WorldWideScience

Sample records for antineoplastic protocols

  1. Hypersensitivity and desensitization to antineoplastic agents: outcomes of 189 procedures with a new short protocol and novel diagnostic tools assessment.

    Science.gov (United States)

    Madrigal-Burgaleta, R; Berges-Gimeno, M P; Angel-Pereira, D; Ferreiro-Monteagudo, R; Guillen-Ponce, C; Pueyo, C; Gomez de Salazar, E; Alvarez-Cuesta, E

    2013-07-01

    Desensitization to antineoplastic agents is becoming a standard of care. Efforts to establish and improve these techniques are being made at many institutions. Our aims are to evaluate a new rapid desensitization protocol designed to be shorter (approximately 4 h) and safer (reducing hazardous drugs exposure risks) and to assess the oxaliplatin-specific immunoglobulin E (IgE) as a novel diagnostic tool. Prospective, observational, longitudinal study with patients who, for a 1-year period, suffered reactions to antineoplastic agents and were referred to the Desensitization Program at Ramon y Cajal University Hospital (RCUH). Patients were included or excluded as desensitization candidates after anamnesis, skin testing, risk assessment, and graded challenge. Specific IgE was determined in oxaliplatin-reactive patients. Candidate patients were desensitized using the new RCUH rapid desensitization protocol. Of 189 intravenous rapid desensitizations, 188 were successfully accomplished in the 23 patients who met inclusion criteria for desensitization (of 58 referred patients). No breakthrough reactions occurred in 94% of desensitizations, and most breakthrough reactions were mild. In 10 oxaliplatin-reactive patients, 38 desensitizations were successfully accomplished. Sensitivity for oxaliplatin-specific IgE was 38% (0.35UI/l cutoff point) and 54% (0.10UI/l cutoff point); specificity was 100% for both cutoff points. In the hands of a Desensitization Program, managed by drug desensitization experts, this new protocol has proven an effective therapeutic tool for hypersensitivity to several antineoplastic agents (oxaliplatin, carboplatin, paclitaxel, docetaxel, cyclophosphamide, and rituximab); moreover, it improves safety handling of hazardous drugs. We report the first large series of oxaliplatin desensitizations. Oxaliplatin-specific IgE determination could be helpful. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  2. A study protocol for the evaluation of occupational mutagenic/carcinogenic risks in subjects exposed to antineoplastic drugs: a multicentric project

    Directory of Open Access Journals (Sweden)

    Gelatti Umberto

    2011-03-01

    Full Text Available Abstract Background Some industrial hygiene studies have assessed occupational exposure to antineoplastic drugs; other epidemiological investigations have detected various toxicological effects in exposure groups labeled with the job title. In no research has the same population been studied both environmentally and epidemiologically. The protocol of the epidemiological study presented here uses an integrated environmental and biological monitoring approach. The aim is to assess in hospital nurses preparing and/or administering therapy to cancer patients the current level of occupational exposure to antineoplastic drugs, DNA and chromosome damage as cancer predictive effects, and the association between the two. Methods/Design About 80 healthy non-smoking female nurses, who job it is to prepare or handle antineoplastic drugs, and a reference group of about 80 healthy non-smoking female nurses not occupationally exposed to chemicals will be examined simultaneously in a cross-sectional study. All the workers will be recruited from five hospitals in northern and central Italy after their informed consent has been obtained. Evaluation of surface contamination and dermal exposure to antineoplastic drugs will be assessed by determining cyclophosphamide on selected surfaces (wipes and on the exposed nurses' clothes (pads. The concentration of unmetabolized cyclophosphamide as a biomarker of internal dose will be measured in end-shift urine samples from exposed nurses. Biomarkers of effect and susceptibility will be assessed in exposed and unexposed nurses: urinary concentration of 8-hydroxy-2-deoxyguanosine; DNA damage detected using the single-cell microgel electrophoresis (comet assay in peripheral white blood cells; micronuclei and chromosome aberrations in peripheral blood lymphocytes. Genetic polymorphisms for enzymes involved in metabolic detoxification (i.e. glutathione S-transferases will also be analysed. Using standardized questionnaires

  3. Antineoplastic Drugs

    Science.gov (United States)

    Sadée, Wolfgang; El Sayed, Yousry Mahmoud

    The limited scope of therapeutic drug-level monitoring in cancer chemotherapy results from the often complex biochemical mechanisms that contribute to antineoplastic activity and obscure the relationships among drug serum levels and therapeutic benefits. Moreover, new agents for cancer chemotherapy are being introduced at a more rapid rate than for the treatment of other diseases, although the successful application of therapeutic drug-level monitoring may require several years of intensive study of the significance of serum drug levels. However, drug level monitoring can be of considerable value during phase I clinical trials of new antineoplastic agents in order to assess drug metabolism, bioavailability, and intersubject variability; these are important parameters in the interpretation of clinical studies, but have no immediate benefit to the patient. High performance liquid chromatography (HPLC) probably represents the most versatile and easily adaptable analytical technique for drug metabolite screening (1). HPLC may therefore now be the method of choice during phase I clinical trials of antineoplastic drugs. For example, within a single week we developed an HPLC assay—using a C18 reverse-phase column, UV detection, and direct serum injection after protein precipitation—for the new radiosensitizer, misonidazole (2).

  4. Occupational rhinosinusitis due to etoposide, an antineoplastic agent

    DEFF Research Database (Denmark)

    Meyer, Harald W; Skov, Per Stahl

    2010-01-01

    This paper reports a rare case of an occupational hypersensitivity reaction to an antineoplastic agent.......This paper reports a rare case of an occupational hypersensitivity reaction to an antineoplastic agent....

  5. Antineoplastic treatment of patients with renal insufficiency

    International Nuclear Information System (INIS)

    Rajec, J.; Mego, M.; Rajec, J.

    2011-01-01

    Kidneys are the main route of elimination for many antineoplastic drugs and their metabolites. The kidney dysfunction may lead to the drug cumulation in organism with the resulting increased systemic toxicity. A lot of used cytostatics requires a dose modification at different levels of renal insufficiency. Due to the lack of data from clinical trials, the limiting of systemic toxicity is difficult especially in patients with severe renal impairment or patients undergoing chronic hemodialysis. The following article is focused on the preventive strategies dealing with recommended dosing modification of various antineoplastic agents in patients with renal insufficiency. (author)

  6. Antineoplastic drugs: Occupational exposure and health risks

    NARCIS (Netherlands)

    Fransman, W.

    2006-01-01

    Antineoplastic drugs are pharmaceuticals commonly used to treat cancer (and some non-neoplastic diseases), which are generally referred to as 'chemotherapy'. Oncology nurses are exposed to these drugs via the skin of hands during daily nursing activities, even when protective gloves are being used.

  7. Antineoplastic drugs: Occupational exposure and health risks

    OpenAIRE

    Fransman, W.

    2006-01-01

    Antineoplastic drugs are pharmaceuticals commonly used to treat cancer (and some non-neoplastic diseases), which are generally referred to as 'chemotherapy'. Oncology nurses are exposed to these drugs via the skin of hands during daily nursing activities, even when protective gloves are being used. Results of tests on bulk and surface contamination samples confirmed that patients intravenously treated with cyclophosphamide excrete the unmetabolized drug. The introduction of new guidelines and...

  8. Glycaemic adverse drug reactions from anti-neoplastics used in ...

    African Journals Online (AJOL)

    235625 records ... Glycaemic adverse drug reactions from anti-neoplastics used in treating pancreatic cancer. ... Based on the emphasized nine antineoplastic drugs with high hyperglycemic ADR incidence, we found: fluorouracil, sorafenib and pemetrexed with high ADR record of metabolism and nutrition disorders; ...

  9. Tumor targeting using liposomal antineoplastic drugs

    Directory of Open Access Journals (Sweden)

    Jörg Huwyler

    2008-03-01

    Full Text Available Jörg Huwyler1, Jürgen Drewe2, Stephan Krähenbühl21University of Applied Sciences Northwestern Switzerland, Institute of Pharma Technology, Muttenz, Switzerland; 2Department of Research and Division of Clinical Pharmacology, University Hospital Basel, Basel, SwitzerlandAbstract: During the last years, liposomes (microparticulate phospholipid vesicles have beenused with growing success as pharmaceutical carriers for antineoplastic drugs. Fields of application include lipid-based formulations to enhance the solubility of poorly soluble antitumordrugs, the use of pegylated liposomes for passive targeting of solid tumors as well as vector-conjugated liposomal carriers for active targeting of tumor tissue. Such formulation and drug targeting strategies enhance the effectiveness of anticancer chemotherapy and reduce at the same time the risk of toxic side-effects. The present article reviews the principles of different liposomal technologies and discusses current trends in this field of research.Keywords: tumor targeting, antineoplastic drugs, liposomes, pegylation, steric stabilization, immunoliposomes

  10. Exposure to antineoplastic drugs outside the hospital environment.

    Science.gov (United States)

    Meijster, T; Fransman, W; Veldhof, R; Kromhout, H

    2006-10-01

    The objectives were (i) to identify occupational populations outside hospitals working with antineoplastic drugs, (ii) to determine the size of the populations 'at risk', (iii) to identify major determinants and routes of exposure outside hospitals and (iv) to estimate exposure levels and frequencies relative to levels found in hospitals. The survey consisted of two phases; (i) identification of activities with potential exposure to antineoplastic drugs by literature review, interviews, questionnaires and workplace visits, (ii) exploratory measurements of exposure and surface contamination in selected sectors. Eight sectors were identified with potential exposure to antineoplastic drugs: pharmaceutical industry, pharmacies, universities, veterinary medicine, nursing homes, home care, laundry facilities, and waste treatment. Four sectors were of primary concern: veterinary medicine, home care, nursing homes and industrial laundries. The populations potentially exposed in these sectors vary considerably (from several tens to thousands of workers), as do their levels of exposure. Exposure measurements collected in the veterinary medicine sector showed that workers are indeed exposed to antineoplastic drugs and, in some cases (on gloves after administration), levels were 15 times higher than levels measured during administration in hospitals. Workers sorting contaminated hospital laundry in industrial laundry facilities were exposed to antineoplastic drugs through inhalation. For the home care and nursing homes sectors the highest exposure levels were found when cleaning toilets and washing treated patients. These two sectors are expected to have the largest exposed population (5,000-10,000 individuals). This study has resulted in a comprehensive overview of populations with potential exposure to antineoplastic drugs. Exposure levels can potentially be high compared with the hospital environment, because exposure routes are complex and awareness of the hazard (and

  11. Impact of Robotic Antineoplastic Preparation on Safety, Workflow, and Costs

    Science.gov (United States)

    Seger, Andrew C.; Churchill, William W.; Keohane, Carol A.; Belisle, Caryn D.; Wong, Stephanie T.; Sylvester, Katelyn W.; Chesnick, Megan A.; Burdick, Elisabeth; Wien, Matt F.; Cotugno, Michael C.; Bates, David W.; Rothschild, Jeffrey M.

    2012-01-01

    Purpose: Antineoplastic preparation presents unique safety concerns and consumes significant pharmacy staff time and costs. Robotic antineoplastic and adjuvant medication compounding may provide incremental safety and efficiency advantages compared with standard pharmacy practices. Methods: We conducted a direct observation trial in an academic medical center pharmacy to compare the effects of usual/manual antineoplastic and adjuvant drug preparation (baseline period) with robotic preparation (intervention period). The primary outcomes were serious medication errors and staff safety events with the potential for harm of patients and staff, respectively. Secondary outcomes included medication accuracy determined by gravimetric techniques, medication preparation time, and the costs of both ancillary materials used during drug preparation and personnel time. Results: Among 1,421 and 972 observed medication preparations, we found nine (0.7%) and seven (0.7%) serious medication errors (P = .8) and 73 (5.1%) and 28 (2.9%) staff safety events (P = .007) in the baseline and intervention periods, respectively. Drugs failed accuracy measurements in 12.5% (23 of 184) and 0.9% (one of 110) of preparations in the baseline and intervention periods, respectively (P < .001). Mean drug preparation time increased by 47% when using the robot (P = .009). Labor costs were similar in both study periods, although the ancillary material costs decreased by 56% in the intervention period (P < .001). Conclusion: Although robotically prepared antineoplastic and adjuvant medications did not reduce serious medication errors, both staff safety and accuracy of medication preparation were improved significantly. Future studies are necessary to address the overall cost effectiveness of these robotic implementations. PMID:23598843

  12. Mesenchymal Stromal Cells for Antineoplastic Drug Loading and Delivery.

    Science.gov (United States)

    Petrella, Francesco; Rimoldi, Isabella; Rizzo, Stefania; Spaggiari, Lorenzo

    2017-11-23

    Mesenchymal stromal cells are a population of undifferentiated multipotent adult cells possessing extensive self-renewal properties and the potential to differentiate into a variety of mesenchymal lineage cells. They express broad anti-inflammatory and immunomodulatory activity on the immune system and after transplantation can interact with the surrounding microenvironment, promoting tissue healing and regeneration. For this reason, mesenchymal stromal cells have been widely used in regenerative medicine, both in preclinical and clinical settings. Another clinical application of mesenchymal stromal cells is the targeted delivery of chemotherapeutic agents to neoplastic cells, maximizing the cytotoxic activity against cancer cells and minimizing collateral damage to non-neoplastic tissues. Mesenchymal stem cells are home to the stroma of several primary and metastatic neoplasms and hence can be used as vectors for targeted delivery of antineoplastic drugs to the tumour microenvironment, thereby reducing systemic toxicity and maximizing antitumour effects. Paclitaxel and gemcitabine are the chemotherapeutic drugs best loaded by mesenchymal stromal cells and delivered to neoplastic cells, whereas other agents, like pemetrexed, are not internalized by mesenchymal stromal cells and therefore are not suitable for advanced antineoplastic therapy. This review focuses on the state of the art of advanced antineoplastic cell therapy and its future perspectives, emphasizing in vitro and in vivo preclinical results and future clinical applications.

  13. Body Composition and Anti-Neoplastic Treatment in Adult and Older Subjects - A Systematic Review.

    Science.gov (United States)

    Gérard, S; Bréchemier, D; Lefort, A; Lozano, S; Abellan Van Kan, G; Filleron, T; Mourey, L; Bernard-Marty, C; Rougé-Bugat, M E; Soler, V; Vellas, B; Cesari, M; Rolland, Y; Balardy, L

    2016-01-01

    The estimation of the risk of poor tolerance and overdose of antineoplastic agents protocols represents a major challenge in oncology, particularly in older patients. We hypothesize that age-related modifications of body composition (i.e. increased fat mass and decreased lean mass) may significantly affect tolerance to chemotherapy. We conducted a systematic review for the last 25 years (between 1990 and 2015), using US National library of Medicine Medline electronic bibliographic database and Embase database of cohorts or clinical trials exploring (i) the interactions of body composition (assessed by Dual X-ray Absorptiometry, Bioelectrical Impedance Analyses, or Computerized Tomography) with pharmacokinetics parameters, (ii) the tolerance to chemotherapy, and (iii) the consequences of chemotherapies or targeted therapies on body composition. Our search identified 1504 articles. After a selection (using pre-established criteria) on titles and abstract, 24 original articles were selected with 3 domains of interest: impact of body composition on pharmacokinetics (7 articles), relationship between body composition and chemotoxicity (14 articles), and effect of anti-cancer chemotherapy on body composition (11 articles). The selected studies suggested that pharmacokinetic was influenced by lean mass, that lower lean mass could be correlated with toxicity, and that sarcopenic patients experienced more toxicities that non-sarcopenic patients. Regarding fat mass, results were less conclusive. No studies specifically explored the topic of body composition in older cancer patients. Plausible pathophysiological pathways linking body composition, toxicity, and pharmacokinetics are sustained by the actual review. However, despite the growing number of older cancer patients, our review highlighted the lack of specific studies in the field of anti-neoplastic agents toxicity regarding body composition conducted in elderly.

  14. Prophylaxis and management of antineoplastic drug induced nausea and vomiting in children with cancer

    Directory of Open Access Journals (Sweden)

    Sidharth Totadri

    2016-10-01

    Full Text Available Antineoplastic drug induced nausea and vomiting (AINV is a major adverse event which deeply impacts the quality of life of children with cancer. It additionally causes distress to parents and negatively impacts compliance to therapy. A robust AINV prophylaxis regimen is essential to achieve complete control; and prevent anticipatory, breakthrough and refractory AINV. With a wide array of available anti-emetics, standard guidelines for their use are crucial to ensure uniform and optimum prophylaxis. Chemotherapeutic agents are classified as having high, moderate, low or minimal emetic risk based on their potential to cause emesis in the absence of prophylaxis. Three drug regimen with aprepitant, ondansetron/granisetron and dexamethasone is recommended for protocols with high emetic risk. Although approved in children ≥12 years, there is mounting evidence for the use of aprepitant in younger children too. In protocols with moderate and low emetic risk, combination of ondansetron/granisetron and dexamethasone; and single agent ondansetron/granisetron are recommended, respectively. Metoclopramide is an alternative when steroids are contraindicated. Olanzapine and lorazepam are useful drugs for breakthrough AINV and anticipatory AINV. Knowledge of pediatric dosage, salient adverse events, drug interactions as well as cost of drugs is essential to prescribe anti-emetics accurately and safely in resource constrained settings. Non pharmacological interventions such as hypnosis, acupressure and psychological interventions can benefit a sub-group of patients without significant risk of adverse events.

  15. Investigation of antineoplastic activity of chewing tablets based on dry oat extract and quercetin

    Directory of Open Access Journals (Sweden)

    Ярослав Ростиславович Андрійчук

    2015-07-01

    Full Text Available One of the main goals of domestic pharmaceutical science is development of new medicines. Thus, new tablet drug was created based on dry oat extract and quercetin. Investigation of antineoplastic activity was performed. Antineoplastic activity of investigational drug based on dry oat extract and quercetin was experimentally proved.

  16. 77 FR 38297 - Revised Document Posted: NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare...

    Science.gov (United States)

    2012-06-27

    ... removed 15 drugs from the 2012 list because they did not meet the NIOSH definition, were no longer... NIOSH-033-A] Revised Document Posted: NIOSH List of Antineoplastic and Other Hazardous Drugs in... of the following document entitled ``NIOSH List of Antineoplastic and Other Hazardous Drugs in...

  17. 75 FR 57044 - NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2010

    Science.gov (United States)

    2010-09-17

    ... identified 24 drugs that fit the NIOSH definition of hazardous drugs. The second draft list also proposed... Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2010 AGENCY: National Institute for Occupational... publication of the following document entitled ``NIOSH List of Antineoplastic and Other Hazardous Drugs in...

  18. Effectiveness of oxaliplatin desensitization protocols.

    Science.gov (United States)

    Cortijo-Cascajares, Susana; Nacle-López, Inmaculada; García-Escobar, Ignacio; Aguilella-Vizcaíno, María José; Herreros-de-Tejada, Alberto; Cortés-Funes Castro, Hernán; Calleja-Hernández, Miguel-Ángel

    2013-03-01

    Hypersensitivity reaction (HSR) to antineoplastic drugs can force doctors to stop treatment and seek other alternatives. These alternatives may be less effective, not as well tolerated and/or more expensive. Another option is to use desensitization protocols that induce a temporary state of tolerance by gradually administering small quantities of the antineoplastic drug until the therapeutic dosage is reached. The aim of this study is to assess the effectiveness of oxaliplatin desensitization protocols. A retrospective observational study was carried out between January 2006 and May 2011. The inclusion criteria were patients undergoing chemotherapy treatment with oxaliplatin who had developed an HSR to the drug and who were candidates for continuing the treatment using a desensitization protocol. The patients' clinical records were reviewed and variables were gathered relating to the patient, the treatment, the HSR, and the desensitization protocol administered. The data were analysed using version 18.0 of the statistics program SPSS. A total of 53 desensitization protocols were administered to 21 patients. In 89 % of these cases, no new reactions occurred while the drug was being administered. New reactions of mild severity only occurred in 11 % of cases, and none of these reactions were severe enough for treatment to be stopped. All patients were able to complete the desensitization protocol. This study confirms that oxaliplatin desensitization protocols are safe and effective and allow patients to continue with the treatment that initially caused an HSR.

  19. Examining factors that influence the effectiveness of cleaning antineoplastic drugs from drug preparation surfaces: a pilot study.

    Science.gov (United States)

    Hon, Chun-Yip; Chua, Prescillia Ps; Danyluk, Quinn; Astrakianakis, George

    2014-06-01

    Occupational exposure to antineoplastic drugs has been documented to result in various adverse health effects. Despite the implementation of control measures to minimize exposure, detectable levels of drug residual are still found on hospital work surfaces. Cleaning these surfaces is considered as one means to minimize the exposure potential. However, there are no consistent guiding principles related to cleaning of contaminated surfaces resulting in hospitals to adopt varying practices. As such, this pilot study sought to evaluate current cleaning protocols and identify those factors that were most effective in reducing contamination on drug preparation surfaces. Three cleaning variables were examined: (1) type of cleaning agent (CaviCide®, Phenokil II™, bleach and chlorhexidine), (2) application method of cleaning agent (directly onto surface or indirectly onto a wipe) and (3) use of isopropyl alcohol after cleaning agent application. Known concentrations of antineoplastic drugs (either methotrexate or cyclophosphamide) were placed on a stainless steel swatch and then, systematically, each of the three cleaning variables was tested. Surface wipes were collected and quantified using high-performance liquid chromatography-tandem mass spectrometry to determine the percent residual of drug remaining (with 100% being complete elimination of the drug). No one single cleaning agent proved to be effective in completely eliminating all drug contamination. The method of application had minimal effect on the amount of drug residual. In general, application of isopropyl alcohol after the use of cleaning agent further reduced the level of drug contamination although measureable levels of drug were still found in some cases.

