIS, and VGA. Sensor networks aresimulated using Sensoria simulator. Several simulations are conducted to analyze the performance of these protocols including the power consumption and overall network performance. The simulationresults, using same limited sensing range value, show that PEGASIS outperforms all other protocols while LEACH has better performance than VGA. Furthermore, the paper investigates the powerconsumption for all protocols. On the average, VGA has the worst power consumption when the sensing range is limited, while VGA is the best when the sensing range is increased

  10. Efficient multiparty protocols via log-depth threshold formulae

    DEFF Research Database (Denmark)

    Cohen, Gil; Damgård, Ivan Bjerre; Ishai, Yuval;

    2013-01-01

    We put forward a new approach for the design of efficient multiparty protocols: Design a protocol π for a small number of parties (say, 3 or 4) which achieves security against a single corrupted party. Such protocols are typically easy to construct, as they may employ techniques that do not scale...... of efficient protocols for Secure Multiparty Computation (MPC) in the presence of an honest majority, as well as broadcast protocols from point-to-point channels and a 2-cast primitive. We obtain new results on MPC over blackbox groups and other algebraic structures. The above results rely on the following...

  11. Quantum Key Distribution Using Decoy State Protocol

    Directory of Open Access Journals (Sweden)

    Sellami Ali

    2009-01-01

    Full Text Available Problem statement: Quantum key distribution provides unconditional security guaranteed by the fundamental laws of quantum physics. Unfortunately, for real-life experimental set-ups, which mainly based on faint laser pulses, the occasional production of multi-photons and channel loss make it possible for sophisticated eavesdroppers to launch various subtle eavesdropping attacks including the Photon Number Splitting (PNS attack. The decoy state protocols recently proposed to beat PNS attack and to improve dramatically distance and secure key generation rate of Quantum Key Distribution (QKD. Approach: Objective of this study was experimental implementation of weak decoy + vacuum states QKD for increasing the performance of QKD system. To show conceptually how simple it was to apply the weak decoy + vacuum state idea to a commercial QKD system, we chosen ID-3000 commercial quantum key distribution system manufactured by id quantique. To implement the weak decoy + vacuum state protocol, we had to add some new optical and electronics components to id quantique and to attenuate each signal to the intensity of either signal state or weak decoy or vacuum state randomly. Results: In our implementation, the attenuation will be done by placing a VOA (variable optical attenuator in Alice’s side. Specifically, our QKD system required the polarizations of 2 pulses from the same signal to be orthogonal. Therefore the VOA must be polarization independent so as to attenuate the two pulses equally. The VOA utilized in experiment to attenuate signals dynamically was Intensity Modulator (IM. We had implemented weak + vacuum protocol on a modified commercial QKD system over a 25 km of telecom fibers with an unconditionally secure key rate of 6.2931x10-4 per pulse. Conclusion: By making simple modifications to a commercial quantum key distribution system, we could achieve much better performance with substantially higher key generation rate and longer distance than

  12. Algebra model and security analysis for cryptographic protocols

    Institute of Scientific and Technical Information of China (English)

    HUAI Jinpeng; LI Xianxian

    2004-01-01

    More and more cryptographic protocols have been used to achieve various security requirements of distributed systems in the open network environment. However cryptographic protocols are very difficult to design and analyze due to the complexity of the cryptographic protocol execution, and a large number of problems are unsolved that range from the theory framework to the concrete analysis technique. In this paper, we build a new algebra called cryptographic protocol algebra (CPA) for describing the message operations with many cryptographic primitives, and proposed a new algebra model for cryptographic protocols based on the CPA. In the model, expanding processes of the participant's knowledge on the protocol runs are characterized with some algebraic notions such as subalgebra, free generator and polynomial algebra, and attack processes are modeled with a new notion similar to that of the exact sequence used in homological algebra. Then we develope a mathematical approach to the cryptographic protocol security analysis. By using algebraic techniques, we have shown that for those cryptographic protocols with some symmetric properties, the execution space generated by an arbitrary number of participants may boil down to a smaller space generated by several honest participants and attackers. Furthermore we discuss the composability problem of cryptographic protocols and give a sufficient condition under which the protocol composed of two correct cryptographic protocols is still correct, and we finally offer a counterexample to show that the statement may not be true when the condition is not met.

  13. NLHB : A Non-Linear Hopper Blum Protocol

    CERN Document Server

    Madhavan, Mukundan; Sankarasubramaniam, Yogesh; Viswanathan, Kapali

    2010-01-01

    In this paper, we propose a light-weight provably-secure authentication protocol called the NLHB protocol, which is a variant of the HB protocol. The HB protocol uses the complexity of decoding linear codes for security against passive attacks. In contrast, security for the NLHB protocol is proved by reducing passive attacks to the problem of decoding a class of non-linear codes\\footnote that are provably hard. We demonstrate that the existing passive attacks on the HB protocol family, which have contributed to considerable reduction in its effective key-size, are ineffective against the NLHB protocol. From the evidence, we conclude that smaller-key sizes are sufficient for the NLHB protocol to achieve the same level of passive attack security as the HB Protocol. Further, for this choice of parameters, we provide an implementation instance for the NLHB protocol for which the Prover/Verifier complexity is lower than the HB protocol, enabling authentication on very low-cost devices like RFID tags. Finally, in t...

  14. Verification of Authentication Protocols for Epistemic Goals via SAT Compilation

    Institute of Scientific and Technical Information of China (English)

    Kai-Le Su; Qing-Liang Chen; Abdul Sattar; Wei-Ya Yue; Guan-Feng Lv; Xi-Zhong Zheng

    2006-01-01

    This paper introduces a new methodology that uses knowledge structures, a specific form of Kripke semantics for epistemic logic, to analyze communication protocols over hostile networks. The paper particularly focuses on automatic verification of authentication protocols. Our approach is based on the actual definitions of a protocol, not on some difficultto-establish justifications. The proposed methodology is different from many previous approaches to automatic verification of security protocols in that it is justification-oriented instead of falsification-oriented, i.e., finding bugs in a protocol. The main idea is based on observations: separating a principal executing a run of protocol from the role in the protocol, and inferring a principal's knowledge from the local observations of the principal. And we show analytically and empirically that this model can be easily reduced to Satisfiability (SAT) problem and efficiently implemented by a modern SAT solver.

  15. The Extended Clustering AD HOC Routing Protocol (ECRP

    Directory of Open Access Journals (Sweden)

    Buthayna Al-Sharaa

    2013-06-01

    Full Text Available Ad hoc networks are acollection of mobile nodes communicating via wireless channels without any fixedinfrastructure. Because of their ease and low cost of building, ad hoc networks have a lot of attractiveapplications in different fields. The topology of ad hoc networks changes dynamically, and each node in thenetwork can act as a host or router.With the increase in the number of wirelessdevices andlarge amountof traffic to be exchanged, the demand for scalable routing protocols has increased. This paper presents ascalable routing protocol, based on AODV protocol, called the Extended Clustering Ad Hoc RoutingProtocol (ECRP. This is a hybrid protocol, which combines reactive and proactive approaches in routing.The protocol uses theGlobal PositioningSystem todetermine the position of certain nodesin the network.The evaluation methodology and simulation results obtained showthat the protocol is efficient and scaleswell in large networks

  16. A Multiple Access Protocol for Multimedia Transmission over Wireless Networks

    CERN Document Server

    Yu, Hong

    2012-01-01

    This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

  17. Lightweight Distance bound Protocol for Low Cost RFID Tags

    CERN Document Server

    Ahmed, Eslam Gamal; Hashem, Mohamed

    2010-01-01

    Almost all existing RFID authentication schemes (tag/reader) are vulnerable to relay attacks, because of their inability to estimate the distance to the tag. These attacks are very serious since it can be mounted without the notice of neither the reader nor the tag and cannot be prevented by cryptographic protocols that operate at the application layer. Distance bounding protocols represent a promising way to thwart relay attacks, by measuring the round trip time of short authenticated messages. All the existing distance bounding protocols use random number generator and hash functions at the tag side which make them inapplicable at low cost RFID tags. This paper proposes a lightweight distance bound protocol for low cost RFID tags. The proposed protocol based on modified version of Gossamer mutual authentication protocol. The implementation of the proposed protocol meets the limited abilities of low-cost RFID tags.