  20. Spatially explicit prioritization of human antibiotics and antineoplastics in Europe.

    Science.gov (United States)

    Oldenkamp, Rik; Huijbregts, Mark A J; Hollander, Anne; Versporten, Ann; Goossens, Herman; Ragas, Ad M J

    2013-01-01

    This paper presents a screening tool for the location-specific prioritization of human pharmaceutical emissions in Europe, based on risk quotients for the aquatic environment and human health. The tool provides direction towards either monitoring activities or additional research. Its application is illustrated for a set of 11 human antibiotics and 7 antineoplastics. Risk quotients for the aquatic environment were highest for levofloxacin, doxycycline and ciprofloxacin, located in Northern Italy (Milan region; particularly levofloxacin) and other densely populated areas in Europe (e.g. London, Krakow and the Ruhr area). Risk quotients for human health not only depend on pharmaceutical and location, but also on behavioral characteristics, such as consumption patterns. Infants in eastern Spain that consume locally produced food and conventionally treated drinking water were predicted to run the highest risks. A limited comparison with measured concentrations in surface water showed that predicted and measured concentrations are approximately within one order of magnitude. Copyright © 2012 Elsevier Ltd. All rights reserved.

  1. Molecular biomonitoring of a population of nurses handling antineoplastic drugs

    Energy Technology Data Exchange (ETDEWEB)

    Cornetta, Tommaso [Department of Biology, ' Roma Tre' University, Viale Guglielmo Marconi, 446-00146 Rome (Italy); ' Don Carlo Gnocchi' Foundation, Rome (Italy); Padua, Luca [' Don Carlo Gnocchi' Foundation, Rome (Italy); Department of Neuroscience, Neurology Institute, Catholic University, Rome (Italy); Testa, Antonella; Ievoli, Elena [Toxicology and Biomedical Sciences Section, ENEA Research Center, Casaccia (Rome) (Italy); Festa, Fabiola [Department of Biology, ' Roma Tre' University, Viale Guglielmo Marconi, 446-00146 Rome (Italy); Tranfo, Giovanna [Department of Occupational Hygiene, Italian Institute for Occupational Prevention and Safety, Monteporzio Catone (Rome) (Italy); Baccelliere, Luigi [S. Martino Hospital, Genova (Italy); Cozzi, Renata [Department of Biology, ' Roma Tre' University, Viale Guglielmo Marconi, 446-00146 Rome (Italy)], E-mail: cozzi@bio.uniroma3.it

    2008-02-01

    Many antineoplastic drugs have been found to have carcinogenic, mutagenic and teratogenic activity and so hospital personnel handling these substances are potentially exposed to health risk. Understanding this risk derived from protracted occupational exposure has great relevance even if the workers normally adopt individual and environmental protective measures. To address this question we have studied the presence of DNA and chromosome damage in a population of nurses employed in Italian oncology units and in matched controls. We used the comet assay to evidence the presence of DNA strand breaks, due to both acute and chronic exposure, and the micronucleus (MN) test, which is a measure of clastogenic and aneugenic events. Furthermore, since the individual response to the exogenous insults may be genetically determined, we studied the possible influence of single nucleotide polymorphism in XRCC1 and XRCC3 DNA repair genes on induced genetic damage. We also considered the effects of confounding factors like smoking, age and gender. The results indicated that the exposed subjects had significantly high levels of genetic damage. Age and gender were associated with increased values in MN, both in control and in exposed groups; the smoking habit affects MN frequency in controls, but not in workers. Furthermore we found that exposed subjects bearing at least one XRCC1 variant allele (399Gln) show higher values of MN. The present data provide the evidence to show that occupational exposure to antineoplastic drugs, even if in safety controlled conditions, represents a serious health risk. Furthermore we have shown that the presence of XRCC1 genetic polymorphism could contribute to increase the genetic damage in susceptible individuals who are occupationally exposed to dangerous substances.

  2. Molecular biomonitoring of a population of nurses handling antineoplastic drugs

    International Nuclear Information System (INIS)

    Cornetta, Tommaso; Padua, Luca; Testa, Antonella; Ievoli, Elena; Festa, Fabiola; Tranfo, Giovanna; Baccelliere, Luigi; Cozzi, Renata

    2008-01-01

    Many antineoplastic drugs have been found to have carcinogenic, mutagenic and teratogenic activity and so hospital personnel handling these substances are potentially exposed to health risk. Understanding this risk derived from protracted occupational exposure has great relevance even if the workers normally adopt individual and environmental protective measures. To address this question we have studied the presence of DNA and chromosome damage in a population of nurses employed in Italian oncology units and in matched controls. We used the comet assay to evidence the presence of DNA strand breaks, due to both acute and chronic exposure, and the micronucleus (MN) test, which is a measure of clastogenic and aneugenic events. Furthermore, since the individual response to the exogenous insults may be genetically determined, we studied the possible influence of single nucleotide polymorphism in XRCC1 and XRCC3 DNA repair genes on induced genetic damage. We also considered the effects of confounding factors like smoking, age and gender. The results indicated that the exposed subjects had significantly high levels of genetic damage. Age and gender were associated with increased values in MN, both in control and in exposed groups; the smoking habit affects MN frequency in controls, but not in workers. Furthermore we found that exposed subjects bearing at least one XRCC1 variant allele (399Gln) show higher values of MN. The present data provide the evidence to show that occupational exposure to antineoplastic drugs, even if in safety controlled conditions, represents a serious health risk. Furthermore we have shown that the presence of XRCC1 genetic polymorphism could contribute to increase the genetic damage in susceptible individuals who are occupationally exposed to dangerous substances

  3. Stereocomplex micelle from nonlinear enantiomeric copolymers efficiently transports antineoplastic drug

    Science.gov (United States)

    Wang, Jixue; Shen, Kexin; Xu, Weiguo; Ding, Jianxun; Wang, Xiaoqing; Liu, Tongjun; Wang, Chunxi; Chen, Xuesi

    2015-05-01

    Nanoscale polymeric micelles have attracted more and more attention as a promising nanocarrier for controlled delivery of antineoplastic drugs. Herein, the doxorubicin (DOX)-loaded poly(D-lactide)-based micelle (PDM/DOX), poly(L-lactide)-based micelle (PLM/DOX), and stereocomplex micelle (SCM/DOX) from the equimolar mixture of the enantiomeric four-armed poly(ethylene glycol)-polylactide (PEG-PLA) copolymers were successfully fabricated. In phosphate-buffered saline (PBS) at pH 7.4, SCM/DOX exhibited the smallest hydrodynamic diameter ( D h) of 90 ± 4.2 nm and the slowest DOX release compared with PDM/DOX and PLM/DOX. Moreover, PDM/DOX, PLM/DOX, and SCM/DOX exhibited almost stable D hs of around 115, 105, and 90 nm at above normal physiological condition, respectively, which endowed them with great potential in controlled drug delivery. The intracellular DOX fluorescence intensity after the incubation with the laden micelles was different degrees weaker than that incubated with free DOX · HCl within 12 h, probably due to the slow DOX release from micelles. As the incubation time reached to 24 h, all the cells incubated with the laden micelles, especially SCM/DOX, demonstrated a stronger intracellular DOX fluorescence intensity than free DOX · HCl-cultured ones. More importantly, all the DOX-loaded micelles, especially SCM/DOX, exhibited potent antineoplastic efficacy in vitro, excellent serum albumin-tolerance stability, and satisfactory hemocompatibility. These encouraging data indicated that the loading micelles from nonlinear enantiomeric copolymers, especially SCM/DOX, might be promising in clinical systemic chemotherapy through intravenous injection.

  4. Delving into cornerstones of hypersensitivity to antineoplastic and biological agents: value of diagnostic tools prior to desensitization.

    Science.gov (United States)

    Alvarez-Cuesta, E; Madrigal-Burgaleta, R; Angel-Pereira, D; Ureña-Tavera, A; Zamora-Verduga, M; Lopez-Gonzalez, P; Berges-Gimeno, M P

    2015-07-01

    Evidence regarding drug provocation test (DPT) with antineoplastic and biological agents is scarce. Our aim was to assess the usefulness of including DPT as a paramount gold standard diagnostic tool (prior to desensitization). Prospective, observational, longitudinal study with patients who, during a 3-year period, were referred to the Desensitization Program at Ramon y Cajal University Hospital. Patients underwent a structured diagnostic protocol by means of anamnesis, skin tests (ST), risk assessment, and DPT. Oxaliplatin-specific IgE was determined in oxaliplatin-reactive patients (who underwent DPT regardless of oxaliplatin-specific IgE results). Univariate analysis and multivariate analysis were used to identify predictors of the final diagnosis among several variables. A total of 186 patients were assessed. A total of 104 (56%) patients underwent DPT. Sixty-four percent of all DPTs were negative (i.e., hypersensitivity was excluded). Sensitivity for oxaliplatin-specific IgE (0.35 UI/l cutoff point) was 34%, specificity 90.3%, negative predictive value 45.9%, positive predictive value 85%, negative likelihood ratio 0.7, and positive likelihood ratio 3.5. These are the first reported data based on more than 100 DPTs with antineoplastic and biological agents (paclitaxel, oxaliplatin, rituximab, infliximab, irinotecan, and other drugs). Implementation of DPT in diagnostic protocols helps exclude hypersensitivity (in 36% of all referred patients), and avoids unnecessary desensitizations in nonhypersensitive patients (30-56% of patients, depending on culprit-drug). Drug provocation test is vital to validate diagnostic tools; consequently, quality data are shown on oxaliplatin-specific IgE and oxaliplatin-ST in the largest series of oxaliplatin-reactive patients reported to date (74 oxaliplatin-reactive patients). Identifying phenotypes and predictors of a diagnosis of hypersensitivity may be helpful for tailored plans. © 2015 John Wiley & Sons A/S. Published by

  5. Evidence for tankyrases as antineoplastic targets in lung cancer

    International Nuclear Information System (INIS)

    Busch, Alexander M; Johnson, Kevin C; Stan, Radu V; Sanglikar, Aarti; Ahmed, Yashi; Dmitrovsky, Ethan; Freemantle, Sarah J

    2013-01-01

    New pharmacologic targets are urgently needed to treat or prevent lung cancer, the most common cause of cancer death for men and women. This study identified one such target. This is the canonical Wnt signaling pathway, which is deregulated in cancers, including those lacking adenomatous polyposis coli or β-catenin mutations. Two poly-ADP-ribose polymerase (PARP) enzymes regulate canonical Wnt activity: tankyrase (TNKS) 1 and TNKS2. These enzymes poly-ADP-ribosylate (PARsylate) and destabilize axin, a key component of the β-catenin phosphorylation complex. This study used comprehensive gene profiles to uncover deregulation of the Wnt pathway in murine transgenic and human lung cancers, relative to normal lung. Antineoplastic consequences of genetic and pharmacologic targeting of TNKS in murine and human lung cancer cell lines were explored, and validated in vivo in mice by implantation of murine transgenic lung cancer cells engineered with reduced TNKS expression relative to controls. Microarray analyses comparing Wnt pathway members in malignant versus normal tissues of a murine transgenic cyclin E lung cancer model revealed deregulation of Wnt pathway components, including TNKS1 and TNKS2. Real-time PCR assays independently confirmed these results in paired normal-malignant murine and human lung tissues. Individual treatments of a panel of human and murine lung cancer cell lines with the TNKS inhibitors XAV939 and IWR-1 dose-dependently repressed cell growth and increased cellular axin 1 and tankyrase levels. These inhibitors also repressed expression of a Wnt-responsive luciferase construct, implicating the Wnt pathway in conferring these antineoplastic effects. Individual or combined knockdown of TNKS1 and TNKS2 with siRNAs or shRNAs reduced lung cancer cell growth, stabilized axin, and repressed tumor formation in murine xenograft and syngeneic lung cancer models. Findings reported here uncovered deregulation of specific components of the Wnt pathway in both

  6. Antineoplastic Effect of Decoy Oligonucleotide Derived from MGMT Enhancer

    Science.gov (United States)

    Refael, Miri; Zrihan, Daniel; Siegal, Tali; Lavon, Iris

    2014-01-01

    Silencing of O(6)-methylguanine-DNA-methyltransferase (MGMT) in tumors, mainly through promoter methylation, correlates with a better therapeutic response and with increased survival. Therefore, it is conceivable to consider MGMT as a potential therapeutic target for the treatment of cancers. Our previous results demonstrated the pivotal role of NF-kappaB in MGMT expression, mediated mainly through p65/NF-kappaB homodimers. Here we show that the non-canonical NF-KappaB motif (MGMT-kappaB1) within MGMT enhancer is probably the major inducer of MGMT expression following NF-kappaB activation. Thus, in an attempt to attenuate the transcription activity of MGMT in tumors we designed locked nucleic acids (LNA) modified decoy oligonucleotides corresponding to the specific sequence of MGMT-kappaB1 (MGMT-kB1-LODN). Following confirmation of the ability of MGMT-kB1-LODN to interfere with the binding of p65/NF-kappaB to the NF-KappaB motif within MGMT enhancer, the efficacy of the decoy was studied in-vitro and in-vivo. The results of these experiments show that the decoy MGMT-kB1-LODN have a substantial antineoplastic effect when used either in combination with temozolomide or as monotherapy. Our results suggest that MGMT-kB1-LODN may provide a novel strategy for cancer therapy. PMID:25460932

  7. Antineoplastic effect of decoy oligonucleotide derived from MGMT enhancer.

    Directory of Open Access Journals (Sweden)

    Tamar Canello

    Full Text Available Silencing of O(6-methylguanine-DNA-methyltransferase (MGMT in tumors, mainly through promoter methylation, correlates with a better therapeutic response and with increased survival. Therefore, it is conceivable to consider MGMT as a potential therapeutic target for the treatment of cancers. Our previous results demonstrated the pivotal role of NF-kappaB in MGMT expression, mediated mainly through p65/NF-kappaB homodimers. Here we show that the non-canonical NF-KappaB motif (MGMT-kappaB1 within MGMT enhancer is probably the major inducer of MGMT expression following NF-kappaB activation. Thus, in an attempt to attenuate the transcription activity of MGMT in tumors we designed locked nucleic acids (LNA modified decoy oligonucleotides corresponding to the specific sequence of MGMT-kappaB1 (MGMT-kB1-LODN. Following confirmation of the ability of MGMT-kB1-LODN to interfere with the binding of p65/NF-kappaB to the NF-KappaB motif within MGMT enhancer, the efficacy of the decoy was studied in-vitro and in-vivo. The results of these experiments show that the decoy MGMT-kB1-LODN have a substantial antineoplastic effect when used either in combination with temozolomide or as monotherapy. Our results suggest that MGMT-kB1-LODN may provide a novel strategy for cancer therapy.

  8. A Novel Insight into the Cardiotoxicity of Antineoplastic Drug Doxorubicin

    Directory of Open Access Journals (Sweden)

    Zbynek Heger

    2013-10-01

    Full Text Available Doxorubicin is a commonly used antineoplastic agent in the treatment of many types of cancer. Little is known about the interactions of doxorubicin with cardiac biomolecules. Serious cardiotoxicity including dilated cardiomyopathy often resulting in a fatal congestive heart failure may occur as a consequence of chemotherapy with doxorubicin. The purpose of this study was to determine the effect of exposure to doxorubicin on the changes in major amino acids in tissue of cardiac muscle (proline, taurine, glutamic acid, arginine, aspartic acid, leucine, glycine, valine, alanine, isoleucine, threonine, lysine and serine. An in vitro interaction study was performed as a comparison of amino acid profiles in heart tissue before and after application of doxorubicin. We found that doxorubicin directly influences myocardial amino acid representation even at low concentrations. In addition, we performed an interaction study that resulted in the determination of breaking points for each of analyzed amino acids. Lysine, arginine, β-alanine, valine and serine were determined as the most sensitive amino acids. Additionally we compared amino acid profiles of myocardium before and after exposure to doxorubicin. The amount of amino acids after interaction with doxorubicin was significantly reduced (p = 0.05. This fact points at an ability of doxorubicin to induce changes in quantitative composition of amino acids in myocardium. Moreover, this confirms that the interactions between doxorubicin and amino acids may act as another factor most likely responsible for adverse effects of doxorubicin on myocardium.

  9. Dental anomalies in children submitted to antineoplastic therapy.

    Science.gov (United States)

    Carrillo, Camila Merida; Corrêa, Fernanda Nahás Pires; Lopes, Nilza Nelly Fontana; Fava, Marcelo; Odone Filho, Vicente

    2014-06-01

    Cancer is the third most frequent cause of death in children in Brazil. Early diagnosis and medical advances have significantly improved treatment outcomes, which has resulted in higher survival rates and the management of late side effects has become increasingly important in caring for these patients. Dental abnormalities are commonly observed as late effects of antineoplastic therapy in the oral cavity. The incidence and severity of the dental abnormalities depend on the child's age at diagnosis and the type of chemotherapeutic agent used, as well as the irradiation dose and area. The treatment duration and aggressivity should also be considered. Disturbances in dental development are characterized by changes in shape, number and root development. Enamel anomalies, such as discoloration, opacities and hypoplasia are also observed in these patients. When severe, these abnormalities can cause functional and esthetic sequelae that have an impact on the children's and adolescents' quality of life. General dentists and pediatric dentists should understand these dental abnormalities and how to identify them aiming for early diagnosis and appropriate treatment.

  10. Dental anomalies in children submitted to antineoplastic therapy

    Directory of Open Access Journals (Sweden)

    Camila Merida Carrillo

    2014-06-01

    Full Text Available Cancer is the third most frequent cause of death in children in Brazil. Early diagnosis and medical advances have significantly improved treatment outcomes, which has resulted in higher survival rates and the management of late side effects has become increasingly important in caring for these patients. Dental abnormalities are commonly observed as late effects of antineoplastic therapy in the oral cavity. The incidence and severity of the dental abnormalities depend on the child's age at diagnosis and the type of chemotherapeutic agent used, as well as the irradiation dose and area. The treatment duration and aggressivity should also be considered. Disturbances in dental development are characterized by changes in shape, number and root development. Enamel anomalies, such as discoloration, opacities and hypoplasia are also observed in these patients. When severe, these abnormalities can cause functional and esthetic sequelae that have an impact on the children's and adolescents' quality of life. General dentists and pediatric dentists should understand these dental abnormalities and how to identify them aiming for early diagnosis and appropriate treatment.

  11. Injectable-antineoplastic-drug practices in Michigan hospitals.

    Science.gov (United States)

    Cohen, I A; Newland, S J; Kirking, D M

    1987-05-01

    Practices related to parenteral (injectable) antineoplastic drugs (PADs) in Michigan hospitals were surveyed. All hospitals in Michigan were surveyed to assess compliance with American Society of Hospital Pharmacists (ASHP) and Occupational Safety and Health Administration (OSHA) recommendations related to PADs. Other PAD-related practice issues not covered within those guidelines were also studied. Surveys were mailed to the pharmacy directors of the state's 192 acute-care hospitals. Included were questions concerning policies and procedures for ordering, storing, preparing, handling, labeling, transporting, administering, and disposing of PADs. Questions concerning staff education, spill cleanup, and personnel issues were also included. A total of 169 questionnaires were returned, yielding a response rate of 88%. Of those respondents, 132 indicated that they prepare PAD doses for inpatients. Adherence rates were high for several of the PAD-preparation recommendations, including handwashing (97%) and gloving (98.5%). Rates for gowning (71.2%), labeling of PAD doses as biohazards (chemical hazards) (73.5%), and use of Class II biological-safety cabinets (71.2%) were less favorable. Practice areas with relatively poor adherence rates included use of plastic-backed absorbent pads under PAD preparation areas (53.8%), storing PADs separately from other drugs (48.5%), informing prospective employees of potential risks of handling PADs (36.4%), availability of spill kits (36.4%), and attaching and priming i.v. tubing before adding PADs to i.v. containers (5.4%). Many pharmacy departments in Michigan hospitals can substantially improve their adherence to ASHP and OSHA recommendations related to PADs.

  12. [Blending powdered antineoplastic medicine in disposable ointment container].

    Science.gov (United States)

    Miyazaki, Yasunori; Uchino, Tomonobu; Kagawa, Yoshiyuki

    2014-01-01

    On dispensing powdered antineoplastic medicines, it is important to prevent cross-contamination and environmental exposure. Recently, we developed a method for blending powdered medicine in a disposable ointment container using a planetary centrifugal mixer. The disposable container prevents cross-contamination. In addition, environmental exposure associated with washing the apparatus does not arise because no blending blade is used. In this study, we aimed to confirm the uniformity of the mixture and weight loss of medicine in the blending procedure. We blended colored lactose powder with Leukerin(®) or Mablin(®) powders using the new method and the ordinary pestle and mortar method. Then, the blending state was monitored using image analysis. Blending variables, such as the blending ratio (1:9-9:1), container size (35-125 mL), and charging rate (20-50%) in the container were also investigated under the operational conditions of 500 rpm and 50 s. At a 20% charging rate in a 35 mL container, the blending precision of the mixtures was not influenced by the blending ratio, and was less than 6.08%, indicating homogeneity. With an increase in the charging rate, however, the blending precision decreased. The possible amount of both mixtures rose to about 17 g with a 20% charging rate in a 125 mL container. Furthermore, weight loss of medicines with this method was smaller than that with the pestle and mortar method, suggesting that this method is safer for pharmacists. In conclusion, we have established a precise and safe method for blending powdered medicines in pharmacies.

  13. Multicenter evaluation of a new closed system drug-transfer device in reducing surface contamination by antineoplastic hazardous drugs.

    Science.gov (United States)

    Bartel, Sylvia B; Tyler, Timothy G; Power, Luci A

    2018-02-15

    Results of a study to evaluate the effectiveness of a recently introduced closed system drug-transfer device (CSTD) in reducing surface contamination during compounding and simulated administration of antineoplastic hazardous drugs (AHDs) are reported. Wipe samples were collected from 6 predetermined surfaces in compounding and infusion areas of 13 U.S. cancer centers to establish preexisting levels of surface contamination by 2 marker AHDs (cyclophosphamide and fluorouracil). Stainless steel templates were placed over the 6 previously sampled surfaces, and the marker drugs were compounded and infused per a specific protocol using all components of the CSTD. Wipe samples were collected from the templates after completion of tasks and analyzed for both marker AHDs. Aggregated results of wipe sampling to detect preexisting contamination at the 13 study sites showed that overall, 66.7% of samples (104 of 156) had detectable levels of at least 1 marker AHD; subsequent testing after CSTD use per protocol found a sample contamination rate of 5.8% (9 of 156 samples). In the administration areas alone, the rate of preexisting contamination was 78% (61 of 78 samples); with use of the CSTD protocol, the contamination rate was 2.6%. Twenty-six participants rated the CSTD for ease of use, with 100% indicating that they were satisfied or extremely satisfied. A study involving a rigorous protocol and 13 cancer centers across the United States demonstrated that the CSTD reduced surface contamination by cyclophosphamide and fluorouracil during compounding and simulated administration. Participants reported that the CSTD was easy to use. Copyright © 2018 by the American Society of Health-System Pharmacists, Inc. All rights reserved.

  14. Association between occupational exposure levels of antineoplastic drugs and work environment in five hospitals in Japan.

    Science.gov (United States)

    Yoshida, Jin; Koda, Shigeki; Nishida, Shozo; Yoshida, Toshiaki; Miyajima, Keiko; Kumagai, Shinji

    2011-03-01

    The aim of the present study was to evaluate the measurement of contamination by antineoplastic drugs for safer handling of such drugs by medical workers. We investigated the relationship between the contamination level of antineoplastic drugs and the conditions of their handling. Air samples and wipe samples were collected from equipment in the preparation rooms of five hospitals (hospitals A-E). These samples were subjected to measurement of the amounts of cyclophosphamide (CPA), fluorouracil (5FU), gemcitabine (GEM), and platinum-containing drugs (Pt). Twenty-four-hour urine samples were collected from the pharmacists who handled or audited, the antineoplastic drugs were analyzed for CPA and Pt. Pt was detected from air samples inside BSC in hospital B. Antineoplastic drugs were detected from wipe samples of the BSC in hospitals A, B, D, and E and of other equipment in the preparation rooms in hospitals A, B, C, and D. Cyclophosphamide and 5FU were detected from wipe samples of the air-conditioner filter in hospital A, and CPA was detected from that in hospital D. Cyclophosphamide was detected from urine samples of workers in hospitals B, D, and E. The contamination level of antineoplastic drugs was suggested to be related with the amount of drugs handled, cleaning methods of the equipment, and the skill level of the technique of maintaining negative pressure inside a vial. In order to reduce the contamination and exposure to antineoplastic drugs in the hospital work environment very close to zero, comprehensive safety precautions, including adequate mixing and cleaning methods was required in addition to BSC and closed system device.

  15. Flavonoids from Heliotropium subulatum exudate and their evaluation for antioxidant, antineoplastic and cytotoxic activities II.

    Science.gov (United States)

    Singh, Bharat; Sahu, Pooran M; Sharma, Ram A

    2017-02-01

    The flavonoids are the largest group of phenolic compounds isolated from a wide range of higher plants. These compounds work as antimicrobials, anti-insect agents and protect plants from other types of biotic and abiotic stresses. Various researchers have suggested that flavonoids possessed antioxidant, antineoplastic and cytotoxic activities. The main objective of this study was to test dichloromethane fraction of resinous exudate of Heliotropium subulatum for their antioxidant, antineoplastic and cytotoxic activities, as well as to search new antioxidant and antineoplastic agents for pharmaceutical formulations. Five flavonoids were isolated from resinous exudate of this plant species and screened for their in vitro and in vivo antioxidant models (DPPH radical scavenging, reducing power, superoxide anion scavenging, metal chelating scavenging systems, catalase and lipid peroxidation), antineoplastic (Sarcoma 180), and cytotoxic (Chinese hamster V79 cells) activities. Tricetin demonstrated maximum antioxidant activity against both in vitro and in vivo experimental systems while galangin exhibited maximum inhibition (78.35%) at a dose of 10 µg/kg/day against Sarcoma 180. Similarly, it was found that galangin also showed highest activity (21.1 ± 0.15%) at a concentration of 70 µg/ml to Chinese hamster V79 cells. The observed results suggest that tricetin has a potential to scavenge free radicals in both in vitro and in vivo models while the galangin could be considered as antitumor and cytotoxic agent.

  16. Infiltrative Lung Diseases: Complications of Novel Antineoplastic Agents in Patients with Hematological Malignancies

    Directory of Open Access Journals (Sweden)

    Bobbak Vahid

    2008-01-01

    Full Text Available Infiltrative lung disease is a well-known complication of antineoplastic agents in patients with hematological malignancies. Novel agents are constantly being added to available treatments. The present review discusses different pulmonary syndromes, pathogenesis and management of these novel agents.

  17. 77 FR 41190 - Revised Document Posted: NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare...

    Science.gov (United States)

    2012-07-12

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention [Docket Number NIOSH-190] Revised Document Posted: NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2012, Correction AGENCY: National Institute for Occupational Safety and Health (NIOSH) of the...

  18. Comet assay as a human biomonitoring tool: application in occupational exposure to antineoplastic drugs

    Directory of Open Access Journals (Sweden)

    Carina Ladeira

    2015-05-01

    Occupational exposure to antineoplastic drugs is associated with genotoxic effects, although comet assay analyzed parameters were higher in exposed comparing with controls, were not significant. Also the study of the susceptibility biomarkers did not show statistical significant differences, the small size of our sample hampered the finding of a possible association, let alone a causality relationship.

  19. Does applying technology throughout the medication use process improve patient safety with antineoplastics?

    Science.gov (United States)

    Bubalo, Joseph; Warden, Bruce A; Wiegel, Joshua J; Nishida, Tess; Handel, Evelyn; Svoboda, Leanne M; Nguyen, Lam; Edillo, P Neil

    2014-12-01

    Medical errors, in particular medication errors, continue to be a troublesome factor in the delivery of safe and effective patient care. Antineoplastic agents represent a group of medications highly susceptible to medication errors due to their complex regimens and narrow therapeutic indices. As the majority of these medication errors are frequently associated with breakdowns in poorly defined systems, developing technologies and evolving workflows seem to be a logical approach to provide added safeguards against medication errors. This article will review both the pros and cons of today's technologies and their ability to simplify the medication use process, reduce medication errors, improve documentation, improve healthcare costs and increase provider efficiency as relates to the use of antineoplastic therapy throughout the medication use process. Several technologies, mainly computerized provider order entry (CPOE), barcode medication administration (BCMA), smart pumps, electronic medication administration record (eMAR), and telepharmacy, have been well described and proven to reduce medication errors, improve adherence to quality metrics, and/or improve healthcare costs in a broad scope of patients. The utilization of these technologies during antineoplastic therapy is weak at best and lacking for most. Specific to the antineoplastic medication use system, the only technology with data to adequately support a claim of reduced medication errors is CPOE. In addition to the benefits these technologies can provide, it is also important to recognize their potential to induce new types of errors and inefficiencies which can negatively impact patient care. The utilization of technology reduces but does not eliminate the potential for error. The evidence base to support technology in preventing medication errors is limited in general but even more deficient in the realm of antineoplastic therapy. Though CPOE has the best evidence to support its use in the

  20. Reproductive Health Risks Associated with Occupational Exposures to Antineoplastic Drugs in Health Care Settings: A Review of the Evidence

    Science.gov (United States)

    Connor, Thomas H.; Lawson, Christina C.; Polovich, Martha; McDiarmid, Melissa A.

    2015-01-01

    Objectives Antineoplastic drugs are known reproductive and developmental toxicants. Our objective was to review the existing literature of reproductive health risks to workers who handle antineoplastic drugs. Methods A structured literature review of 18 peer-reviewed, English language publications of occupational exposure and reproductive outcomes was performed. Results While effect sizes varied with study size and population, occupational exposure to antineoplastic drugs appears to raise the risk of both congenital malformations and miscarriage. Studies of infertility and time-to-pregnancy also suggested an increased risk for sub-fertility. Conclusions Antineoplastic drugs are highly toxic in patients receiving treatment and adverse reproductive effects have been well documented in these patients. Healthcare workers with chronic, low level occupational exposure to these drugs also appear to have an increased risk of adverse reproductive outcomes. Additional precautions to prevent exposure should be considered. PMID:25153300

  1. [Applying dose banding to the production of antineoplastic drugs: a narrative review of the literature].

    Science.gov (United States)

    Pérez Huertas, Pablo; Cueto Sola, Margarita; Escobar Cava, Paloma; Borrell García, Carmela; Albert Marí, Asunción; López Briz, Eduardo; Poveda Andrés, José Luis

    2015-07-01

    The dosage of antineoplastic drugs has historically been based on individualized prescription and preparation according to body surface area or patient´s weight. Lack of resources and increased assistance workload in the areas where chemotherapy is made, are leading to the development of new systems to optimize the processing without reducing safety. One of the strategies that has been proposed is the elaboration by dose banding. This new approach standardizes the antineoplastic agents doses by making ranges or bands accepting a percentage of maximum variation. It aims to reduce processing time with the consequent reduction in waiting time for patients; to reduce errors in the manufacturing process and to promote the rational drug use. In conclusion, dose banding is a suitable method for optimizing the development of anticancer drugs, obtaining reductions in oncologic patients waiting time but without actually causing a favorable impact on direct or indirect costs. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  2. Applying dose banding to the production of antineoplastic drugs: a narrative review of the literature

    Directory of Open Access Journals (Sweden)

    Pablo Pérez Huertas

    2015-07-01

    Full Text Available The dosage of antineoplastic drugs has historically been based on individualized prescription and preparation according to body surface area or patient´s weight. Lack of resources and increased assistance workload in the areas where chemotherapy is made, are leading to the development of new systems to optimize the processing without reducing safety. One of the strategies that has been proposed is the elaboration by dose banding. This new approach standardizes the antineoplastic agents doses by making ranges or bands accepting a percentage of maximum variation. It aims to reduce processing time with the consequent reduction in waiting time for patients; to reduce errors in the manufacturing process and to promote the rational drug use. In conclusion, dose banding is a suitable method for optimizing the development of anticancer drugs, obtaining reductions in oncologic patients waiting time but without actually causing a favorable impact on direct or indirect costs.

  3. Dental root agenesis following radiation and antineoplastic therapy: A Case Report

    Directory of Open Access Journals (Sweden)

    Abdul Hafiz

    2016-01-01

    Full Text Available The survival rates of patients suffering from various childhood neoplasms have improved dramatically with the advent of chemo-radiation therapy. The harmful effects of chemo-radiation therapy in the oro-facial region such as root agenesis, short roots, impaired amelogenesis, dentinogenesis, radiation caries, and other soft tissue pathologies are well recognized. In spite of these documented risks, the antineoplastic treatment modalities continue to serve the patient for overall improvement in survival and quality of life. However, a thorough understanding of the growth and development process and its relation with the complex antineoplastic treatment is very important for all clinicians. Such awareness could significantly improve the status of patients in the posttreatment period with the implementation of proper preventive and interceptive measures. This article intends to document a case of root agenesis that developed secondary to chemo-radiation therapy in a 12-year-old girl.

  4. Enhanced Topical and Transdermal Delivery of Antineoplastic and Antiviral Acyclic Nucleoside Phosphonate cPr-PMEDAP

    Czech Academy of Sciences Publication Activity Database

    Vávrová, K.; Kovaříková, P.; Školová, B.; Líbalová, M.; Roh, J.; Čáp, R.; Holý, Antonín; Hrabálek, A.

    2011-01-01

    Roč. 28, č. 12 (2011), s. 3105-3115 ISSN 0724-8741 R&D Projects: GA MŠk 1M0508 Grant - others:GA ČR(CZ) GAP207/11/0365 Institutional research plan: CEZ:AV0Z40550506 Keywords : acyclic nucleoside phosphonates * antivirals * antineoplastics * permeation enhancer * topical skin application * transdermal delivery Subject RIV: CC - Organic Chemistry Impact factor: 4.093, year: 2011

  5. Chromosomal damage among medical staff occupationally exposed to volatile anesthetics, antineoplastic drugs, and formaldehyde

    Czech Academy of Sciences Publication Activity Database

    Mušák, L.; Šmerhovský, Z.; Halásová, E.; Osina, O.; Letková, L.; Vodičková, Ludmila; Poláková, Veronika; Buchancová, J.; Hemminki, K.; Vodička, Pavel

    2013-01-01

    Roč. 39, č. 6 (2013), s. 618-630 ISSN 0355-3140 Grant - others:MŠVV(SK) 26220220111; UK(SK) 1/0576/10 VEGA; MZd(SK) 2007/48-UK-13; GA MŠMT(CZ) Prvouk-P27/LF1/1 Institutional support: RVO:68378041 Keywords : anesthesiologist * antineoplastic drug * chromosomal aberration Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 3.095, year: 2013

  6. Toxicity classification and evaluation of four pharmaceuticals classes: antibiotics, antineoplastics, cardiovascular, and sex hormones

    International Nuclear Information System (INIS)

    Sanderson, Hans; Brain, Richard A.; Johnson, David J.; Wilson, Christian J.; Solomon, Keith R.

    2004-01-01

    Four different classes of environmental concern are quantitatively and qualitatively assessed for environmental hazards; antibiotics (n = 226), antineoplastics (n = 81), cardiovascular (n = 272), and sex hormones (n 92). These along with an ECOSAR scan of all pharmaceuticals (n = 2848) were then classified according to the OECD aquatic toxicity classification system. The predicted species susceptibility is: daphnid > fish > algae, and the predicted rank order of relative toxicity: sex hormones > cardiovascular antibiotics > antineoplastics (Table 1). Generally, a relatively large proportion (1/3) of all pharmaceuticals are potentially very toxic to aquatic organisms (Table 2). The qualitative risk assessment ranking relative to probability and potential severity for human and environmental health effects is: antibiotics > sex hormones > cardiovascular > antineoplastics. (Q)SARs and pharmacodynamic information should be used to prioritize and steer experimental risk assessments of pharmaceuticals, and potentially, also be used in new drug discovery optimizing efficacy and in minimising environmental hazards of new products. Nuclear receptors are relatively well conserved in evolution. Currently, antibacterial resistance represents the most significant human health hazard, and potentially the largest non-target organism hazard is sex hormones acting as endocrine modulators in wildlife. Data for the individual compounds are accessible via http://www.uoguelph.ca/~hsander/

  7. Cardiotoxicity of copper-based antineoplastic drugs casiopeinas is related to inhibition of energy metabolism

    International Nuclear Information System (INIS)

    Hernandez-Esquivel, Luz; Marin-Hernandez, Alvaro; Pavon, Natalia; Carvajal, Karla; Moreno-Sanchez, Rafael

    2006-01-01

    Isolated rat hearts were perfused with glucose, octanoate or glucose + octanoate and different concentrations of the copper-based antineoplastic drugs casiopeina II-gly (CSII) or casiopeina III-i-a (CSIII). In isolated perfused hearts with glucose + octanoate, both casiopeinas induced diminution in cardiac work and O 2 consumption with half-maximal inhibitory concentrations (IC 5 ) of 4 (CSII) and 4.6 (CSIII) μM, after 1 h of perfusion. Strong inhibition of the pyruvate and 2-oxoglutarate dehydrogenases as well as total creatine kinase by casiopeinas suggested that ATP generation by oxidative phosphorylation and its transfer towards myofibrils were targets for these drugs. In consequence, the cellular contents of ATP and phosphocreatine were also lowered by casiopeinas. Remarkably, casiopeinas were less toxic than adriamycin (IC 5 = 2.6 μM), a well-known potent cardiotoxic and antineoplastic drug, which has a wide clinical use. In an open-chest animal, which is a more physiological model than the isolated heart, femoral administration of 1 μM drug revealed that CSII was innocuous very likely due to strong binding to serum albumin, whereas adriamycin induced again a potent cardiotoxic effect (diminution in heart rate and severe depression of systolic blood pressure). Thus, it seems that casiopeinas are a group of new antineoplastic drugs with milder secondary toxic effects than proven drugs such as adriamycin

  8. Clinical effect of Cystenosine on leukocytopenia at the time of therapy with radiation and antineoplastic agents

    International Nuclear Information System (INIS)

    Sato, Kazuhide; Usui, Ryu; Inoue, Hiroshi; Mihashi, Norio; Niibe, Hideo.

    1977-01-01

    Out of 62 cases, 25 cases received only radiotherapy, 11 cases received both radiotherapy and antineoplastic agents, and 26 cases received only antineoplastic agents. Total dose of x-ray ranges from 3000 to 6200 rad in 18 of 36 cases of the former two groups, and 2600 to 6260 rad of 60 Co dose were irradiated to 18 cases of the rest. This agent was administered 9 tablets per a day (one tablet contains 200 mg of inosine and 20 mg of cystine) for 19 to 142 days. Its effects on leukocytopenia showed marked effectiveness in 9 out of 25 cases treated with only radiation, effectiveness in 8 cases, and ineffectiveness in 3 cases. Its effective rate was 72.8%. The effective rate was 65.4% in the cases treated with only antineoplastic agents, and was 67.7% in all cases. A certain relationship between dose and the effective rate was not recognized. Radiation sickness, such as loss of appetite general fatigue and mausea, decreased gradually by using this agent. Side effect was not recognized particularly. (Kanao. N.)

  9. Changes in the chemical composition of mineralised teeth in children after antineoplastic treatment.

    Science.gov (United States)

    Krasuska-Sławińska, Ewa; Dembowska-Bagińska, Bożenna; Brożyna, Agnieszka; Olczak-Kowalczyk, Dorota; Czarnowska, Elżbieta; Sowińska, Agnieszka

    2018-01-01

    Chemotherapy, neoplasms, and their complications linked to malabsorption, malnutrition, and metabolic disorders may lead to improper tooth development and frequent severe caries in patients during/after antineoplastic treatment and to a more frequent improper tooth development in patients undergoing chemotherapy during odontogenesis. However, the causes of these abnormalities remain unknown; there are no studies on the impact of antineoplastic treatment and its complications on the chemical composition of mineralised teeth. To compare the chemical composition of mineralised teeth extracted due to complicated caries in children after chemotherapy, and of teeth extracted due to orthodontic treatment in generally healthy children. The treatment group included five teeth extracted due to complicated caries in children after antineoplastic treatment. The control group included five teeth extracted due to orthodontic treatment in generally healthy children. The chemical composition of enamel, dentine, cementum, interior of the canal, and enamel abnormalities in teeth extracted from patients after chemotherapy and in generally healthy patients were assessed with energy-dispersive X-ray spectroscopy. Results were analysed statistically. The magnesium (Mg) and zinc (Zn) mass contents in the enamel of patients after chemotherapy increased and so did the calcium (Ca) to phosphorus (P) ratio when compared to controls. Areas with abnormal enamel in patients after chemotherapy had lower concentrations of Ca and P, and higher concentrations of trace elements (Mg, Cl, and Na). The levels of the assessed elements in dentine, cementum, and inside the canal were similar in both groups of teeth.

  10. Extraction and Isolation of Antineoplastic Pristimerin from Mortonia greggii (Celastraceae).

    Science.gov (United States)

    Mejia-Manzano, Luis Alberto; Barba-Dávila, Bertha A; Gutierrez-Uribe, Janet A; Escalante-Vázquez, Edgardo J; Serna-Saldivar, Sergio O

    2015-11-01

    The aim of this research was to identify, extract and isolate pristimerin in leaves, stems and roots of the Mexican plant Mortonia greggii (Celastraceae). The principal objective was to determine the best laboratory experimental conditions for the extraction and isolation of this powerful natural anticancer agent from the root tissue. Six experimental factors in solid-liquid pristimerin extraction were analyzed: solvent systems, number of extractions, ratio of plant weight (g)/solvent volume (mL) used, time of extraction, temperature and agitation. A mathematical model was generated for pristimerin purity and yield. Ethanol, first extraction, 0.5 ratio of plant weight/solvent volume (g/mL), 0.5 h, 200 rpm and 49.7°C were optimal conditions for the extraction of this phytochemical. The degree of purification of pristimerin root extract was studied by size-exclusion chromatography (SEC) using Sephadex LH-20 reaching fractions with purification indexes (PI) greater than 2 and recoveries of 28.3%. When fractions with purification indices higher than 1 and less than 2 were accumulated, the recovery of pristimerin increased by about 73.6%. By combining the optimum extracts and SEC purification protocols, an enriched fraction containing 245.6 mg pristimerin was obtained from 100 g of root bark, representing about 14.4%, w/w, pristimerin from the total solids presented in the fraction.

  11. [Implementation of a robot for the preparation of antineoplastic drugs in the Pharmacy Service].