  18. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  19. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  20. A Comparison of Performance between Macro-mobility Protocol and Micro-mobility Protocol

    Institute of Scientific and Technical Information of China (English)

    TANG Hong; NIE Neng; WU Zhong-fu; ZHAO Jun; LIAO Xiao-feng

    2003-01-01

    Mobile IP is the proposed standard for IP mobility support. When a Mobile Node (MN) is far away from home, registration at its home agent can cause a long handoff delay that leads to significant packet drop and throughput reduction. In order to improve standard mobile IP, the mobility of MN has been divided into micro-mobility and macro-mobility. Some micro-mobility management protocols have been developed. We compare the performance between standard mobile IP (RFC2002,RFC3220,RFC3344) and micro-mobility management protocols and give some equations along with the analysis of calculating results.

  1. Delay tolerant networks protocols and applications

    CERN Document Server

    Vasilakos, Athanasios V; Spyropoulos, Thrasyvoulos

    2011-01-01

    Delay Tolerant Networks (DTN) - which include terrestrial mobile networks, exotic media networks, ad-hoc networks, and sensor networks - are becoming more important and may not be well served by the current end-to-end TCP/IP model. This book provides a self-contained, one-stop reference for researchers and practitioners who are looking toward the future of networking. The text presents a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. It also discusses various challenges associated with DTN. The author includes a wealth of illustrative

  2. Efficient Controlled Quantum Secure Direct Communication Protocols

    OpenAIRE

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Prasanta K. Panigrahi

    2015-01-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete...

  3. Radiotherapy QA of the DAHANCA 19 protocol

    DEFF Research Database (Denmark)

    Samsøe, E.; Andersen, E.; Hansen, C. R.;

    2015-01-01

    trials. RT-QA of large multicentre-trials, however, requires substantial effort and resources. Recently, we presented a digital QA platform, the CIRRO dose plan bank, which allows for central review of such trials. Here, we present our RT-QA results from the latest completed clinical protocol from...... in CTV1 dose coverage were due to clinical considerations of the tolerance dose to the spinal cord, thus compromising target dose. Five of the major deviations in total treatment time were related to comorbidities, such as alcohol- or cardiac related matters and hospitalization. The remaining two cases...

  4. Satellite-Friendly Protocols and Standards

    Science.gov (United States)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.

    2002-01-01

    We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The

  5. Comparison of Different Treatment Protocols in Osteoporosis

    Directory of Open Access Journals (Sweden)

    Ali Aydeniz

    2003-12-01

    Full Text Available The aim of this study was to compare the effectiveness of different medical treatment protocols in osteoporosis. For this purpose 153 postmenopausal women who were diagnosed as osteoporosis were randomly divided into 4 groups and given different medical treatments for 1 year period. Before and after the treatment bone mineral density was measured . Bone mineral density increased in all 4 groups after treatment. But increament in the groups was not statistically different from each other. As a result we concluded that patients choice, side effects and cost must be regarded for drug preference.

  6. Impact of Communication Protocol on Performance

    Energy Technology Data Exchange (ETDEWEB)

    Worley, P.H.

    1999-02-01

    We use the PSTSWM compact application benchmark code to characterize the performance behavior of interprocessor communication on the SGI/Cray Research Origin 2000 and T3E-900. We measure 1. single processor performance, 2. point-to-point communication performance, 3. performance variation as a function of communication protocols and transport layer for collective communication routines, and 4. performance sensitivity of full application code to choice of parallel implementation. We also compare and contrast these results with similar results for the previous generation of parallel platforms, evaluating how the relative importance of communication performance has changed.

  7. Cognitive Radio MAC Protocol for WLAN

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    To solve the performance degradation issue in current WLAN caused by the crowded unlicensed spectrum, we propose a cognitive radio (CR) media access protocol, C-CSMA/CA. The basic idea is that with cognitive radio techniques the WLAN devices can not only access the legacy WLAN unlicensed spectrum...... hole; moreover, it designs dual inband sensing scheme to detect primary user appearance. Additionally, C-CSMA/CA has the advantage to effectively solve the cognitive radio self-coexistence issues in the overlapping CR BSSs scenario. It also realizes station-based dynamic resource selection...