    Science.gov (United States)

    Pacheco Ramos, María de la Paz; Arenaza Peña, Ainhoa Elisa; Santiago Pérez, Alejandro; Bilbao Gómez-Martino, Cristina; Zamora Barrios, María Dolores; Arias Fernández, María Lourdes

    2015-05-01

    To describe the implementation of a robot for the preparation of antineoplastic drugs in the Pharmacy Service and to be able to analyze the added value to pharmacotherapy. The implementation was carried out in June 2012 at a tertiary level Hospital, taking place in two periods: 1- test period with the installation of the robot, with technical configuration of the equipment and validation of 29 active ingredients and the integration of electronic prescribing software with the robot application (9 months). 2- Usage period (22 months). On the other hand, training was given to pharmacists and nurses. The robot uses image recognition, barcode identification and gravimetric controls for proper operation. These checks provide information about the error ratio in the preparation, with a margin of ± 10%, which after a pilot study was restricted to a range of ±4%. The robot was programmed to recognize bags, infusion pumps, syringes and vials. The added value was assessed for 31 months by identifying preparation's errors. 11,865 preparations were made by the robot, which meant approximately 40% of all antineoplastic prepared from 29 different active ingredients. 1.12% (n=133) of the errors were identified by the robot and therefore didn't reach the patient (negative desviation - 4%). These errors were corrected manually. The implementation of a robot in the preparation of antineoplastic drugs allows to identify errors therefore preventing them to arrive to the patient. This promotes safety and quality of the process, reducing the exposure to cytotoxic drugs from the manipulator. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  12. Implementation of a robot for the preparation of antineoplastic drugs in the Pharmacy Service

    Directory of Open Access Journals (Sweden)

    María de la Paz Pacheco Ramos

    2015-01-01

    Full Text Available Objective: To describe the implementation of a robot for the preparation of antineoplastic drugs in the Pharmacy Service and to be able to analyze the added value to pharmacotherapy. Methods: The implementation was carried out in June 2012 at a tertiary level Hospital, taking place in two periods: 1- test period with the installation of the robot, with technical configuration of the equipment and validation of 29 active ingredients and the integration of electronic prescribing software with the robot application (9 months. 2- Usage period (22 months. On the other hand, training was given to pharmacists and nurses. The robot uses image recognition, barcode identification and gravimetric controls for proper operation. These checks provide information about the error ratio in the preparation, with a margin of ± 10%, which after a pilot study was restricted to a range of ±4%. The robot was programmed to recognize bags, infusion pumps, syringes and vials. The added value was assessed for 31 months by identifying preparation´s errors. Results: 11,865 preparations were made by the robot, which meant approximately 40% of all antineoplastic prepared from 29 different active ingredients. 1.12% (n=133 of the errors were identified by the robot and therefore didn´t reach the patient (negative desviation - 4%. These errors were corrected manually. Conclusion: The implementation of a robot in the preparation of antineoplastic drugs allows to identify errors therefore preventing them to arrive to the patient. This promotes safety and quality of the process, reducing the exposure to cytotoxic drugs from the manipulator

  13. New approaches to wipe sampling methods for antineoplastic and other hazardous drugs in healthcare settings.

    Science.gov (United States)

    Connor, Thomas H; Smith, Jerome P

    2016-09-01

    At the present time, the method of choice to determine surface contamination of the workplace with antineoplastic and other hazardous drugs is surface wipe sampling and subsequent sample analysis with a variety of analytical techniques. The purpose of this article is to review current methodology for determining the level of surface contamination with hazardous drugs in healthcare settings and to discuss recent advances in this area. In addition it will provide some guidance for conducting surface wipe sampling and sample analysis for these drugs in healthcare settings. Published studies on the use of wipe sampling to measure hazardous drugs on surfaces in healthcare settings drugs were reviewed. These studies include the use of well-documented chromatographic techniques for sample analysis in addition to newly evolving technology that provides rapid analysis of specific antineoplastic. Methodology for the analysis of surface wipe samples for hazardous drugs are reviewed, including the purposes, technical factors, sampling strategy, materials required, and limitations. The use of lateral flow immunoassay (LFIA) and fluorescence covalent microbead immunosorbent assay (FCMIA) for surface wipe sample evaluation is also discussed. Current recommendations are that all healthc a re settings where antineoplastic and other hazardous drugs are handled include surface wipe sampling as part of a comprehensive hazardous drug-safe handling program. Surface wipe sampling may be used as a method to characterize potential occupational dermal exposure risk and to evaluate the effectiveness of implemented controls and the overall safety program. New technology, although currently limited in scope, may make wipe sampling for hazardous drugs more routine, less costly, and provide a shorter response time than classical analytical techniques now in use.

  14. Antineoplastic drugs and radiation: comparison of the phenomena determining the effectiveness of fractionated treatments

    International Nuclear Information System (INIS)

    Mauro, F.; Briganti, G.; Nervi, C.

    1983-01-01

    In the last ten years the criteria for effective radiotherapy regimens have been rediscussed by analyzing the dependence of radiation response upon the radiobiological phenomena affecting the results of fractionated treatments. In the original definition of H.R. Withers, these phenomena have been referred to as the four R's of radiotherapy, and today we suspect that their number may be higher than that. By analogy, and in spite of the fact that chemical cytotoxic agents are seldom radiomimetic in the strict sense of the word, a similar general analysis could be used to discuss the effectiveness of fractionated administrations of anti-neoplastic drugs. However, information is only available for the cell-cycle age-dependence of lethal and kinetic effects and the repair from potentially lethal damage induced by these agents. In the present work, an attempt is made to discuss some of the neglected R's of chemotherapy, with the aim of establishing (not exclusively empirical) criteria for drug scheduling and of clarifying some of the observations on interaction between agents. In particular, with regard to antineoplastic drugs, published and unpublished information is available not only for the well-known phenomenon of reassortment, but also for the shape of the survival curve, recovery (or potentiation) between dose fraction, and recruitment. Some advantages (and pitfalls) can be evidenced when applying this kind of radiobiological approach to chemotherapy

  15. Applying ligands profiling using multiple extended electron distribution based field templates and feature trees similarity searching in the discovery of new generation of urea-based antineoplastic kinase inhibitors.

    Directory of Open Access Journals (Sweden)

    Eman M Dokla

    Full Text Available This study provides a comprehensive computational procedure for the discovery of novel urea-based antineoplastic kinase inhibitors while focusing on diversification of both chemotype and selectivity pattern. It presents a systematic structural analysis of the different binding motifs of urea-based kinase inhibitors and the corresponding configurations of the kinase enzymes. The computational model depends on simultaneous application of two protocols. The first protocol applies multiple consecutive validated virtual screening filters including SMARTS, support vector-machine model (ROC = 0.98, Bayesian model (ROC = 0.86 and structure-based pharmacophore filters based on urea-based kinase inhibitors complexes retrieved from literature. This is followed by hits profiling against different extended electron distribution (XED based field templates representing different kinase targets. The second protocol enables cancericidal activity verification by using the algorithm of feature trees (Ftrees similarity searching against NCI database. Being a proof-of-concept study, this combined procedure was experimentally validated by its utilization in developing a novel series of urea-based derivatives of strong anticancer activity. This new series is based on 3-benzylbenzo[d]thiazol-2(3H-one scaffold which has interesting chemical feasibility and wide diversification capability. Antineoplastic activity of this series was assayed in vitro against NCI 60 tumor-cell lines showing very strong inhibition of GI(50 as low as 0.9 uM. Additionally, its mechanism was unleashed using KINEX™ protein kinase microarray-based small molecule inhibitor profiling platform and cell cycle analysis showing a peculiar selectivity pattern against Zap70, c-src, Mink1, csk and MeKK2 kinases. Interestingly, it showed activity on syk kinase confirming the recent studies finding of the high activity of diphenyl urea containing compounds against this kinase. Allover, the new series

  16. Applicability of the comet assay in evaluation of DNA damage in healthcare providers' working with antineoplastic drugs: a systematic review and meta-analysis.

    Science.gov (United States)

    Zare Sakhvidi, Mohammad Javad; Hajaghazadeh, Mohammad; Mostaghaci, Mehrdad; Mehrparvar, Amir Houshang; Zare Sakhvidi, Fariba; Naghshineh, Elham

    2016-01-01

    Unintended occupational exposure to antineoplastic drugs (ANDs) may occur in medical personnel. Some ANDs are known human carcinogens and exposure can be monitored by genotoxic biomarkers. To evaluate the obstacles to obtaining conclusive results from a comet assay test to determine DNA damage among AND exposed healthcare workers. We systematically reviewed studies that used alkaline comet assay to determine the magnitude and significance of DNA damage among health care workers with potential AND exposure. Fifteen studies were eligible for review and 14 studies were used in the meta-analysis. Under random effect assumption, the estimated standardized mean difference (SMD) in the DNA damage of health care workers was 1.93 (95% CI: 1.15-2.71, p comet moment, I2 test results, as a measure of heterogeneity, dropped to zero. Heterogeneity analysis showed that date of study publication was a possible source of heterogeneity (B = -0.14; p comet assay methodological variables, and exposure characteristics may be responsible for heterogenic data from comet assay studies and interfere with obtaining conclusive results. Lack of quantitative environmental exposure measures and variation in comet assay protocols across studies are important obstacles in generalization of results.

  17. Applicability of the comet assay in evaluation of DNA damage in healthcare providers’ working with antineoplastic drugs: a systematic review and meta-analysis

    Science.gov (United States)

    Zare Sakhvidi, Mohammad Javad; Hajaghazadeh, Mohammad; Mostaghaci, Mehrdad; Mehrparvar, Amir houshang; Zare Sakhvidi, Fariba; Naghshineh, Elham

    2016-01-01

    Background Unintended occupational exposure to antineoplastic drugs (ANDs) may occur in medical personnel. Some ANDs are known human carcinogens and exposure can be monitored by genotoxic biomarkers. Objective To evaluate the obstacles to obtaining conclusive results from a comet assay test to determine DNA damage among AND exposed healthcare workers. Methods We systematically reviewed studies that used alkaline comet assay to determine the magnitude and significance of DNA damage among health care workers with potential AND exposure. Fifteen studies were eligible for review and 14 studies were used in the meta-analysis. Results Under random effect assumption, the estimated standardized mean difference (SMD) in the DNA damage of health care workers was 1.93 (95% CI: 1.15–2.71, p comet moment, I2 test results, as a measure of heterogeneity, dropped to zero. Heterogeneity analysis showed that date of study publication was a possible source of heterogeneity (B = −0.14; p comet assay methodological variables, and exposure characteristics may be responsible for heterogenic data from comet assay studies and interfere with obtaining conclusive results. Lack of quantitative environmental exposure measures and variation in comet assay protocols across studies are important obstacles in generalization of results. PMID:27110842

  18. Peroxisome Proliferator-Activated Receptors (PPARs as Potential Inducers of Antineoplastic Effects in CNS Tumors

    Directory of Open Access Journals (Sweden)

    Lars Tatenhorst

    2008-01-01

    Full Text Available The peroxisome proliferator-activated receptors (PPARs are ligand-inducible transcription factors which belong to the superfamily of nuclear hormone receptors. In recent years it turned out that natural as well as synthetic PPAR agonists exhibit profound antineoplastic as well as redifferentiation effects in tumors of the central nervous system (CNS. The molecular understanding of the underlying mechanisms is still emerging, with partially controverse findings reported by a number of studies dealing with the influence of PPARs on treatment of tumor cells in vitro. Remarkably, studies examining the effects of these drugs in vivo are just beginning to emerge. However, the agonists of PPARs, in particular the thiazolidinediones, seem to be promising candidates for new approaches in human CNS tumor therapy.

  19. QSPR modeling of octanol/water partition coefficient of antineoplastic agents by balance of correlations.

    Science.gov (United States)

    Toropov, Andrey A; Toropova, Alla P; Raska, Ivan; Benfenati, Emilio

    2010-04-01

    Three different splits into the subtraining set (n = 22), the set of calibration (n = 21), and the test set (n = 12) of 55 antineoplastic agents have been examined. By the correlation balance of SMILES-based optimal descriptors quite satisfactory models for the octanol/water partition coefficient have been obtained on all three splits. The correlation balance is the optimization of a one-variable model with a target function that provides both the maximal values of the correlation coefficient for the subtraining and calibration set and the minimum of the difference between the above-mentioned correlation coefficients. Thus, the calibration set is a preliminary test set. Copyright (c) 2009 Elsevier Masson SAS. All rights reserved.

  20. New solid state forms of antineoplastic 5-fluorouracil with anthelmintic piperazine

    Science.gov (United States)

    Moisescu-Goia, C.; Muresan-Pop, M.; Simon, V.

    2017-12-01

    The aim of the present study was to asses the formation of solid forms between the 5-fluorouracil chemotherapy drug and the anthelmintic piperazine. Two new solid forms of antineoplastic agent 5-fluorouracil with anthelmintic piperazine were obtained by liquid assisted ball milling and slurry crystallization methods. The Nsbnd H hydrogen bonding donors and C = O hydrogen bonding acceptors of 5-fluorouracil allow to form co-crystals with other drugs delivering improved properties for medical applications, as proved for other compounds of pharmaceutical interest. Both new solid forms were investigated using X-ray powder diffraction (XRD), differential thermal analysis (DTA) and Fourier transform infrared (FTIR) spectroscopy. The XRD results show that by both methods were successfully synthesized new solid forms of 5-fluorouracil with piperazine. According to FTIR results the form prepared by lichid assisted grinding process was obtained as co-crystal and the other one, prepared by slurry method, resulted as a salt.

  1. Effect of corticosteroids on phlebitis induced by intravenous infusion of antineoplastic agents in rabbits.

    Science.gov (United States)

    Kohno, Emiko; Murase, Saori; Matsuyama, Kenji; Okamura, Noboru

    2009-08-06

    Phlebitis caused by intravenous infusion of antineoplastic agents is one of the critical problems when anticancer therapy is prolonged. We have already reported that both rapid infusion and dilution of the injection solution were effective methods for reducing phlebitis caused by vinorelbine (VNR) in rabbits. The aim of this study was to explore other practical methods for preventing phlebitis caused by VNR and doxorubicin (DXR) in a rabbit model. VNR is often used with cisplatin, and dexamethasone (DEX) has been co-administered for prevention of cisplatin-induced nausea. DXR is used with prednisolone (PSL) in the CHOP regimen for the treatment of non-Hodgkin's lymphoma. Therefore, the present study investigated the prevention of phlebitis due to VNR with DEX and that due to DXR with PSL. VNR and DXR were diluted with normal saline to prepare test solutions at concentrations of 0.6 mg/mL and 1.4 mg/mL, respectively. Each test solution was infused into the auricular veins of rabbits. Two days after VNR infusion and three days after DXR infusion, the veins were evaluated histopathologically. The effect of DEX on VNR-induced phlebitis was evaluated by infusion of DEX before or after VNR. The effect of PSL on DXR-induced phlebitis was similarly evaluated by co-infusion of PSL. The histopathological features of phlebitis caused by the antineoplastic agents differed between VNR and DXR: VNR did not cause the loss of venous endothelial cells, but caused inflammatory cell infiltration, edema, and epidermal degeneration. In contrast, DXR caused the loss of venous endothelial cells and chrondrocyte necrosis. Pre-treatment and post-treatment with DEX significantly decreased VNR-induced phlebitis compared with the control group and pre-treatment was particularly effective. Co-infusion of PSL also significantly decreased phlebitis caused by DXR, but its effect was less marked. The present findings suggested that pre-treatment with DEX may be a useful method for preventing

  2. Cost-benefit analysis of prophylactic granulocyte colony-stimulating factor during CHOP antineoplastic therapy for non-Hodgkin's lymphoma.

    Science.gov (United States)

    Dranitsaris, G; Altmayer, C; Quirt, I

    1997-06-01

    Several randomised comparative trials have shown that granulocyte colony-stimulating factor (G-CSF) reduces the duration of neutropenia, hospitalisation and intravenous antibacterial use in patients with cancer who are receiving high-dosage antineoplastic therapy. However, one area that has received less attention is the role of G-CSF in standard-dosage antineoplastic regimens. One such treatment that is considered to have a low potential for inducing fever and neutropenia is the CHOP regimen (cyclophosphamide, doxorubicin, vincristine and prednisone) for non-Hodgkin's lymphoma. We conducted a cost-benefit analysis from a societal perspective in order to estimate the net cost or benefit of prophylactic G-CSF in this patient population. This included direct costs for hospitalisation with antibacterial support, as well as indirect societal costs, such as time off work and antineoplastic therapy delays secondary to neutropenia. The findings were then tested by a comprehensive sensitivity analysis. The administration of G-CSF at a dosage of 5 micrograms/kg/day for 11 doses following CHOP resulted in an overall net cost of $Can1257. In the sensitivity analysis, lowering the G-CSF dosage to 2 micrograms/kg/day generated a net benefit of $Can6564, indicating a situation that was cost saving to society. The results of the current study suggest that the use of G-CSF in patients receiving CHOP antineoplastic therapy produces a situation that is close to achieving cost neutrality. However, low-dosage (2 micrograms/kg/day) G-CSF is an economically attractive treatment strategy because it may result in overall savings to society.

  3. Bioremediation protocols

    National Research Council Canada - National Science Library

    Sheehan, David

    1997-01-01

    ..., .. . . . . .. ,. . . .. . . . . . . . .. . . . . .. . . .. . .. 3 2 Granular Nina Sludge Christiansen, Consortia lndra for Bioremediation, M. Mathrani, and Birgitte K. Ahring . 23 PART II PROTOCOLS...

  4. French Health Technology Assessment of Antineoplastic Drugs Indicated in the Treatment of Solid Tumours: Perspective for Future Trends.

    Science.gov (United States)

    Chouaid, Christos; Borget, Isabelle; Braun, Eric; Bazil, Marie-Laure; Schaetz, Dominique; Rémuzat, Cécile; Toumi, Mondher

    2016-08-01

    France is one of the European countries that spend the most on oncology drugs. To keep pharmaceutical expenditure under control, Health Authorities highly scrutinize market access of costly medicines. To assess current and future trends in French health technology assessment (HTA) of antineoplastic drugs indicated in the treatment of solid tumours. A review of the SMR and ASMR drivers of the Transparency Committee (CT) opinions issued for antineoplastic drugs indicated in the treatment of solid tumours and approved between 2009 and 2014 was performed to assess current trends in French health technology assessment (HTA), complemented by an expert board consultation to capture the critical issues on the future of antineoplastic drugs HTA. Thirty-one drugs indicated for the treatment of solid tumours were identified (77 % targeted therapies). Initial CT assessments were available for 26 drugs. Four key items in the CT assessment were identified: 1) Clinical trial methodology; 2) Acceptance of progression-free survival (PFS) as a valuable endpoint; 3) Transferability of clinical trials in clinical practice; 4) Unpredictability of CT decisions. Experts raised the important development of personalised medicines in oncology and key challenges for oncology products to generate information expected from HTA perspective. The French system remains committed to its values and philosophy (access of all innovations for everybody) which are threatened by the increasing launch of innovative therapies and budget constraint. Both HTA decision framework evolution and revision of the current pricing process should be considered in France to cope with these new challenges.

  5. Lack of genotoxicity in medical oncology nurses handling antineoplastic drugs: effect of work environment and protective equipment.

    Science.gov (United States)

    Gulten, Tuna; Evke, Elif; Ercan, Ilker; Evrensel, Turkkan; Kurt, Ender; Manavoglu, Osman

    2011-01-01

    In this study we aimed to investigate the genotoxic effects of antineoplastic agents in occupationally exposed oncology nurses. Genotoxic effects mean the disruptive effects in the integrity of DNA and they are associated with cancer development. Biomonitoring of health care workers handling antineoplastic agents is helpful for the evaluation of exposure to cytostatics. The study included an exposed and two control groups. The exposed group (n=9) was comprised of oncology nurses. The first (n=9) and second (n=10) control groups were comprised of subjects who did not come into contact with antineoplastic drugs working respectively in the same department with oncology nurses and in different departments. Genotoxicity evaluation was performed using SCE analysis. After applying culture, harvest and chromosome staining procedures, a total of 25 metaphases were analyzed per person. Kruskal Wallis test was used to perform statistical analysis. A statistically significant difference of sister chromatid exchange frequencies was not observed between the exposed and control groups. Lack of genotoxicity in medical oncology nurses might be due to good working conditions with high standards of technical equipment and improved personal protection.

  6. Kinetics of micronucleus induction and cytotoxicity caused by distinct antineoplastics and alkylating agents in vivo.

    Science.gov (United States)

    Morales-Ramírez, Pedro; Vallarino-Kelly, Teresita; Cruz-Vallejo, Virginia

    2014-01-30

    This mini-review aims to compare the differences in the kinetics of the induction of micronucleated polychromatic erythrocytes (MN-PCE) and cytotoxicity by distinct antineoplastic and genotoxic agents in murine peripheral blood in vivo and to correlate these kinetics with the underlying processes. Comparisons were carried out using our previously obtained data with nominal doses causing similar levels of cytotoxicity, as measured in terms reduction of PCE. The aneuploidogens caused the most rapid induction of MN-PCEs and had the highest rates of cytotoxicity and genotoxicity. The promutagens cyclophosphamide and dimethylnitrosamine showed the most delayed responses and had the lowest genotoxic and cytotoxic efficiencies. DNA crosslinking agents had a similar delay of 4-5 h, greater than those of aneuploidogens, but differed in their cytotoxic and genotoxic efficiencies. Methylnitrosourea and 5-aza-cytidine caused greater delays than crosslinking agents. These delays can be due to the methylnitrosourea-mediated induction of formation of mono alkyl adducts which are interpreted as mismatches during DNA duplication, whereas 5-aza-cytidine requires incorporation into the DNA to induce breakage. This review allows us to conclude that the requirement for metabolic activation and the mechanisms of DNA breakage and of micronucleus induction are the main factors that affect the time of maximal MN-PCE induction. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  7. Characterizing interspecies uncertainty using data from studies of anti-neoplastic agents in animals and humans

    International Nuclear Information System (INIS)

    Price, Paul S.; Keenan, Russell E.; Swartout, Jeffrey C.

    2008-01-01

    For most chemicals, the Reference Dose (RfD) is based on data from animal testing. The uncertainty introduced by the use of animal models has been termed interspecies uncertainty. The magnitude of the differences between the toxicity of a chemical in humans and test animals and its uncertainty can be investigated by evaluating the inter-chemical variation in the ratios of the doses associated with similar toxicological endpoints in test animals and humans. This study performs such an evaluation on a data set of 64 anti-neoplastic drugs. The data set provides matched responses in humans and four species of test animals: mice, rats, monkeys, and dogs. While the data have a number of limitations, the data show that when the drugs are evaluated on a body weight basis: 1) toxicity generally increases with a species' body weight; however, humans are not always more sensitive than test animals; 2) the animal to human dose ratios were less than 10 for most, but not all, drugs; 3) the current practice of using data from multiple species when setting RfDs lowers the probability of having a large value for the ratio. These findings provide insight into inter-chemical variation in animal to human extrapolations and suggest the need for additional collection and analysis of matched toxicity data in humans and test animals

  8. The emerging role of antineoplastic agents in the treatment of keloids and hypertrophic scars: a review.

    Science.gov (United States)

    Shridharani, Sachin M; Magarakis, Michael; Manson, Paul N; Singh, Navin K; Basdag, Basak; Rosson, Gedge D

    2010-03-01

    The management of keloids and hypertrophic scars continues to challenge health-care providers. Though both forms of pathologic scarring are distinct entities at the macro and microscopic level, their etiologies and treatment are often similar. Potential treatment approaches are progressing, and combinations of treatment options have been proposed in the literature with promising outcomes. The treatment evolution has reached a level where molecular therapeutic modalities are being investigated. Currently, no gold standard treatment exists. Overall success rates and patient satisfaction seem to be slowly climbing, but additional investigational studies must continue to be performed. Several studies have investigated antineoplastic agents, and there seems to be a marked improvement in rates of recurrence, patient satisfaction, and overall quality of scar when these agents are used. Intralesional injection and/or wound irrigation with interferon-a2b, interferon-g, mitomycin-C, bleomycin, or 5-fluorouracil seems to have a positive effect on the reduction of pathologic scars. There is mounting evidence that these drugs used alone or in combination therapy, have the potential to be an integral part of the treatment paradigm for hypertrophic scars and keloids.

  9. Study of antineoplastic action of novel isomeric derivatives of 4-thiazolidinone

    Directory of Open Access Journals (Sweden)

    М. R. Fil

    2014-12-01

    Full Text Available Pyrazole- and aryl-substituted derivatives of 4-thiazolidinone belong to a perspective group of compounds with potential antitumor action. Earlier, we have demonstrated high toxicity in vitro of several 4-thiazolidinones derivatives towards tumor cell lines. To further enhance the antitumor activity of novel 4-thiazolidinones, their chemical scaffold was optimized, and new pyrazole-thiazolidinones were synthesized. That allowed us to combine in one molecule the potential pharmacophore centres of previously tested compounds. As a result, “hybrid” 4-thiazolidinones exhibit higher toxicity in vitro toward tumor cells of various origin. The molecular mechanisms of antineoplastic activity of these compounds and intensity of induction of apoptosis strongly depended on the position of the substituent in the thiazolidinone cycle. In particular, Les-3661 compound, containing pyrazoline fragment in the 4th position of thiazolidinone core, exhibits 14 times higher cytotoxic activity towards tumor cells (LC50 = 3 µM in comparison to its 2-substituted isomer Les-3713 (LC50 = 42 µM. It is demonstrated that in terms of underlying molecular mechanisms for cytotoxic effect the Les-3661 compound induced caspase-8 and caspase-9 dependent mixed-type of apoptosis, while Les-3713 induced apoptosis mediated only by the caspase-8.

  10. BEL β-trefoil: a novel lectin with antineoplastic properties in king bolete (Boletus edulis) mushrooms.

    Science.gov (United States)

    Bovi, Michele; Cenci, Lucia; Perduca, Massimiliano; Capaldi, Stefano; Carrizo, Maria E; Civiero, Laura; Chiarelli, Laurent R; Galliano, Monica; Monaco, Hugo L

    2013-05-01

    A novel lectin was purified from the fruiting bodies of king bolete mushrooms (Boletus edulis, also called porcino, cep or penny bun). The lectin was structurally characterized i.e its amino acid sequence and three-dimensional structure were determined. The new protein is a homodimer and each protomer folds as β-trefoil domain and therefore we propose the name Boletus edulis lectin (BEL) β-trefoil to distinguish it from the other lectin that has been described in these mushrooms. The lectin has potent anti-proliferative effects on human cancer cells, which confers to it an interesting therapeutic potential as an antineoplastic agent. Several crystal forms of the apoprotein and of complexes with different carbohydrates were studied by X-ray diffraction. The structure of the apoprotein was solved at 1.12 Å resolution. The interaction of the lectin with lactose, galactose, N-acetylgalactosamine and T-antigen disaccharide, Galβ1-3GalNAc, was examined in detail. All the three potential binding sites present in the β-trefoil fold are occupied in at least one crystal form and are described in detail in this paper. No important conformational changes are observed in the lectin when comparing its co-crystals with carbohydrates with those of the ligand-free protein.

  11. Use of oral antineoplastic in special situations in a third level hospital: real life results

    Directory of Open Access Journals (Sweden)

    José Miguel Ferrari-Piquero

    2018-01-01

    Full Text Available Objective: To analyse the effectiveness and safety of oral antineoplastic drugs (ANEOs that are authorized in special situations in a third-level hospital and to compare the results obtained with the clinical evidence used for this authorization. Method: Descriptive observational and retrospective study. We included all adult patients who started treatment with ANEO in special situations during the year 2016. We collected demographic, treatment-related and clinical variables (overall survival (OS, progression-free survival (PFS. Adverse reactions and detected interactions were collected. An unadjusted comparison was made between the results of the available evidence and those of the study patients. Results: 34 patients were treated, 50% were men, the median age was 58 years (38-80 and they presented ECOG 1 in 64.7%. Most of the treated patients were diagnosed with advanced colorectal cancer, treated with trifluridine-tipiracil, followed by palbociclib in breast cancer, obtaining results similar to those of the evidence. The median PFS was 2.8 months (95% CI 0.8- 4.8 and the 8-month SG (95% CI 3.4-12.5 for all patients. 26% of patients required dose reduction because of treatment toxicity. We found 13 interactions, which affected 15 patients, only two of category X. Conclusions: The effectiveness of ANEO in special situations in our center is similar to that of available evidence. The impact on survival is low and adverse effects are common.

  12. Important exposure controls for protection against antineoplastic agents: Highlights for oncology health care workers.

    Science.gov (United States)

    Alehashem, Maryam; Baniasadi, Shadi

    2018-01-01

    A great number of antineoplastic drugs (ANPDs) are used globally in cancer treatment. Due to their adverse health effects, occupational exposure to ANPDs is considered a potential health risk to health care workers. The current study aimed to evaluate safe-handling practices of ANPDs, exposure controls, and adverse health implications for health care providers exposed to ANDPs. Prevention measures, including engineering, administrative, and work practice controls, as well as personal protective equipment (PPE), were recorded daily through a questionnaire for six weeks. Acute adverse health effects experienced by health care workers were also documented. The implemented exposure controls for preparation, administration, cleaning, and waste disposal were not in accordance with the safe handling guidelines. Central nervous system disorders (26.33%) were the most frequent acute adverse effects reported by health care workers. A significant correlation was found between the number of experienced adverse effects and handling characteristics, including the number of preparations (r = 0.38, p health care workers were in danger of exposure to ANPDs and experienced acute adverse health effects. Implementation of appropriate exposure controls is required to prevent occupational exposure to ANPDs.

  13. Relevance of the OCT1 transporter to the antineoplastic effect of biguanides

    International Nuclear Information System (INIS)

    Segal, Eric D.; Yasmeen, Amber; Beauchamp, Marie-Claude; Rosenblatt, Joshua; Pollak, Michael; Gotlieb, Walter H.

    2011-01-01

    Highlights: ► siRNA knockdown of OCT1 reduced sensitivity of EOC cells to metformin, but not to another biguanide, phenformin. ► Suppression of OCT1 also affects the activation of AMP kinase in response to metformin, but not to phenformin. ► Direct actions of metformin may be limited by low OCT1 expression in EOC tumors. ► Phenformin could be used as an alternative biguanide. -- Abstract: Epidemiologic and laboratory data suggesting that metformin has antineoplastic activity have led to ongoing clinical trials. However, pharmacokinetic issues that may influence metformin activity have not been studied in detail. The organic cation transporter 1 (OCT1) is known to play an important role in cellular uptake of metformin in the liver. We show that siRNA knockdown of OCT1 reduced sensitivity of epithelial ovarian cancer cells to metformin, but interestingly not to another biguanide, phenformin, with respect to both activation of AMP kinase and inhibition of proliferation. We observed that there is heterogeneity between primary human tumors with respect to OCT1 expression. These results suggest that there may be settings where drug uptake limits direct action of metformin on neoplastic cells, raising the possibility that metformin may not be the optimal biguanide for clinical investigation.

  14. Relevance of the OCT1 transporter to the antineoplastic effect of biguanides

    Energy Technology Data Exchange (ETDEWEB)

    Segal, Eric D.; Yasmeen, Amber; Beauchamp, Marie-Claude; Rosenblatt, Joshua [Division of Gynecologic Oncology, Jewish General Hospital, McGill University, Montreal, Quebec (Canada); Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Pollak, Michael [Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Department of Oncology, McGill University, Montreal, Quebec (Canada); Gotlieb, Walter H., E-mail: walter.gotlieb@mcgill.ca [Division of Gynecologic Oncology, Jewish General Hospital, McGill University, Montreal, Quebec (Canada); Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Department of Oncology, McGill University, Montreal, Quebec (Canada)

    2011-11-04

    Highlights: Black-Right-Pointing-Pointer siRNA knockdown of OCT1 reduced sensitivity of EOC cells to metformin, but not to another biguanide, phenformin. Black-Right-Pointing-Pointer Suppression of OCT1 also affects the activation of AMP kinase in response to metformin, but not to phenformin. Black-Right-Pointing-Pointer Direct actions of metformin may be limited by low OCT1 expression in EOC tumors. Black-Right-Pointing-Pointer Phenformin could be used as an alternative biguanide. -- Abstract: Epidemiologic and laboratory data suggesting that metformin has antineoplastic activity have led to ongoing clinical trials. However, pharmacokinetic issues that may influence metformin activity have not been studied in detail. The organic cation transporter 1 (OCT1) is known to play an important role in cellular uptake of metformin in the liver. We show that siRNA knockdown of OCT1 reduced sensitivity of epithelial ovarian cancer cells to metformin, but interestingly not to another biguanide, phenformin, with respect to both activation of AMP kinase and inhibition of proliferation. We observed that there is heterogeneity between primary human tumors with respect to OCT1 expression. These results suggest that there may be settings where drug uptake limits direct action of metformin on neoplastic cells, raising the possibility that metformin may not be the optimal biguanide for clinical investigation.

  15. Sesquiterpene lactones: Mechanism of antineoplastic activity; relationship of cellular glutathione to cytotoxicity; and disposition

    International Nuclear Information System (INIS)

    Grippo, A.A.

    1987-01-01

    Helenalin, a sesquiterpene lactone, inhibited the growth of P388 lymphocytic and L1210 lymphoid leukemia, and Ehrlich ascites and KB carcinoma cells. The L1210 leukemia cells were most sensitive to the cytotoxic effects of helenalin. Helenalin's antineoplastic effects were due to inhibition of DNA synthesis by suppressing the activities of enzymes involved in this biosynthetic pathway; i.e., IMP dehydrogenase, ribonucleoside diphosphate reductase, thioredoxin complex, GSH disulfide oxidoreductase and DNA polymerase α activities. The relationship of reduced glutathione (GSH) to the cytotoxic effects of helanalin was evaluated. L1210 cells, which were more sensitive to helenalin's toxicity, contained lower basal concentrations of GSH. Helenalin decreased the concentration of reduced glutathione in both L1210 and P388 leukemia cells. Concurrent administration of helanalin with agents reported to raise GSH concentrations did not substantially effect GSH levels, nor were survival times of tumor-bearing mice enhanced. Following intraperitoneal administration of 3 H-plenolin, no radioactive drug and/or metabolite was sequestered in the organs of BDF 1 mice. Approximately 50% of 3 H-plenolin and/or its metabolites were eliminated via urine while lesser amounts of radioactive drug and/or metabolites were eliminated in the feces

  16. Effects of organizational safety practices and perceived safety climate on PPE usage, engineering controls, and adverse events involving liquid antineoplastic drugs among nurses.

    Science.gov (United States)

    DeJoy, David M; Smith, Todd D; Woldu, Henok; Dyal, Mari-Amanda; Steege, Andrea L; Boiano, James M

    2017-07-01

    Antineoplastic drugs pose risks to the healthcare workers who handle them. This fact notwithstanding, adherence to safe handling guidelines remains inconsistent and often poor. This study examined the effects of pertinent organizational safety practices and perceived safety climate on the use of personal protective equipment, engineering controls, and adverse events (spill/leak or skin contact) involving liquid antineoplastic drugs. Data for this study came from the 2011 National Institute for Occupational Safety and Health (NIOSH) Health and Safety Practices Survey of Healthcare Workers which included a sample of approximately 1,800 nurses who had administered liquid antineoplastic drugs during the past seven days. Regression modeling was used to examine predictors of personal protective equipment use, engineering controls, and adverse events involving antineoplastic drugs. Approximately 14% of nurses reported experiencing an adverse event while administering antineoplastic drugs during the previous week. Usage of recommended engineering controls and personal protective equipment was quite variable. Usage of both was better in non-profit and government settings, when workers were more familiar with safe handling guidelines, and when perceived management commitment to safety was higher. Usage was poorer in the absence of specific safety handling procedures. The odds of adverse events increased with number of antineoplastic drugs treatments and when antineoplastic drugs were administered more days of the week. The odds of such events were significantly lower when the use of engineering controls and personal protective equipment was greater and when more precautionary measures were in place. Greater levels of management commitment to safety and perceived risk were also related to lower odds of adverse events. These results point to the value of implementing a comprehensive health and safety program that utilizes available hazard controls and effectively communicates

  17. Comparison of new nitrosoureas esters with modified steroidal nucleus for cytogenetic and antineoplastic activity.

    Science.gov (United States)

    Hussein, A; Mioglou-Kalouptsi, E; Papageorgiou, A; Karapidaki, I; Iakovidou-Kritsi, Z; Lialiaris, T; Xrysogelou, E; Camoutsis, C; Mourelatos, D

    2007-01-01

    Nitrosourea is decomposed under physiological conditions to react with biological macromolecules by two mechanisms: alkylation (with proteins and nucleic acids) and carbamoylation (with proteins but not nucleic acids). It has been suggested that the alkylating action is responsible for the therapeutic effects of nitrosoureas, and that the carbamoylation activity leads to toxicity effects. In order to reduce systemic toxicity and improve specificity and distribution for cancer therapy, 2-haloethyl nitrosourea has been esterified with modified steroids, which are used as biological platforms for transporting the alkylating agent to the tumor site in a specific manner. The cytogenetic and antineoplastic effect were studied of seven newly synthesized esters of N,N-bis(2-chloroethyl)alanyl carboxyl derivatives with a modified steroidal nucleus (compounds 1-7). As a very sensitive indicator of genotoxicity the Sister Chromatid Exchange (SCE) assay was used and as a valuable marker of cytostatic activity the cell Proliferation Rate Index (PRI) in cultures of normal human lymphocytes was used. The order of magnitude of the cytogenetic activity on a molar basis (15, 30, 120 microM) of the compounds was 7>6>3>5>2>4>1. The most active compound 7 has an enlarged (seven carbon atoms) A ring modified with a lactam group (-NHCO-) with the nitrosourea moiety esterified at position 17 In the group of seven substances a correlation was observed between the magnitude of SCE response and the depression in PRI (r=-O, 65, p6>2>5>4>3>1 and on lympocytic P388 leukemia cells is 7>2>6>5>4>3>1. The present results are in agreement with previous suggestions that the effectiveness in cytogenetic activity may well be correlated with antitumor effects [T/C: 248% for the compound 7 in 250 mg/kg b.w.; T/C: mean survival time of drug-treated animals (T) (excluding long term survivals) vs. corn-oil-treated controls (C)].

  18. Radiobiological studies on the importance of tumor oxygenation for anti-neoplastic therapy

    International Nuclear Information System (INIS)

    Grau, C.

    1994-01-01

    The aim of the twelve studies included in the present thesis was to determine the importance of hypoxia for various anti-neoplastic treatment modalities, and to evaluate possible ways of overcoming the hypoxia problem by combined modality therapy. The murine tumor systems were the C3H mammary carcinoma with 5-12% hypoxic cells, and the SCCVII squamous cell carcinoma with 2% hypoxic cells. The radiation response was significantly improved by the use of hypoxic cell radiosensitizers such as nimorazole or misonidazole, or by allowing the mice to breathe oxygen or carbogen during irradiation. In contrast, the radiation response was significantly impaired by carbon monoxide breathing at a level comparable to what has been observed in heavy smokers. The clamped TCD 50 assay was used to classify cancer chemotherapeutic drugs according to their preferential cytotoxicity towards the different tumor subpopulations. Methotrexate had no effect on hypoxic cells and was only borderline toxic towards aerobic cells. Three drugs had significant effect against oxic cells only (5-fluorouracil, bleomycin and cisplatin). Similarly, three drugs were toxic towards hypoxic cells only (etoposide, carmustine, and mitomycin c). Three drugs were effective towards both cell types (vincristine, adriamycin, cyclophosphamide). Hypoxic cells in areas with insufficient blood supply, poor nutrition and increased acidity is known to be highly sensitive to hyperthermia. In a study where cisplatin, heat and x-rays were given together, the local tumor control was not improved when compared to radiation + heat, apparently due to a lack of enhancement in the killing of hypoxic cells. These studies have demonstrated the influence of tumor oxygenation on tumor response to treatment with drugs, hyperthermia and irradiation. New strategies targeted also against perfusion-limited hypoxia is needed. One of the most important conclusions from the present thesis can be implemented without expensive trials or

  19. Antineoplastic treatment effect on bone mineral density in Mexican breast cancer patients

    International Nuclear Information System (INIS)

    Monroy-Cisneros, Karina; Esparza-Romero, Julián; Valencia, Mauro E.; Guevara-Torres, Alfonso G.; Méndez-Estrada, Rosa O.; Anduro-Corona, Iván; Astiazarán-García, Humberto

    2016-01-01

    Breast cancer is the most deadly malignancy in Mexican women. Although treatment has improved, it may significantly affect bone mineral status in those who receive it. The aim of this study was to assess the impact of cancer treatment on bone mineral density (BMD) and bone mineral content (BMC), in patients with breast cancer and explore the interaction of menopausal status and clinical stage with cancer treatment on such changes. A quasi-experimental design was applied with measurements before and after a chemotherapy treatment in 40 patients with primary diagnosis of invasive breast cancer. BMD and body composition measurements were taken by dual X-ray absorptiometry (DXA) and changes in these variables due to therapy were analyzed using mixed regression for repeated measurements. Significant loss was found in femoral neck and L2-L4 BMD (p < 0.001). Patients diagnosed with osteopenia or osteoporosis received calcium + vitamin D supplementation (600 mg/200 IU day). It showed a protective effect in the decrease of femoral neck BMD and total BMC. BMD loss in both femoral neck and L2-L4 BMD was higher in premenopausal women: 0.023 g/cm 2 in femoral neck and 0.063 g/cm 2 in L2-L4 (p < 0.001), while in postmenopausal women BMD loss was 0.015 g/cm 2 in femoral neck and 0.035 g/cm 2 in L2-L4 (p = 0.021 and p = 0.001 respectively). Change in lumbar spine BMD was prominent in premenopausal women with advanced clinical stage (IIB, IIIA, IIIB): 0.066 g/cm 2 (p = 0.003). The antineoplastic breast cancer treatment with chemotherapy had a negative impact on BMD, in premenopausal women overall, although a differential effect was found according to clinical stage and calcium supplementation status

  20. The husk fiber of Cocos nucifera L. (Palmae) is a source of anti-neoplastic activity.

    Science.gov (United States)

    Koschek, P R; Alviano, D S; Alviano, C S; Gattass, C R

    2007-10-01

    In the present study, we investigated the in vitro anti-tumoral activities of fractions from aqueous extracts of the husk fiber of the typical A and common varieties of Cocos nucifera (Palmae). Cytotoxicity against leukemia cells was determined by the 3-[4,5-dimethylthiazol-2-yl]-2,5-diphenyltetrazolium bromide (MTT) assay. Cells (2 x 10(4)/well) were incubated with 0, 5, 50 or 500 microg/mL high- or low-molecular weight fractions for 48 h, treated with MTT and absorbance was measured with an ELISA reader. The results showed that both varieties have almost similar antitumoral activity against the leukemia cell line K562 (60.1 +/- 8.5 and 47.5 +/- 11.9% for the typical A and common varieties, respectively). Separation of the crude extracts with Amicon membranes yielded fractions with molecular weights ranging in size from 1-3 kDa (fraction A) to 3-10 kDa (fraction B) and to more than 10 kDa (fraction C). Cells were treated with 500 microg/mL of these fractions and cytotoxicity was evaluated by MTT. Fractions ranging in molecular weight from 1-10 kDa had higher cytotoxicity. Interestingly, C. nucifera extracts were also active against Lucena 1, a multidrug-resistant leukemia cell line. Their cytotoxicity against this cell line was about 50% (51.9 +/- 3.2 and 56.3 +/- 2.9 for varieties typical A and common, respectively). Since the common C. nucifera variety is extensively cultured in Brazil and the husk fiber is its industrial by-product, the results obtained in the present study suggest that it might be a very inexpensive source of new antineoplastic and anti-multidrug resistant drugs that warrants further investigation.