  8. Comparison of High Speed Congestion Control Protocols

    Directory of Open Access Journals (Sweden)

    Jawhar Ben Abed

    2012-10-01

    Full Text Available Congestion control limits the quantity of information input at a rate less important than that of thetransmission one to ensure good performance as well as protect against overload and blocking of thenetwork. Researchers have done a great deal of work on improving congestion control protocols,especially on high speed networks.In this paper, we will be studying the congestion control alongside low and high speed congestion controlprotocols. We will be also simulating, evaluating, and comparing eight of high speed congestion controlprotocols : Bic TCP, Cubic TCP, Hamilton TCP, HighSpeed TCP, Illinois TCP, Scalable TCP,Compound TCP and YeAH TCP, with multiple flows.

  9. Network protocols. Special issue; Netwerkprotocollen. Themanummer

    Energy Technology Data Exchange (ETDEWEB)

    Jansen, G.A. [RTB Van Heugten, Nijmegen (Netherlands); Rooijakkers, G.W.J. [GTI Building Automation, Amsterdam (Netherlands); Peterse, A. [Regel Partners, Hoevelaken (Netherlands); Smits, P. [Konnex Nederland, Valkenswaard (Netherlands); Hamers, E.P. [Van Dorp Installaties, Breda (Netherlands); Van der Velden, J.A.J. [Kropman, Rijswijk (Netherlands); Van Lingen, G.; Wijn, D.M. [Engineer Johnson Controls, Gorinchem (Netherlands); Deckere, W.J.M.A. [Deerns raadgevende ingenieurs, Rijswijk (Netherlands); Driessen, B. [Saia Burgess, Gouda (Netherlands); Van Olst, K. [K en R Consultants, Deventer (Netherlands); Mosterman, F. [Wago Building Technology, Harderwijk (Netherlands); Staub, R. [BUS-House, Zuerich (Switzerland); Meiring, O.B.; Hut, W.H. [Sauter Building Control Nederland, Amsterdam (Netherlands); Tukker, A. [Webeasy Products, Sliedrecht (Netherlands); Bakker, L.G.; Soethout, L.L.; Elkhuizen, P.A. [TNO Bouw en Ondergrond, Delft (Netherlands); Haeseler, U. [TAC GmbH, Berlin (Germany); Kerdel, J.F. [Siemens Building Technologies, Zoetermeer (Netherlands); Lugt, G.L.; Draijer, G.W.

    2007-11-15

    In 20 articles attention is paid to several aspects of network protocols by means of which building automation systems can exchange data: building automation and management, history of technical installations management, the open communication standard BACnet (Building Automation and Control network), the so-called ISO/IEC domotics and communication standard KNX or Konnex, the integration of electrotechnical and engineering installations by the LonWorks technology, other standard protocols as Modbus, M-bus, OPC (OLE for Process Control), an outline of TCP/IP, smart design of networks, automation and networks and building owners, the use of BACnet and Ethernet in a renovated office building, the use of an open management network in buildings, wireless open integrated systems, terminology in network communication, the use of BACnet in combination with KNX, the impact of BACnet on building automation, the role of the installation sector in the ICT-environment, knowledge of building automation and management, regulations with respect to building automation, and BACnet MSTP (Multiple Spanning Tree Protocol) [Dutch] In 20 artikelen wordt in dit themanummer aandacht besteed aan diverse aspecten m.b.t. netwerkprotocollen waarmee verschillende automatiseringssystemen gegevens met elkaar uitwisselen: gebouwautomatisering en beheer, geschiedenis van technisch installatie beheer, de open communicatie standaard BACnet (Building Automation and Control network), de zogenaamde ISO/IEC domotica en communicatie standaard KNX of Konnex, de integratie van electrotechnische en werktuigbouwkundige installaties met behulp van de LonWorks technologie, andere standaard protocollen zoals Modbus, M-bus, OPC (OLE for Process Control), uitleg over TCP/IP, slim ontwerpen van netwerken, gebouweigenaren over automatisering en netwerken, het gebruik van BACnet en Ethernet in een tot kantoorgebouw gerenoveerd monumentaal gebouw, het gebruik van een open management netwerk in gebouwen, draadloos met

  10. 2014 Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, E.; Engebrecht-Metzger, C.; Horowitz, S.; Hendron, R.