  1. Use of oral antineoplastic in special situations in a third level hospital: real life results.

    Science.gov (United States)

    Garcia-Muñoz, Carmen; Rodriguez-Quesada, Pedro Pablo; Ferrari-Piquero, José Miguel

    2018-01-01

    To analyse the effectiveness and safety of oral antineoplastic drugs  (ANEOs) that are authorized in special situations in a third-level hospital and to  compare the results obtained with the clinical evidence used for this  authorization. Descriptive observational and retrospective study. We included all  adult patients who started treatment with ANEO in special situations during the  year 2016. We collected demographic, treatment-related and clinical variables  (overall survival (OS), progression-free survival (PFS)). Adverse reactions and  detected interactions were collected. An unadjusted comparison was made  between the results of the available evidence and those of the study patients. 34 patients were treated, 50% were men, the median age was 58  years (38-80) and they presented ECOG 1 in 64.7%. Most of the treated  patients were diagnosed with advanced colorectal cancer, treated with  trifluridine-tipiracil, followed by palbociclib in breast cancer, obtaining results  similar to those of the evidence. The median PFS was 2.8 months (95% CI 0.8- 4.8) and the 8-month SG (95% CI 3.4-12.5) for all patients. 26% of patients  required dose reduction because of treatment toxicity. We found 13 interactions,  which affected 15 patients, only two of category X. The effectiveness of ANEO in special situations in our center is  similar to that of available evidence. The impact on survival is low and adverse  effects are common. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  2. Psidium guajava L. anti-neoplastic effects: induction of apoptosis and cell differentiation.

    Science.gov (United States)

    Bontempo, P; Doto, A; Miceli, M; Mita, L; Benedetti, R; Nebbioso, A; Veglione, M; Rigano, D; Cioffi, M; Sica, V; Molinari, A M; Altucci, L

    2012-02-01

    Curative properties of medicinal plants such as Psidium guajava L. (Myrtaceae) have often been indicated by epidemiological studies on populations in which these fruits are consumed daily. However, complete characterization of the active principles responsible for this ability has never been performed. Here, we have characterized P. guajava's anti-cancer potential and identified the parts of the fruit involved in its anti-neoplastic action. We studied morphology of our cells, cell cycle characteristics and apoptosis and performed immunostaining, differentiation and western blot analyses. We report that the P. guajava extract exerted anti-cancer control on both haematological and solid neoplasias. P. guajava extract's anti-tumour properties were found to be tightly bound to induction of apoptosis and differentiation. Use of ex vivo myeloid leukaemia blasts corroborated that P. guajava was able to induce cell death but did not exhibit anti-cancer effects on all malignant cells investigated, indicating selective activity against certain types of tumour. Analyses of P. guajava pulp, peel and seeds identified the pulp as being the most relevant component for causing cell cycle arrest and apoptosis, whereas peel was responsible for causing cell differentiation. P. guajava itself and its pulp-derived extract were found to induce apoptosis accompanied by caspase activation and p16, p21, Fas ligand (FASL TNF super-family, member 6), Bcl-2-associated agonist of cell death (BAD) and tumour necrosis factor receptor super-family, member 10b (DR5), overexpression. Our findings showed that P. guajava L. extract was able to exert anti-cancer activity on cultures in vitro and ex vivo, supporting the hypothesis of its anti malignant pro-apoptotic modulation. © 2011 Blackwell Publishing Ltd.

  3. Oral antineoplastic agent interactions with medicinal plants and food: an issue to take into account.

    Science.gov (United States)

    Collado-Borrell, Roberto; Escudero-Vilaplana, Vicente; Romero-Jiménez, Rosa; Iglesias-Peinado, Irene; Herranz-Alonso, Ana; Sanjurjo-Sáez, María

    2016-11-01

    To review interactions between oral antineoplastic agents (OAAs) for the treatment of solid and hematological tumors and common food and medicinal plants. All potential interactions between OAAs, medicinal plants and food were reviewed. OAAs were considered to be drugs for oral administration that have direct antitumor activity and were approved by the European Medicines Agency in April 2015. We performed the literature search in Pubmed(®) considering only medicinal plants and food. In addition, available data were analyzed from each OAA in secondary data sources taken from Thomson Micromedex(®) and Lexi-comp(®), as well as in the summary of product characteristics. Fifty-eight OAAs were analyzed. We found interactions in 60.3 % of OAAs. Those with most interactions described were: imatinib and procarbazine (4 interactions) and erlotinib, vemurafenib, pomalidomide, medroxyprogesterone and methotrexate (3 interactions). We found 39 interactions (74.4 % important). St. John's wort was the medicinal plant with most interactions (92.6 % were considered important). The rest were: important (ginseng-imatinib, methotrexate-cola and tobacco-erlotinib and tobacco-pomalidomide) and moderate (caffeine-vemurafenib/medroxyprogesterone, medroxyprogesterone-ruxolitinib/St. John's wort, garlic-anagrelide and ginseng-procarbazine). Twenty-six interactions (61.5 % important). Grapefruit had most interactions (82.4 % were considered important). The rest were: important (alcohol-procarbazine) and moderate (dairy-estramustine, methotrexate-ethanol, procarbazine-tyramine, vitamin A-tretinoin/bexarotene and grapefruit-bexarotene/etoposide/sunitinib). A review of interactions of medicinal plants and food should be taken into account in the management of OAAs, since more than half have interactions with MPs and food, of which 70.3 % are considered important. The most relevant are HSJ, grapefruit, ginseng and tobacco. This review is intended to serve as a support to all healthcare

  4. To Take or Not to Take With Meals? Unraveling Issues Related to Food Effects Labeling for Oral Antineoplastic Drugs.

    Science.gov (United States)

    Deng, Jiexin; Brar, Satjit S; Lesko, Lawrence J

    2017-12-02

    There has been controversy regarding whether bioavailability of certain oral oncology drugs should be maximized by taking these medications with food, irrespective of label instructions in the dosing and administration section. To provide insight into this controversy, we conducted an in-depth analysis for oral antineoplastic drugs approved by the Food and Drug Administration in 2000-2016 and identified important issues influencing food labeling decisions. Furthermore, a case study involving sonidegib, a drug approved for locally advanced basal cell carcinoma with a significant food effect on exposure, was used to demonstrate the consequences of failure to adhere to food label recommendations using drug-specific population pharmacokinetic and exposure-toxicity models. In 2000-2009, 80% (4 out of 5) of all approved oral antineoplastics with increased bioavailability in the fed state were labeled as "take on empty stomach." In contrast, we found that in 2010-2016 there is a greater diversity in food recommendations for drugs with increased bioavailability in the fed state. Currently, many oral oncology drugs are given with food to maximize their bioavailability; however, as seen from our case study of sonidegib, failure to fully adhere to label recommendations to either take with food or not could lead to adverse consequences in terms of safety and efficacy. © 2017, The American College of Clinical Pharmacology.

  5. Preliminary screening of some traditional Zulu medicinal plants for antineoplastic activities versus the HepG2 cell line.

    Science.gov (United States)

    Opoku, A R; Geheeb-Keller, M; Lin, J; Terblanche, S E; Hutchings, A; Chuturgoon, A; Pillay, D

    2000-11-01

    Aqueous and methanol extracts of nine traditional Zulu medicinal plants, Cissus quandrangularis L., Cyphostemma flaviflorum (Sprague) Descoings, Cyphostemma lanigerum (Harv.) Descoings ex Wild & Drum, Cyphostemma natalitium (Szyszyl.) J. v. d. Merwe, Cyphostemma sp., Rhoicissus digitata (L. F.) Gilg & Brandt, Rhoicissus rhomboidea (E. Mey. Ex harv.) Planch, Rhoicissus tomentosa (Lam.) Wild & Drum, R. tridentata (L. F.) Wild & Drum and Rhoicissus tridentata (L. F.) Wild & Drum subsp. cuneifolia (Eckl. & Zeyh.) N. R. Urton, all belonging to the Vitaceae family, were evaluated to determine their therapeutic potentials as antineoplastic agents. The antiproliferative activity in vitro against HepG2 cells was determined. Twenty-two of the twenty-seven crude plant extracts showed activities ranging from 25% to 97% inhibition of proliferation when compared with the control which showed no inhibitory activity. Higher degrees of growth inhibition were found in aqueous root extracts in comparison with the methanol extracts of the same plant parts. The results show potential antineoplastic activity, indicating some scientific validation for traditional usage. Copyright 2000 John Wiley & Sons, Ltd.

  6. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  7. Integrative review of factors related to the nursing diagnosis nausea during antineoplastic chemotherapy.

    Science.gov (United States)

    Moysés, Aline Maria Bonini; Durant, Lais Corsino; Almeida, Ana Maria de; Gozzo, Thais de Oliveira

    2016-10-10

    to identify factors related to the nursing diagnosis nausea among cancer patients undergoing chemotherapy. integrative review conducted in four electronic databases (PUBMED, EMBASE, CINAHL and LILACS) using the key words: neoplasia, antineoplastic agents and nausea. only 30 out of 1,258 papers identified met the inclusion criteria. The most frequent related factors were: being younger than 50 years old, motion sickness, being a woman, emetogenic potential of the chemotherapy, anxiety, conditioned stimulus, and expecting nausea after treatment. this review's findings, coupled with the incidence of nausea among cancer patients undergoing chemotherapy, reveal an important difference between evidence found and that used by NANDA International, Inc. Even though it provides an appropriate definition of related factors, it does not mention chemotherapy, despite the various studies addressing the topic using different designs and presenting various objectives and outcomes. identificar os fatores relacionados ao diagnóstico de enfermagem náusea entre pacientes oncológicos durante o tratamento quimioterápico. revisão integrativa de quatro bases eletrônicas de dados (PUBMED, EMBASE, CINAHL e LILACS) com as palavras-chaves neoplasia, agentes antineoplásicos e náusea. dos 1258 artigos identificados, somente 30 atenderam aos critérios de inclusão. Os fatores relacionados mais frequentes foram: idade abaixo de 50 anos, doença do movimento, sexo feminino, potencial emético do quimioterápico, ansiedade, estímulo condicionado e expectativa de náuseas depois do tratamento. diante dos resultados encontrados e da incidência de náusea entre os pacientes oncológicos em tratamento quimioterápico, observa-se diferença importante entre as evidências encontradas e as utilizadas pela NANDA International, Inc. Apesar da definição estar adequada entre os fatores relacionados, não há menção à quimioterapia mesmo com inúmeros estudos, com diferentes delineamentos

  8. Bringing Radiotracing to Titanium-Based Antineoplastics: Solid Phase Radiosynthesis, PET and ex Vivo Evaluation of Antitumor Agent [45Ti](salan)Ti(dipic)

    DEFF Research Database (Denmark)

    Severin, Gregory; Nielsen, Carsten H.; Jensen, Andreas Tue Ingemann

    2015-01-01

    We present a novel solid-phase based 45Ti radiolabeling methodology and the implementation of 45Ti-PET in titanium-based antineoplastics using the showcase compound [45Ti](salan)Ti(dipic). This development is intended to allow elucidation of the biodistribution and pharmacokinetics of promising new...

  9. Postulating a dermal pathway for exposure to anti-neoplastic drugs among hospital workers. Applying a conceptual model to the results of three workplace surveys

    NARCIS (Netherlands)

    Kromhout, H.; Hoek, F.; Uitterhoeve, R.; Huijbers, R.; Overmars, R.F.; Anzion, R.; Vermeulen, R.

    2000-01-01

    Dermal exposure to anti-neoplastic drugs has been suggested as a potentially important route of exposure of hospital workers. Three small-scale workplace surveys were carried out in several hospitals focusing on contamination by leakage from IV infusion systems; contamination by spilled urine of

  10. The Hepatoprotection Provided by Taurine and Glycine against Antineoplastic Drugs Induced Liver Injury in an Ex Vivo Model of Normothermic Recirculating Isolated Perfused Rat Liver

    Directory of Open Access Journals (Sweden)

    Reza Heidari

    2016-03-01

    Full Text Available Taurine (2-aminoethane sulfonic acid is a non-protein amino acid found in high concentration in different tissues. Glycine (Amino acetic acid is the simplest amino acid incorporated in the structure of proteins. Several investigations indicate the hepatoprotective properties of these amino acids. On the other hand, antineoplastic agents-induced serum transaminase elevation and liver injury is a clinical complication. The current investigation was designed to screen the possible hepatoprotective properties of taurine and glycine against antineoplastic drugs-induced hepatic injury in an ex vivo model of isolated perfused rat liver. Rat liver was perfused with different concentration (10 μM, 100 μM and 1000 μM of antineoplastic drugs (Mitoxantrone, Cyclophosphamide, Cisplatin, 5 Fluorouracil, Doxorubicin and Dacarbazine via portal vein. Taurine and glycine were administered to drug-treated livers and liver perfusate samples were collected for biochemical measurements (ALT, LDH, AST, and K+. Markers of oxidative stress (reactive oxygen species formation, lipid peroxidation, total antioxidant capacity and glutathione were also assessed in liver tissue. Antineoplastic drugs caused significant pathological changes in perfusate biochemistry. Furthermore, markers of oxidative stress were significantly elevated in drug treated livers. It was found that taurine (5 and 10 mM and glycine (5 and 10 mM administration significantly mitigated the biomarkers of liver injury and attenuated drug induced oxidative stress. Our data indicate that taurine and glycine supplementation might help as potential therapeutic options to encounter anticancer drugs-induced liver injury.

  11. Immunochemical protocols

    National Research Council Canada - National Science Library

    Pound, John D

    1998-01-01

    ... easy and important refinements often are not published. This much anticipated 2nd edition of Immunochemzcal Protocols therefore aims to provide a user-friendly up-to-date handbook of reliable techniques selected to suit the needs of molecular biologists. It covers the full breadth of the relevant established immunochemical methods, from protein blotting and immunoa...

  12. Near-infrared fluorescence imaging and photodynamic therapy with indocyanine green lactosome has antineoplastic effects for hepatocellular carcinoma.

    Directory of Open Access Journals (Sweden)

    Takumi Tsuda

    Full Text Available Anticancer agents and operating procedures have been developed for hepatocellular carcinoma (HCC patients, but their prognosis remains poor. It is necessary to develop novel diagnostic and therapeutic strategies for HCC to improve its prognosis. Lactosome is a core-shell-type polymeric micelle, and enclosing labeling or anticancer agents into this micelle enables drug delivery. In this study, we investigated the diagnostic and therapeutic efficacies of indocyanine green (ICG-loaded lactosome for near-infrared fluorescence (NIF imaging and photodynamic therapy (PDT for HCC.The human HCC cell line HuH-7 was treated with ICG or ICG-lactosome, followed by PDT, and the cell viabilities were measured (in vitro PDT efficiency. For NIF imaging, HuH-7 cells were subcutaneously transplanted into BALB/c nude mice, followed by intravenous administration of ICG or ICG-lactosome. The transplanted animals were treated with PDT, and the antineoplastic effects were analyzed (in vivo PDT efficiency.PDT had toxic effects on HuH-7 cells treated with ICG-lactosome, but not ICG alone. NIF imaging revealed that the fluorescence of tumor areas in ICG-lactosome-treated animals was higher than that of contralateral regions at 24 h after injection and thereafter. PDT exerted immediate and continuous phototoxic effects in the transplanted mice treated with ICG-lactosome.Our results demonstrate that ICG-lactosome accumulated in xenograft tumors, and that PDT had antineoplastic effects on these malignant implants. NIF imaging and PDT with ICG-lactosome could be useful diagnostic and/or therapeutic strategies for HCC.

  13. Antineoplastic Activities of MT81 and Its Structural Analogue in Ehrlich Ascites Carcinoma-Bearing Swiss Albino Mice

    Directory of Open Access Journals (Sweden)

    Sujata Maiti Choudhury

    2010-01-01

    Full Text Available Many fungal toxins exhibit in vitro and in vivo antineoplastic effects on various cancer cell types. Luteoskyrin, a hydroxyanthraquinone has been proved to be a potent inhibitor against Ehrlich ascites tumor cells. The comparative antitumor activity and antioxidant status of MT81 and its structural analogue [Acetic acid-MT81 (Aa-MT81] having polyhydroxyanthraquinone structure were assessed against Ehrlich ascites carcinoma (EAC tumor in mice. The in vitro cytotoxicity was measured by the viability of EAC cells after direct treatment of the said compounds. In in vivo study, MT81 and its structural analogue were administered (i.p. at the two different doses (5, 7 mg MT81; 8.93, 11.48 mg Aa-MT81/kg body weight for 7 days after 24 hrs. of tumor inoculation. The activities were assessed using mean survival time (MST, increased life span (ILS, tumor volume, viable tumor cell count, peritoneal cell count, protein percentage and hematological parameters. Antioxidant status was determined by malondialdehyde (MDA and reduced glutathione (GSH content, and by the activity of superoxide dismutase (SOD and catalase (CA T. MT81 and its structural analogues increased the mean survival time, normal peritoneal cell count. They decreased the tumor volume, viable tumor cell count, hemoglobin percentage and packed cell volume. Differential counts of WBC, total counts of RBC & WBC that altered by EAC inoculation, were restored in a dose-dependent manner. Increased MDA and decreased GSH content and reduced activity of SOD, and catalase in EAC bearing mice were returned towards normal after the treatment of MT81 and its structural analogue. Being less toxic than parent toxin MT81, the structural analogue showed more prominent antineoplastic activities against EAC cells compared to MT81. At the same time, both compounds exhibit to some extent antioxidant potential for the EAC-bearing mice.

  14. Study protocol

    DEFF Research Database (Denmark)

    Smith, Benjamin E; Hendrick, Paul; Bateman, Marcus

    2017-01-01

    avoidance behaviours, catastrophising, self-efficacy, sport and leisure activity participation, and general quality of life. Follow-up will be 3 and 6 months. The analysis will focus on descriptive statistics and confidence intervals. The qualitative components will follow a thematic analysis approach....... DISCUSSION: This study will evaluate the feasibility of running a definitive large-scale trial on patients with patellofemoral pain, within the NHS in the UK. We will identify strengths and weaknesses of the proposed protocol and the utility and characteristics of the outcome measures. The results from...... this study will inform the design of a multicentre trial. TRIAL REGISTRATION: ISRCTN35272486....

  15. Synthesis and Anchoring of Antineoplastic Ferrocene and Phthalocyanine Derivatives on Water-Soluble Polymeric Drug Carriers Derived from Lysine and Aspartic Acid

    OpenAIRE

    Maree, M. David; Neuse, Eberhard W.; Erasmus, Elizabeth; Swarts, Jannie C.

    2007-01-01

    The general synthetic strategy towards water-soluble biodegradable drug carriers and the properties that they must have are discussed. The syntheses of water-soluble biodegradable copolymers of lysine and aspartic acid as potential drug-delivering devices, having amine-functionalised side chains are then described. Covalent anchoring of carboxylic acid derivatives of the antineoplastic ferrocene and photodynamically active phthalocyanine moieties to the amine-containing drug carrier copolymer...

  16. Accelerator mass spectrometry analysis of 14C-oxaliplatin concentrations in biological samples and 14C contents in biological samples and antineoplastic agents

    Science.gov (United States)

    Toyoguchi, Teiko; Kobayashi, Takeshi; Konno, Noboru; Shiraishi, Tadashi; Kato, Kazuhiro; Tokanai, Fuyuki

    2015-10-01

    Accelerator mass spectrometry (AMS) is expected to play an important role in microdose trials. In this study, we measured the 14C concentration in 14C-oxaliplatin-spiked serum, urine and supernatant of fecal homogenate samples in our Yamagata University (YU) - AMS system. The calibration curves of 14C concentration in serum, urine and supernatant of fecal homogenate were linear (the correlation coefficients were ⩾0.9893), and the precision and accuracy was within the acceptance criteria. To examine a 14C content of water in three vacuum blood collection tubes and a syringe were measured. 14C was not detected from water in these devices. The mean 14C content in urine samples of 6 healthy Japanese volunteers was 0.144 dpm/mL, and the intra-day fluctuation of 14C content in urine from a volunteer was little. The antineoplastic agents are administered to the patients in combination. Then, 14C contents of the antineoplastic agents were quantitated. 14C contents were different among 10 antineoplastic agents; 14C contents of paclitaxel injection and docetaxel hydrate injection were higher than those of the other injections. These results indicate that our quantitation method using YU-AMS system is suited for microdosing studies and that measurement of baseline and co-administered drugs might be necessary for the studies in low concentrations.

  17. Accelerator mass spectrometry analysis of "1"4C-oxaliplatin concentrations in biological samples and "1"4C contents in biological samples and antineoplastic agents

    International Nuclear Information System (INIS)

    Toyoguchi, Teiko; Kobayashi, Takeshi; Konno, Noboru; Shiraishi, Tadashi; Kato, Kazuhiro; Tokanai, Fuyuki

    2015-01-01

    Accelerator mass spectrometry (AMS) is expected to play an important role in microdose trials. In this study, we measured the "1"4C concentration in "1"4C-oxaliplatin-spiked serum, urine and supernatant of fecal homogenate samples in our Yamagata University (YU) – AMS system. The calibration curves of "1"4C concentration in serum, urine and supernatant of fecal homogenate were linear (the correlation coefficients were ⩾0.9893), and the precision and accuracy was within the acceptance criteria. To examine a "1"4C content of water in three vacuum blood collection tubes and a syringe were measured. "1"4C was not detected from water in these devices. The mean "1"4C content in urine samples of 6 healthy Japanese volunteers was 0.144 dpm/mL, and the intra-day fluctuation of "1"4C content in urine from a volunteer was little. The antineoplastic agents are administered to the patients in combination. Then, "1"4C contents of the antineoplastic agents were quantitated. "1"4C contents were different among 10 antineoplastic agents; "1"4C contents of paclitaxel injection and docetaxel hydrate injection were higher than those of the other injections. These results indicate that our quantitation method using YU-AMS system is suited for microdosing studies and that measurement of baseline and co-administered drugs might be necessary for the studies in low concentrations.