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  11. 2014 Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, E. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Engebrecht, C. Metzger [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Horowitz, S. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Hendron, R. [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  12. A LITERARY REVIEW OF MANET SECURITY PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Krishan Kumar

    2011-10-01

    Full Text Available Ad hoc networks offer various applications which are verymuch essential in wireless networks. But the vital problemconcerning their security aspects is the major issue whichmust be solved. A mobile adhoc network is a collection ofnodes that are connected through a wireless mediumforming rapidly changing topologies. The dynamic andcooperative nature of ad hoc networks present challenges insecuring these networks. Attacks on ad hoc network routingprotocols is the main problem which affects the networkperformance and reliability. Here a brief introduction ismade of the most popular protocols that follow the tabledrivenapproach and the source initiated on-demandapproach.

  13. A Safe Protocol for Amalgam Removal

    Directory of Open Access Journals (Sweden)

    Dana G. Colson

    2012-01-01

    Full Text Available Today's environment has different impacts on our body than previous generations. Heavy metals are a growing concern in medicine. Doctors and individuals request the removal of their amalgam (silver mercury restorations due to the high mercury content. A safe protocol to replace the silver mercury filling will ensure that there is minimal if any absorption of materials while being removed. Strong alternative white composite and lab-processed materials are available today to create a healthy and functioning mouth. Preparation of the patient prior to the procedure and after treatment is vital to establish the excretion of the mercury from the body.

  14. Protocol for counterfactually transporting an unknown qubit

    Directory of Open Access Journals (Sweden)

    Hatim eSalih

    2016-01-01

    Full Text Available Quantum teleportation circumvents the uncertainty principle using dual channels: a quantum one consisting of previously-shared entanglement, and a classical one, together allowing the disembodied transport of an unknown quantum state over distance. It has recently been shown that a classical bit can be counterfactually communicated between two parties in empty space, Alice and Bob. Here, by using our dual version of the chained quantum Zeno effect to achieve a counterfactual CNOT gate, we propose a protocol for transporting an unknown qubit counterfactually, that is without any physical particles travelling between Alice and Bob—no classical channel and no previously-shared entanglement.

  15. The effects of Ginkgo biloba on nephrotoxicity induced by cisplatin-based chemotherapy protocols in rats

    OpenAIRE

    Okuyan, Betül; Izzettin, Fikret Vehbi; Bingöl-Ozakpinar, Özlem; Turan, Pınar; Ozdemir, Zarife Nigar; Sancar, Mesut; Cirakli, Zeynep; Clark, Philip Martin; Ercan, Feriha

    2012-01-01

    The study was aimed at investigating the possible renoprotective effects of Ginkgo biloba on nephrotoxicity induced by cisplatin w/wo other antineoplastic agents (etoposide and gemcitabine) in rats. The animals were randomly divided into eight groups each consisting of six rats. Serum blood urea nitrogen (BUN) and creatinine values at baseline and after drug administration, kidney malondialdehyde (MDA), glutathione (GSH) levels, and myeloperoxidase activity (MPO) were measured, an...

  16. Protocol for cardiac assessment of recreational athletes.

    Science.gov (United States)

    Chinea, Ana M; Lollett, Carlos; Herrera, Hector; Passariello, Gianfranco; Wong, Sara

    2012-01-01

    In this work, the development of a database on physical fitness is presented. As initial population to fill this database, people who practice recreational sports at the Universidad Simon Bolivar (USB) were chosen. The goal was studying individual physical fitness in order to structure exercise routines that gives certain benefits without risking the individual health, promoting a less sedentary way of life. Before the study, a low-cost noninvasive protocol was designed to determine the level of physical fitness. The methodology consisted of four steps: a) A review of existing protocols to propose a set of physical fitness (International Physical Activity Questionnaire (IPAQ)), cardiovascular (heart rate variability, heart rate recovery time and arterial blood pressure), anthropomorphic, aerobic (maximum oxygen consumption) and mood state (Profile of Mood State (POMS)) measurements, which allow sketching a complete profile on the sportsman physical fitness. b) Instrumental data collection. c) Electrocardiographic signal processing. d) Data post-processing using multivariate analysis. The database was composed of 26 subject from USB. Ten subjects were soccer players, ten were mountain climbers and six were sedentary people. Results showed that the heart rate recover time after 2-3 min, IPAQ and maximum oxygen consumption have higher weights for classifying individuals according to their habitual physical activity. Heart rate variability, as well as, POMS did not contribute greatly for discriminating recreational sport from sedentary persons.

  17. Fibred Coalgebraic Logic and Quantum Protocols

    Directory of Open Access Journals (Sweden)

    Daniel Marsden

    2014-12-01

    Full Text Available Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

  18. Chapter 18: Variable Frequency Drive Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Romberger, J.

    2014-11-01

    An adjustable-speed drive (ASD) includes all devices that vary the speed of a rotating load, including those that vary the motor speed and linkage devices that allow constant motor speed while varying the load speed. The Variable Frequency Drive Evaluation Protocol presented here addresses evaluation issues for variable-frequency drives (VFDs) installed on commercial and industrial motor-driven centrifugal fans and pumps for which torque varies with speed. Constant torque load applications, such as those for positive displacement pumps, are not covered by this protocol. Other ASD devices, such as magnetic drive, eddy current drives, variable belt sheave drives, or direct current motor variable voltage drives, are also not addressed. The VFD is by far the most common type of ASD hardware. With VFD speed control on a centrifugal fan or pump motor, energy use follows the affinity laws, which state that the motor electricity demand is a cubic relationship to speed under ideal conditions. Therefore, if the motor runs at 75% speed, the motor demand will ideally be reduced to 42% of full load power; however, with other losses it is about 49% of full load power.

  19. Croatia energy planning and Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Duic, Neven; Bogdan, Zeljko [Zagreb Univ., Faculty of Mechanical Engineering and Naval Architecture, Zagreb (Croatia); Juretic, Franjo [Imperial College, London (United Kingdom); Zeljko, Mladen [Energy Inst. Hrvoje Pozar, Zagreb (Croatia)

    2005-05-01

    Croatia as an Annex I country of the UN Framework Convention on Climate Change and a country that has pledged in the Annex B of the Kyoto Protocol to reduce its GHG emissions by 5% will have to envisage a new energy strategy. Compared to the energy consumption collapse in some transitional countries, Croatia has passed through a relatively short-term reduction of GHG emissions since 1990 because of higher energy efficiency of its pretransition economy. It is expected that in case of baseline scenario, it will breach the Kyoto target in 2003. Several scenarios of power generation are compared from the point of view of GHG emissions. The cost-effective scenario expects a mixture of coal and gas fired power plants to be built to satisfy the new demand and to replace the old power plants that are being decommissioned. More Kyoto friendly scenario envisages forcing the compliance with the Protocol with measures only in power generation sector by the construction of mainly zero emission generating capacity in the future, while decommissioning the old plants as planned, and is compared to the others from the GHG emissions point of view. The conclusion is that by measures tackling only power generation, it will not be possible to keep GHG emission under the Kyoto target level. (Author)

  20. SECURING VIRTUAL IMAGES USING BLIND AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    RAVIKIRAN PEELUKHANA,

    2011-04-01

    Full Text Available The cloud virtualization technology improves the economy of scale for data centers through server consolidation, application consolidation and resources consolidation. Virtualization allows the provider to move Virtual Images from more congested host to less-congested hosts, as required. Enterprises also get improved server reliability, which in turn increases application performance. Despite these benefits, it includes major security challenges with the portability of Virtual Images between different cloud providers.The security and integrity of Virtual images is the foundation for the overall security of the cloud. Many of the Virtual images are intended to be shared by diverse and unrelated users. Unfortunately, existing approaches to cloud security built by cloud practitioners fall short when dealing with Virtual images. Secure transmission of virtual Images can bepossible by providing authentication using Blind Authentication protocol (BAP. The proposed approach authenticates the allocation of virtual images using Blind authentication protocol. It provides provable protection against replay and client side attacks even if the keys of the user are compromised. The encryption also provides template protection, revocability and alleviates the concerns on privacy in widespread use of biometrics. Carrying out the authentication in the encrypted domain is a secure process, while the encryption key acts as an additional layer of security.