  18. Accelerator mass spectrometry analysis of {sup 14}C-oxaliplatin concentrations in biological samples and {sup 14}C contents in biological samples and antineoplastic agents

    Energy Technology Data Exchange (ETDEWEB)

    Toyoguchi, Teiko, E-mail: tteiko@med.id.yamagata-u.ac.jp [Department of Pharmacy, Yamagata University Hospital, 2-2-2 Iida-Nishi, Yamagata-shi, Yamagata 990-9585 (Japan); Kobayashi, Takeshi; Konno, Noboru; Shiraishi, Tadashi [Department of Pharmacy, Yamagata University Hospital, 2-2-2 Iida-Nishi, Yamagata-shi, Yamagata 990-9585 (Japan); Kato, Kazuhiro; Tokanai, Fuyuki [Department of Physics, Faculty of Science, Yamagata University, 1-4-12 Kojirakawa-machi, Yamagata-shi, Yamagata 990-8560 (Japan)

    2015-10-15

    Accelerator mass spectrometry (AMS) is expected to play an important role in microdose trials. In this study, we measured the {sup 14}C concentration in {sup 14}C-oxaliplatin-spiked serum, urine and supernatant of fecal homogenate samples in our Yamagata University (YU) – AMS system. The calibration curves of {sup 14}C concentration in serum, urine and supernatant of fecal homogenate were linear (the correlation coefficients were ⩾0.9893), and the precision and accuracy was within the acceptance criteria. To examine a {sup 14}C content of water in three vacuum blood collection tubes and a syringe were measured. {sup 14}C was not detected from water in these devices. The mean {sup 14}C content in urine samples of 6 healthy Japanese volunteers was 0.144 dpm/mL, and the intra-day fluctuation of {sup 14}C content in urine from a volunteer was little. The antineoplastic agents are administered to the patients in combination. Then, {sup 14}C contents of the antineoplastic agents were quantitated. {sup 14}C contents were different among 10 antineoplastic agents; {sup 14}C contents of paclitaxel injection and docetaxel hydrate injection were higher than those of the other injections. These results indicate that our quantitation method using YU-AMS system is suited for microdosing studies and that measurement of baseline and co-administered drugs might be necessary for the studies in low concentrations.

  19. Medicinal electronomics bricolage design of hypoxia-targeting antineoplastic drugs and invention of boron tracedrugs as innovative future-architectural drugs.

    Science.gov (United States)

    Hori, Hitoshi; Uto, Yoshihiro; Nakata, Eiji

    2010-09-01

    We describe herein for the first time our medicinal electronomics bricolage design of hypoxia-targeting antineoplastic drugs and boron tracedrugs as newly emerging drug classes. A new area of antineoplastic drugs and treatments has recently focused on neoplastic cells of the tumor environment/microenvironment involving accessory cells. This tumor hypoxic environment is now considered as a major factor that influences not only the response to antineoplastic therapies but also the potential for malignant progression and metastasis. We review our medicinal electronomics bricolage design of hypoxia-targeting drugs, antiangiogenic hypoxic cell radiosensitizers, sugar-hybrid hypoxic cell radiosensitizers, and hypoxia-targeting 10B delivery agents, in which we design drug candidates based on their electronic structures obtained by molecular orbital calculations, not based solely on pharmacophore development. These drugs include an antiangiogenic hypoxic cell radiosensitizer TX-2036, a sugar-hybrid hypoxic cell radiosensitizer TX-2244, new hypoxia-targeting indoleamine 2,3-dioxygenase (IDO) inhibitors, and a hypoxia-targeting BNCT agent, BSH (sodium borocaptate-10B)-hypoxic cytotoxin tirapazamine (TPZ) hybrid drug TX-2100. We then discuss the concept of boron tracedrugs as a new drug class having broad potential in many areas.

  20. Beyond protocols

    DEFF Research Database (Denmark)

    Vanderhoeven, Sonia; Branquart, Etienne; Casaer, Jim

    2017-01-01

    Risk assessment tools for listing invasive alien species need to incorporate all available evidence and expertise. Beyond the wealth of protocols developed to date, we argue that the current way of performing risk analysis has several shortcomings. In particular, lack of data on ecological impact...... information on risk and the exploration of improved methods for decision making on biodiversity management. This is crucial for efficient conservation resource allocation and uptake by stakeholders and the public......., transparency and repeatability of assessments as well as the incorporation of uncertainty should all be explicitly considered. We recommend improved quality control of risk assessments through formalized peer review with clear feedback between assessors and reviewers. Alternatively, a consensus building...

  1. Evaluation of Oral Mucositis Occurrence in Oncologic Patients under Antineoplastic Therapy Submitted to the Low-Level Laser Coadjuvant Therapy.

    Science.gov (United States)

    Leite Cavalcanti, Alessandro; José de Macêdo, Dário; Suely Barros Dantas, Fernanda; Dos Santos Menezes, Karla; Filipe Bezerra Silva, Diego; Alves de Melo Junior, William; Fabia Cabral Cavalcanti, Alidianne

    2018-04-24

    Low-level laser therapy has been widely used in treating many conditions, including oral mucositis. The purpose of this study was to evaluate the occurrence of oral mucositis in patients undergoing antineoplastic therapy submitted to preventive and therapeutic treatment with low-level laser therapy. This cross-sectional study was carried out with 51 children and adolescents of both sexes with malignant neoplasias who developed oral mucositis and underwent low-level laser therapy. Data were collected on sex, age, type and degree of neoplasia, region affected, and remission time. 64.7% of the patients were male and were between 3 and 6 years of age (39.2%). Acute lymphoid leukemia was the most frequent neoplasm (37.3%). Regarding the maximum oral mucositis, grade 2 (41.2%) was predominant, with jugal mucosa (29.9%) and tongue (17.7%) being the most affected regions. The majority of cases presented lesion remission time between 4 and 7 days (44.0%). Most patients were young, male, and diagnosed with acute lymphoid leukemia. Predominance of grade 2 oral mucositis was observed, with jugal mucosa and tongue being the most affected regions, with the majority of cases presenting lesion remission time between 4 and 7 days. Low-level laser therapy has been shown to be an essential therapy in the prevention and treatment of these lesions, since it is a non-invasive and low-cost method.

  2. Evaluation of Oral Mucositis Occurrence in Oncologic Patients under Antineoplastic Therapy Submitted to the Low-Level Laser Coadjuvant Therapy

    Directory of Open Access Journals (Sweden)

    Alessandro Leite Cavalcanti

    2018-04-01

    Full Text Available Low-level laser therapy has been widely used in treating many conditions, including oral mucositis. The purpose of this study was to evaluate the occurrence of oral mucositis in patients undergoing antineoplastic therapy submitted to preventive and therapeutic treatment with low-level laser therapy. This cross-sectional study was carried out with 51 children and adolescents of both sexes with malignant neoplasias who developed oral mucositis and underwent low-level laser therapy. Data were collected on sex, age, type and degree of neoplasia, region affected, and remission time. 64.7% of the patients were male and were between 3 and 6 years of age (39.2%. Acute lymphoid leukemia was the most frequent neoplasm (37.3%. Regarding the maximum oral mucositis, grade 2 (41.2% was predominant, with jugal mucosa (29.9% and tongue (17.7% being the most affected regions. The majority of cases presented lesion remission time between 4 and 7 days (44.0%. Most patients were young, male, and diagnosed with acute lymphoid leukemia. Predominance of grade 2 oral mucositis was observed, with jugal mucosa and tongue being the most affected regions, with the majority of cases presenting lesion remission time between 4 and 7 days. Low-level laser therapy has been shown to be an essential therapy in the prevention and treatment of these lesions, since it is a non-invasive and low-cost method.

  3. Concanavalin A: A potential anti-neoplastic agent targeting apoptosis, autophagy and anti-angiogenesis for cancer therapeutics

    International Nuclear Information System (INIS)

    Li, Wen-wen; Yu, Jia-ying; Xu, Huai-long; Bao, Jin-ku

    2011-01-01

    Highlights: → ConA induces cancer cell death targeting apoptosis and autophagy. → ConA inhibits cancer cell angiogenesis. → ConA is utilized in pre-clinical and clinical trials. -- Abstract: Concanavalin A (ConA), a Ca 2+ /Mn 2+ -dependent and mannose/glucose-binding legume lectin, has drawn a rising attention for its remarkable anti-proliferative and anti-tumor activities to a variety of cancer cells. ConA induces programmed cell death via mitochondria-mediated, P73-Foxo1a-Bim apoptosis and BNIP3-mediated mitochondrial autophagy. Through IKK-NF-κB-COX-2, SHP-2-MEK-1-ERK, and SHP-2-Ras-ERK anti-angiogenic pathways, ConA would inhibit cancer cell survival. In addition, ConA stimulates cell immunity and generates an immune memory, resisting to the same genotypic tumor. These biological findings shed light on new perspectives of ConA as a potential anti-neoplastic agent targeting apoptosis, autophagy and anti-angiogenesis in pre-clinical or clinical trials for cancer therapeutics.

  4. Antineoplastic activity of the DNA methyltransferase inhibitor 5-aza-2′-deoxycytidine in anaplastic large cell lymphoma

    Science.gov (United States)

    Hassler, Melanie R.; Klisaroska, Aleksandra; Kollmann, Karoline; Steiner, Irene; Bilban, Martin; Schiefer, Ana-Iris; Sexl, Veronika; Egger, Gerda

    2012-01-01

    DNA methylation is an epigenetic mechanism establishing long-term gene silencing during development and cell commitment, which is maintained in subsequent cell generations. Aberrant DNA methylation is found at gene promoters in most cancers and can lead to silencing of tumor suppressor genes. The DNA methyltransferase inhibitor 5-aza-2′-deoxycytidine (5-aza-CdR) is able to reactivate genes silenced by DNA methylation and has been shown to be a very potent epigenetic drug in several hematological malignancies. In this report, we demonstrate that 5-aza-CdR exhibits high antineoplastic activity against anaplastic large cell lymphoma (ALCL), a rare CD30 positive non-Hodgkin lymphoma of T-cell origin. Low dose treatment of ALCL cell lines and xenografted tumors causes apoptosis and cell cycle arrest in vitro and in vivo. This is also reflected in genome-wide expression analyses, where genes related to apoptosis and cell death are amongst the most affected targets of 5-aza-CdR. Furthermore, we observed demethylation and re-expression of p16INK4A after drug administration and senescence associated β-galactosidase activity. Thus, our data provide evidence that 5-aza-CdR is highly efficient against ALCL and warrants further clinical evaluation for future therapeutic use. PMID:22687603

  5. Organotypic Culture of Breast Tumor Explants as a Multicellular System for the Screening of Natural Compounds with Antineoplastic Potential

    Directory of Open Access Journals (Sweden)

    Irma Edith Carranza-Torres

    2015-01-01

    Full Text Available Breast cancer is the leading cause of death in women worldwide. The search for novel compounds with antitumor activity, with less adverse effects and higher efficacy, and the development of methods to evaluate their toxicity is an area of ​​intense research. In this study we implemented the preparation and culture of breast tumor explants, which were obtained from precision-cut breast tumor slices. In order to validate the model we are proposing to screen antineoplastic effect of natural compounds, we selected caffeic acid, ursolic acid, and rosmarinic acid. Using the Krumdieck tissue slicer, precision-cut tissue slices were prepared from breast cancer samples; from these slices, 4 mm explants were obtained and incubated with the selected compounds. Viability was assessed by Alamar Blue assay, LDH release, and histopathological criteria. Results showed that the viability of the explants cultured in the presence of paclitaxel (positive control decreased significantly (P<0.05; however, tumor samples responded differently to each compound. When the explants were coincubated with paclitaxel and compounds, a synergic effect was observed. This study shows that ex vivo culture of breast cancer explants offers a suitable alternative model for evaluating natural or synthetic compounds with antitumor properties within the complex microenvironment of the tumor.

  6. Antioxidants impair anti-tumoral effects of Vorinostat, but not anti-neoplastic effects of Vorinostat and caspase-8 downregulation.

    Science.gov (United States)

    Bergadà, Laura; Yeramian, Andree; Sorolla, Annabel; Matias-Guiu, Xavier; Dolcet, Xavier

    2014-01-01

    We have recently demonstrated that histone deacetylase inhibitor, Vorinostat, applied as a single therapy or in combination with caspase-8 downregulation exhibits high anti-tumoral activity on endometrial carcinoma cell lines. In the present study, we have assessed the signalling processes underlying anti-tumoral effects of Vorinostat. Increasing evidence suggests that reactive oxygen species are responsible for histone deacetylase inhibitor-induced cell killing. We have found that Vorinostat induces formation of reactive oxygen species and DNA damage. To investigate the role of oxidative stress as anti-neoplastic mechanism, we have evaluated the effects of different antioxidants (Bha, Nac and Tiron) on endometrial carcinoma cell line Ishikawa treated with Vorinostat. We show that Bha, Nac and Tiron markedly inhibited the cytotoxic effects of Vorinostat, increasing cell viability in vitro. We found that all three antioxidants did not inhibited accumulation of acetyl Histone H4, so that antioxidants did not inhibit Vorinostat activity. Finally, we have evaluated the effects of antioxidants on anti-tumoral activity of Vorinostat as monotherapy or in combination with caspase-8 downregulation in vivo. Interestingly, antioxidants blocked the reduction of tumour growth caused by Vorinostat, but they were unable to inhibit anti-tumoral activity of Vorinostat plus caspase-8 inhibition.

  7. Evaluation of real-time data obtained from gravimetric preparation of antineoplastic agents shows medication errors with possible critical therapeutic impact: Results of a large-scale, multicentre, multinational, retrospective study.

    Science.gov (United States)

    Terkola, R; Czejka, M; Bérubé, J

    2017-08-01

    Medication errors are a significant cause of morbidity and mortality especially with antineoplastic drugs, owing to their narrow therapeutic index. Gravimetric workflow software systems have the potential to reduce volumetric errors during intravenous antineoplastic drug preparation which may occur when verification is reliant on visual inspection. Our aim was to detect medication errors with possible critical therapeutic impact as determined by the rate of prevented medication errors in chemotherapy compounding after implementation of gravimetric measurement. A large-scale, retrospective analysis of data was carried out, related to medication errors identified during preparation of antineoplastic drugs in 10 pharmacy services ("centres") in five European countries following the introduction of an intravenous workflow software gravimetric system. Errors were defined as errors in dose volumes outside tolerance levels, identified during weighing stages of preparation of chemotherapy solutions which would not otherwise have been detected by conventional visual inspection. The gravimetric system detected that 7.89% of the 759 060 doses of antineoplastic drugs prepared at participating centres between July 2011 and October 2015 had error levels outside the accepted tolerance range set by individual centres, and prevented these doses from reaching patients. The proportion of antineoplastic preparations with deviations >10% ranged from 0.49% to 5.04% across sites, with a mean of 2.25%. The proportion of preparations with deviations >20% ranged from 0.21% to 1.27% across sites, with a mean of 0.71%. There was considerable variation in error levels for different antineoplastic agents. Introduction of a gravimetric preparation system for antineoplastic agents detected and prevented dosing errors which would not have been recognized with traditional methods and could have resulted in toxicity or suboptimal therapeutic outcomes for patients undergoing anticancer treatment.

  8. Cell-based laboratory evaluation of coagulation activation by antineoplastic drugs for the treatment of lymphoid tumors

    Directory of Open Access Journals (Sweden)

    Misae Tsunaka

    2016-07-01

    Full Text Available Objectives: Combining vorinostat, L-asparaginase, and doxorubicin (Dox led to improved response rates in the treatment of lymphoid tumors. However, deep-vein thrombosis has been noted as one of the most serious side effects with these drugs, and how these regimens cause deep-vein thrombosis is unclear. Methods: We investigated the procoagulant effects of vorinostat, L-asparaginase, and doxorubicin in lymphoid tumors, focusing on tissue factor, phosphatidylserine, and antithrombin. The human vascular endothelial cell line EAhy926 as well as the lymphoid neoplastic cell lines HUT78 (cutaneous T-cell lymphoma, Molt4 (acute T-lymphoblastic leukemia, and Ramos (Burkitt lymphoma were employed to investigate these procoagulant effects. Results: Vorinostat, L-asparaginase, and doxorubicin induced exposure of phosphatidylserine and procoagulant activity on the surface of lymphoid tumor cells. Vorinostat and doxorubicin also induced phosphatidylserine exposure and increased procoagulant activity on EAhy926 cells. Expression of tissue factor antigen was induced by doxorubicin on the surface of each type of cells, whereas expression of tissue factor mRNA was unchanged. Secretion of antithrombin from HepG2 cells was reduced only by L-asparaginase. Conclusion: These data suggest that vorinostat and doxorubicin may induce procoagulant activity in vessels through apoptosis of tumor cells and through phosphatidylserine exposure and/or tissue factor expression on vascular endothelial cells. L-asparaginase may induce a thrombophilic state by reducing the secretion of anticoagulant proteins such as antithrombin. The laboratory methods described here could be useful to evaluate the procoagulant effects of antineoplastic drugs.

  9. Parallel screening of FDA-approved antineoplastic drugs for identifying sensitizers of TRAIL-induced apoptosis in cancer cells

    International Nuclear Information System (INIS)

    Taylor, David J; Parsons, Christine E; Han, Haiyong; Jayaraman, Arul; Rege, Kaushal

    2011-01-01

    Tumor Necrosis Factor-α Related Apoptosis Inducing Ligand (TRAIL) and agonistic antibodies to death receptor 4 and 5 are promising candidates for cancer therapy due to their ability to induce apoptosis selectively in a variety of human cancer cells, while demonstrating little cytotoxicity in normal cells. Although TRAIL and agonistic antibodies to DR4 and DR5 are considered safe and promising candidates in cancer therapy, many malignant cells are resistant to DR-mediated, TRAIL-induced apoptosis. In the current work, we screened a small library of fifty-five FDA and foreign-approved anti-neoplastic drugs in order to identify candidates that sensitized resistant prostate and pancreatic cancer cells to TRAIL-induced apoptosis. FDA-approved drugs were screened for their ability to sensitize TRAIL resistant prostate cancer cells to TRAIL using an MTT assay for cell viability. Analysis of variance was used to identify drugs that exhibited synergy with TRAIL. Drugs demonstrating the highest synergy were selected as leads and tested in different prostate and pancreatic cancer cell lines, and one immortalized human pancreatic epithelial cell line. Sequential and simultaneous dosing modalities were investigated and the annexin V/propidium iodide assay, in concert with fluorescence microscopy, was employed to visualize cells undergoing apoptosis. Fourteen drugs were identified as having synergy with TRAIL, including those whose TRAIL sensitization activities were previously unknown in either prostate or pancreatic cancer cells or both. Five leads were tested in additional cancer cell lines of which, doxorubicin, mitoxantrone, and mithramycin demonstrated synergy in all lines. In particular, mitoxantrone and mithramycin demonstrated significant synergy with TRAIL and led to reduction of cancer cell viability at concentrations lower than 1 μM. At these low concentrations, mitoxantrone demonstrated selectivity toward malignant cells over normal pancreatic epithelial cells

  10. Parallel screening of FDA-approved antineoplastic drugs for identifying sensitizers of TRAIL-induced apoptosis in cancer cells

    Directory of Open Access Journals (Sweden)

    Taylor David J

    2011-11-01

    Full Text Available Abstract Background Tumor Necrosis Factor-α Related Apoptosis Inducing Ligand (TRAIL and agonistic antibodies to death receptor 4 and 5 are promising candidates for cancer therapy due to their ability to induce apoptosis selectively in a variety of human cancer cells, while demonstrating little cytotoxicity in normal cells. Although TRAIL and agonistic antibodies to DR4 and DR5 are considered safe and promising candidates in cancer therapy, many malignant cells are resistant to DR-mediated, TRAIL-induced apoptosis. In the current work, we screened a small library of fifty-five FDA and foreign-approved anti-neoplastic drugs in order to identify candidates that sensitized resistant prostate and pancreatic cancer cells to TRAIL-induced apoptosis. Methods FDA-approved drugs were screened for their ability to sensitize TRAIL resistant prostate cancer cells to TRAIL using an MTT assay for cell viability. Analysis of variance was used to identify drugs that exhibited synergy with TRAIL. Drugs demonstrating the highest synergy were selected as leads and tested in different prostate and pancreatic cancer cell lines, and one immortalized human pancreatic epithelial cell line. Sequential and simultaneous dosing modalities were investigated and the annexin V/propidium iodide assay, in concert with fluorescence microscopy, was employed to visualize cells undergoing apoptosis. Results Fourteen drugs were identified as having synergy with TRAIL, including those whose TRAIL sensitization activities were previously unknown in either prostate or pancreatic cancer cells or both. Five leads were tested in additional cancer cell lines of which, doxorubicin, mitoxantrone, and mithramycin demonstrated synergy in all lines. In particular, mitoxantrone and mithramycin demonstrated significant synergy with TRAIL and led to reduction of cancer cell viability at concentrations lower than 1 μM. At these low concentrations, mitoxantrone demonstrated selectivity toward

  11. The DOMUS study protocol

    DEFF Research Database (Denmark)

    Nordly, Mie; Benthien, Kirstine Skov; Von Der Maase, Hans

    2014-01-01

    be a powerful tool to improve patients' quality of life and support family/caregivers during the disease trajectory. The present study offers a model for achieving optimal delivery of palliative care in the patient's preferred place of care and attempt to clarify challenges. TRIAL REGISTRATION: Clinicaltrials......BACKGROUND: The focus of Specialized Palliative Care (SPC) is to improve care for patients with incurable diseases and their families, which includes the opportunity to make their own choice of place of care and ultimately place of death. The Danish Palliative Care Trial (DOMUS) aims to investigate...... psychological intervention for patients and caregivers at home or b) standard care alone. Inclusion criteria are incurable cancer with no or limited antineoplastic treatment options. DISCUSSION: Programs that facilitate transition from hospital treatment to SPC at home for patients with incurable cancer can...

  12. ET-09DECOY OLIGONUCLEOTIDE DERIVED FROM MGMT ENHANCER HAS AN ANTINEOPLASTIC ACTIVITY IN-VITRO AND IN-VIVO

    Science.gov (United States)

    Canello, Tamar; Ovadia, Haim; Refael, Miri; Zrihan, Daniel; Siegal, Tali; Lavon, Iris

    2014-01-01

    INTRODUCTION: Silencing of O(6)-methylguanine-DNA-methyltransferase (MGMT) in tumors, correlates with a better therapeutic response and with increased survival. Our previous results demonstrated the pivotal role of NF-kappaB in MGMT expression, mediated mainly through binding of p65/NF-kappaB homodimers to the non-canonical NF-KappaB motif (MGMT-kappaB1) within MGMT enhancer. METHODS AND RESULTS: In an attempt to attenuate the transcription activity of MGMT in tumors we designed locked nucleic acids (LNA) modified decoy oligonucleotides corresponding to the specific sequence of MGMT-kappaB1 (MGMT-kB1-LODN). Following confirmation of the ability of MGMT-kB1-LODN to interfere with the binding of p65/NF-kappaB to MGMT enhancer, the potential of the MGMT-kB1-LODN to enhance cell killing was studied in vitro in two glioma cell lines (T98G and U87) and a melanoma cell line (A375P). All three cell lines manifested a significant enhanced cell killing effect following exposure to temozolomide (TMZ) when first transfected with MGMT-kb1-LODN, and also induced a significant cell killing when administered as monotherapy. These results were confirmed also in-vivo on A375P Melanoma xenografts. Intratumoral (Intralesional - IL) injection of MGMT-kB1-LODN with or without IP injection of TMZ induced significant tumor growth inhibition either as a monotherapy or in combination with TMZ. The long-term effect of MGMT-kB1-LODN monotherapy was evaluated using a repetitive IL injection every 4 to 5 days for 55 days with either MGMT-κB1 LODN or control ODN or vehicle. A significant difference (p < 0.01) in tumor volume was obtained by MGMT-κB1-LODN compared to both control groups. Moreover, two out of the seven mice treated with MGMT-κB1-LODN demonstrated tumor regression by day 55 and no tumor recurrence was observed five months later. CONCLUSION: The results of these experiments show that the MGMT-kB1-LODN has a substantial antineoplastic effect when used either in combination with

  13. Antineoplastic-related cardiotoxicity, morphofunctional aspects in a murine model: contribution of the new tool 2D-speckle tracking

    Directory of Open Access Journals (Sweden)

    Coppola C

    2016-11-01

    Full Text Available Carmela Coppola,1 Gennaro Riccio,1 Antonio Barbieri,2 Maria Gaia Monti,3 Giovanna Piscopo,1 Domenica Rea,2 Claudio Arra,2 Carlo Maurea,1 Claudia De Lorenzo,4,5 Nicola Maurea1 1Division of Cardiology, Istituto Nazionale per lo Studio e la Cura dei Tumori “Fondazione G. Pascale”, IRCCS, Naples, Italy; 2Animal Facility Unit, Department of Experimental Oncology, Istituto Nazionale per lo Studio e la Cura dei Tumori “Fondazione G. Pascale”, IRCCS, Naples, Italy; 3Department of Translational Medical Sciences, University Federico II, Naples, Italy; 4Department of Molecular Medicine and Medical Biotechnology, University Federico II, Naples, Italy; 5CEINGE Biotecnologie Avanzate, Naples, Italy Objective: Considering that global left ventricular systolic radial strain is a sensitive technique for the early detection of left ventricular dysfunction due to antineoplastics and the analysis of segmental myocardial contractility, we evaluated this technique for early detection of trastuzumab-related cardiotoxicity by comparing it with cardiac structural damage.Methods: Groups of six mice were injected with trastuzumab or doxorubicin, used either as single agents or in combination. Cardiac function was evaluated by transthoracic echocardiography measurements before and after treatment for 2 or 7 days, by using a Vevo 2100 high-resolution imaging system. After echocardiography, mice were euthanized, and hearts were processed for histological evaluations, such as cardiac fibrosis, apoptosis, capillary density, and inflammatory response.Results: Trastuzumab-related cardiotoxicity was detected early by 2D strain imaging. Radial strain was reduced after 2 days in mice treated with trastuzumab alone (21.2%±8.0% vs 40.5%±4.8% sham; P<0.01. Similarly, trastuzumab was found to induce apoptosis, capillary density reduction, and inflammatory response in cardiac tissue after 2 days of treatment, in a fashion similar to doxorubicin. On the contrary, fractional

  14. The anti-neoplastic activity of Vandetanib against high-risk medulloblastoma variants is profoundly enhanced by additional PI3K inhibition.

    Science.gov (United States)

    Craveiro, Rogerio B; Ehrhardt, Michael; Velz, Julia; Olschewski, Martin; Goetz, Barbara; Pietsch, Torsten; Dilloo, Dagmar

    2017-07-18

    Medulloblastoma is comprised of at least four molecular subgroups with distinct clinical outcome (WHO classification 2016). SHH-TP53-mutated as well as MYC-amplified Non-WNT/Non-SHH medulloblastoma show the worst prognosis.Here we present evidence that single application of the multi-kinase inhibitor Vandetanib displays anti-neoplastic efficacy against cell lines derived from high-risk SHH-TP53-mutated and MYC-amplified Non-WNT/Non-SHH medulloblastoma. The narrow target spectrum of Vandetanib along with a favourable toxicity profile renders this drug ideal for multimodal treatment approaches. In this context our investigation documents that Vandetanib in combination with the clinically available PI3K inhibitor GDC-0941 leads to enhanced cytotoxicity against MYC-amplified and SHH-TP53-mutated medulloblastoma. In line with these findings we show for MYC-amplified medulloblastoma a profound reduction in activity of the oncogenes STAT3 and AKT. Furthermore, we document that Vandetanib and the standard chemotherapeutic Etoposide display additive anti-neoplastic efficacy in the investigated medulloblastoma cell lines that could be further enhanced by PI3K inhibition. Of note, the combination of Vandetanib, GDC-0941 and Etoposide results in MYC-amplified and SHH-TP53-mutated cell lines in complete loss of cell viability. Our findings therefore provide a rational to further evaluate Vandetanib in combination with PI3K inhibitors as well as standard chemotherapeutics in vivo for the treatment of most aggressive medulloblastoma variants.

  15. Vertical Protocol Composition

    DEFF Research Database (Denmark)

    Groß, Thomas; Mödersheim, Sebastian Alexander

    2011-01-01

    The security of key exchange and secure channel protocols, such as TLS, has been studied intensively. However, only few works have considered what happens when the established keys are actually used—to run some protocol securely over the established “channel”. We call this a vertical protocol.......e., that the combination cannot introduce attacks that the individual protocols in isolation do not have. In this work, we prove a composability result in the symbolic model that allows for arbitrary vertical composition (including self-composition). It holds for protocols from any suite of channel and application...

  16. Vitamin E succinate is a potent novel antineoplastic agent with high selectivity and cooperativity with tumor necrosis factor-related apoptosis-inducing ligand (Apo2 ligand) in vivo

    Czech Academy of Sciences Publication Activity Database

    Weber, T.; Lu, M.; Anděra, Ladislav; Lahm, H.; Gellert, N.; Fariss, M. W.; Kořínek, Vladimír; Sattler, W.; Ucker, D. S.; Terman, A.; Schroder, A.; Erl, W.; Brunk, U. T.; Coffey, R. J.; Weber, C.; Neuzil, J.

    2002-01-01

    Roč. 8, - (2002), s. 863-869 ISSN 1078-0432 R&D Projects: GA ČR GA312/99/0348 Institutional research plan: CEZ:AV0Z5052915 Keywords : Vitamin E, Antineoplastic Agent, Tumor Necrosis Factor Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 5.991, year: 2002

  17. The Antineoplastic Effect of Nitric Oxide-Donating Acetylsalicylic Acid (NO-ASA) in Chronic Lymphocytic Leukemia (CLL) Cells is Highly Dependent on its Positional Isomerism.

    Science.gov (United States)

    Gehrke, Iris; Razavi, Regina; Poll-Wolbeck, Simon Jonas; Berkessel, Albrecht; Hallek, Michael; Kreuzer, Karl-Anton

    2011-10-01

    Chronic Lymphocytic Leukemia (CLL) is not curable in patients that are not eligible for allogeneic stem cell transplantation. Therefore, new treatment options are highly desirable. Chemically modified nonsteroidal anti-inflammatory drugs (NSAIDs), such as nitric-oxide-donating acetylsalicylic acid (NO-ASA), have been described to possess antineoplastic capacity. Recently, we could demonstrate a potent apoptosis induction in primary CLL cells in vitro and tumor growth inhibition by para-NO-ASA in a xenograft mouse model. However, little is known about the impact of positional isomerism of NO-ASA on its antineoplastic capacity in CLL. Primary CLL cells were treated with the meta-or para-isomer of NO-ASA at varying concentrations and durations. Viability was assessed flow cytometrically by annexin V-FITC/PI staining and by CellTiter-Glo luminescence cell viability assay. Caspase and PARP cleavage as well as involvement of β-catenin/Lef-1 signaling was determined by immunoblotting. For caspase inhibition, BD™ ApoBlock was used. Nude mice were xenografted with JVM3 cells and treated with meta-NO-ASA, para-NO-ASA or vehicle control. The meta-isomer was entirely ineffective in inducing CLL cell apoptosis in concentrations up to 100 μM, while para-NO-ASA acted in the low micromolar range. meta-NO-ASA, in contrast to para-NO-ASA, did not alter caspase activity. While para-NO-ASA action involved inhibition of β-catenin/Lef-1 signaling, meta-NO-ASA did not show any impact on this signaling pathway. Further, meta-NO-ASA did not significantly reduce tumor growth in a CLL xenograft mouse model, while para-NO-ASA was highly potent. We conclude that positional isomerism is crucial for the antineoplastic effect of NO-ASA in CLL. It can be suggested that the para-isomer, but not the meta-isomer, generates a chemical structure which is essential for the neoplastic effect of NO-ASA.

  18. The French dosimetry protocol

    International Nuclear Information System (INIS)

    Dutreix, A.

    1985-01-01

    After a general introduction the protocol is divided in five sections dealing with: determination of the quality of X-ray, γ-ray and electron beams; the measuring instrument; calibration of the reference instrument; determination of the reference absorbed dose in the user's beams; determination of the absorbed dose in water at other points, in other conditions. The French protocol is not essentially different from the Nordic protocol and it is based on the experience gained in using both the American and the Nordic protocols. Therefore, only the main difference with the published protocols are discussed. (Auth.)

  19. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and a...... Generator framework based on the LySatool and a translator from the LySa language into C or Java....... necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation...

  20. Biological activity of some novel synthesized 2-(4-methylbenzenesulphonamidopentanedioic acid bis amide derivatives: In vitro and in vivo antineoplastic activity

    Directory of Open Access Journals (Sweden)

    Satyajit Dutta

    2014-12-01

    Full Text Available In the present work few novel 2-(4-methylbenzenesulphonamidopentanedioic acid bis amide derivatives and the basic compound 2-(4-methylphenylsulfonamidopentanedioic acid have been synthesized, characterized and screened for their possible antineoplastic activity both in vitro and in vivo. The in vitro activity was performed against five human cell lines like human breast cancer (MCF-7, leukemia (K-562, ovarian cancer (OVACAR-3, human colon adenocarcinoma (HT-29 and Human kidney carcinoma (A-498. The in vivo activity was performed in female swiss albino mice against Ehrlich ascites carcinoma (EAC. Among the synthesized compounds, ureide, anilide, p-nitoanilide and o-bromoanilide derivatives of 2-(4-methyl benzene sulphonyl-pentanedioic acid bis amides showed encouraging activity in both the in vitro and in vivo compared to other compounds.

  1. Uncaria tomentosa exerts extensive anti-neoplastic effects against the Walker-256 tumour by modulating oxidative stress and not by alkaloid activity.

    Directory of Open Access Journals (Sweden)

    Arturo Alejandro Dreifuss

    Full Text Available This study aimed to compare the anti-neoplastic effects of an Uncaria tomentosa (UT brute hydroethanolic (BHE extract with those of two fractions derived from it. These fractions are choroformic (CHCl3 and n-butanolic (BuOH, rich in pentacyclic oxindole alkaloids (POA and antioxidant substances, respectively. The cancer model was the subcutaneous inoculation of Walker-256 tumour cells in the pelvic limb of male Wistar rat. Subsequently to the inoculation, gavage with BHE extract (50 mg.kg(-1 or its fractions (as per the yield of the fractioning process or vehicle (Control was performed during 14 days. Baseline values, corresponding to individuals without tumour or treatment with UT, were also included. After treatment, tumour volume and mass, plasma biochemistry, oxidative stress in liver and tumour, TNF-α level in liver and tumour homogenates, and survival rates were analysed. Both the BHE extract and its BuOH fraction successfully reduced tumour weight and volume, and modulated anti-oxidant systems. The hepatic TNF-α level indicated a greater effect from the BHE extract as compared to its BuOH fraction. Importantly, both the BHE extract and its BuOH fraction increased the survival time of the tumour-bearing animals. Inversely, the CHCl3 fraction was ineffective. These data represent an in vivo demonstration of the importance of the modulation of oxidative stress as part of the anti-neoplastic activity of UT, as well as constitute evidence of the lack of activity of isolated POAs in the primary tumour of this tumour lineage. These effects are possibly resulting from a synergic combination of substances, most of them with antioxidant properties.

  2. Measurement of surface contamination by certain antineoplastic drugs using high-performance liquid chromatography: applications in occupational hygiene investigations in hospital environments.

    Science.gov (United States)

    Rubino, F M; Floridia, L; Pietropaolo, A M; Tavazzani, M; Colombi, A

    1999-01-01

    Within the context of continuing interest in occupational hygiene of hospitals as workplaces, the authors report the results of a preliminary study on surface contamination by certain antineoplastic drugs (ANDs), recently performed in eight cancer departments of two large general hospitals in Milan, Italy. Since reliable quantitative information on the exposure levels to individual drugs is mandatory to establish a strong interpretative framework for correctly assessing the health risks associated with manipulation of ANDs and rationally advise intervention priorities for exposure abatement, two automated analytical methods were set up using reverse-phase high-performance liquid chromatography for the measurement of contamination by 1) methotrexate (MTX) and 2) the three most important nucleoside analogue antineoplastic drugs (5-fluorouracil 5FU, Cytarabin CYA, Gemcytabin GCA) on surfaces such as those of preparation hoods and work-benches in the pharmacies of cancer wards. The methods are characterized by short analysis time (7 min) under isocratic conditions, by the use of a mobile phase with a minimal content of organic solvent and by high sensitivity, adequate to detect surface contamination in the 5-10 micrograms/m2 range. To exemplify the performance of the analytical methods in the assessment of contamination levels from the target analyte ANDs, data are reported on the contamination levels measured on various surfaces (such as on handles, floor surfaces and window panes, even far from the preparation hood). Analyte concentrations corresponding to 0.8-1.5 micrograms of 5FU were measured on telephones, 0.85-28 micrograms/m2 of CYA were measured on tables, 1.2-1150 micrograms/m2 of GCA on furniture and floors. Spillage fractions between 1-5% of the used ANDs (daily use 5FU 7-13 g; CYA 0.1-7.1 g; GCA 0.2-5 g) were measured on the disposable polythene-backed paper cover sheet of the preparation hood.

  3. Network protocols and sockets

    OpenAIRE

    BALEJ, Marek

    2010-01-01

    My work will deal with network protocols and sockets and their use in programming language C#. It will therefore deal programming network applications on the platform .NET from Microsoft and instruments, which C# provides to us. There will describe the tools and methods for programming network applications, and shows a description and sample applications that work with sockets and application protocols.

  4. Histological vis-a-vis biochemical assessment on the toxic level and antineoplastic efficacy of a synthetic drug Pt-ATP on experimental animal models.

    Science.gov (United States)

    Pal, Shipra; Sadhu, Arpita Sengupta; Patra, Swarup; Mukherjea, Kalyan K

    2008-11-12

    Cisplatin, a platinum based anticancer drug has played a vital role in the treatment of cancers by chemical agents, but in view of the serious toxicity including nephrotoxicity of cisplatin, various other platinum based drugs have been synthesized and screened to overcome its toxicity. A Pt-ATP compound was prepared in our laboratory hoping to have reduced or no toxicity along with the potentiality of reducing neoplasm growth. A Pt-ATP compound was prepared. It was first screened for its antineoplastic efficacy. Confirming that, subsequent experiments were carried on to test its toxicity on animals, viz. Albino Swiss mice. The animals were randomly divided into four sets--Set I: Erhlich Ascites Carcinoma (EAC) challenged mice; Set II: Normal mice; Set III: Drug treated mice, Set IVA Cisplatin (CDDP) treated mice, Set IV B EAC challenged Cisplatin treated mice. Set I was used to test antineoplasticity of the drug, Set II and Set III for studying drug toxicity and Set IV was treated with CDDP. Set II was used as a control. Animals were sacrificed after 5 days, 10 days 15 days and 20 days of drug administration on the 6th, 11th, 16th and 21st days respectively for Set I, II and III. Set IVA was sacrificed only on the 16th day and Set IV B on 6th and 11th days. For Set I only tumor cell count and packed cell volume (PCV) of tumor cells were recorded. For Set II and III, aspartate aminotransferase (AST), alanine aminotransferase (ALT) assays were done using serum while blood creatinine and creatine were assayed from blood filtrate. For cytotoxicity assessment liver, spleen and kidney tissues were collected and subjected to scanning electron microscopy (SEM) after extensive treatment. Set IV A was only studied for the biochemical parameters viz. aspartate aminotransferase (AST), alanine aminotransferase (ALT) assays were done using serum while blood creatinine and creatine were assayed from blood filtrate. Set IV B was studied for tumor cell count after treatment with

  5. Cellular uptake mechanism and comparative evaluation of antineoplastic effects of paclitaxel–cholesterol lipid emulsion on triple-negative and non-triple-negative breast cancer cell lines

    Directory of Open Access Journals (Sweden)

    Ye J

    2016-08-01

    Full Text Available Jun Ye,1,2 Xuejun Xia,1,2 Wujun Dong,1,2 Huazhen Hao,1,2 Luhua Meng,1,2 Yanfang Yang,1,2 Renyun Wang,1,2 Yuanfeng Lyu,3 Yuling Liu1,2 1State Key Laboratory of Bioactive Substance and Function of Natural Medicines, 2Beijing Key Laboratory of Drug Delivery Technology and Novel Formulation, Institute of Materia Medica, Chinese Academy of Medical Sciences, Peking Union Medical College, Beijing, 3School of Pharmacy, China Pharmaceutical University, Nanjing, People’s Republic of China Abstract: There is no effective clinical therapy for triple-negative breast cancers (TNBCs, which have high low-density lipoprotein (LDL requirements and express relatively high levels of LDL receptors (LDLRs on their membranes. In our previous study, a novel lipid emulsion based on a paclitaxel–cholesterol complex (PTX-CH Emul was developed, which exhibited improved safety and efficacy for the treatment of TNBC. To date, however, the cellular uptake mechanism and intracellular trafficking of PTX-CH Emul have not been investigated. In order to offer powerful proof for the therapeutic effects of PTX-CH Emul, we systematically studied the cellular uptake mechanism and intracellular trafficking of PTX-CH Emul and made a comparative evaluation of antineoplastic effects on TNBC (MDA-MB-231 and non-TNBC (MCF7 cell lines through in vitro and in vivo experiments. The in vitro antineoplastic effects and in vivo tumor-targeting efficiency of PTX-CH Emul were significantly more enhanced in MDA-MB-231-based models than those in MCF7-based models, which was associated with the more abundant expression profile of LDLR in MDA-MB-231 cells. The results of the cellular uptake mechanism indicated that PTX-CH Emul was internalized into breast cancer cells through the LDLR-mediated internalization pathway via clathrin-coated pits, localized in lysosomes, and then released into the cytoplasm, which was consistent with the internalization pathway and intracellular trafficking of native

  6. Active vitamin D potentiates the anti-neoplastic effects of calcium in the colon: A cross talk through the calcium-sensing receptor.

    Science.gov (United States)

    Aggarwal, Abhishek; Höbaus, Julia; Tennakoon, Samawansha; Prinz-Wohlgenannt, Maximilian; Graça, João; Price, Sally A; Heffeter, Petra; Berger, Walter; Baumgartner-Parzer, Sabina; Kállay, Enikö

    2016-01-01

    Epidemiological studies suggest an inverse correlation between dietary calcium (Ca(2+)) and vitamin D intake and the risk of colorectal cancer (CRC). It has been shown in vitro that the active vitamin D metabolite, 1,25-dihydroxyvitamin D3 (1,25-D3) can upregulate expression of the calcium-sensing receptor (CaSR). In the colon, CaSR has been suggested to regulate proliferation of colonocytes. However, during tumorigenesis colonic CaSR expression is downregulated and we hypothesized that the loss of CaSR could influence the anti-tumorigenic effects of Ca(2+) and vitamin D. Our aim was to assess the impact of CaSR expression and function on the anti-neoplastic effects of 1,25-D3 in colon cancer cell lines. We demonstrated that in the healthy colon of mice, high vitamin D diet (2500 IU/kg diet) increased expression of differentiation and apoptosis markers, decreased expression of proliferation markers and significantly upregulated CaSR mRNA expression, compared with low vitamin D diet (100 IU/kg diet). To determine the role of CaSR in this process, we transfected Caco2-15 and HT29 CRC cells with wild type CaSR (CaSR-WT) or a dominant negative CaSR mutant (CaSR-DN) and treated them with 1,25-D3 alone, or in combination with CaSR activators (Ca(2+) and NPS R-568). 1,25-D3 enhanced the anti-proliferative effects of Ca(2+) and induced differentiation and apoptosis only in cells with a functional CaSR, which were further enhanced in the presence of NPS R-568, a positive allosteric modulator of CaSR. The mutant CaSR inhibited the anti-tumorigenic effects of 1,25-D3 suggesting that the anti-neoplastic effects of 1,25-D3 are, at least in part, mediated by the CaSR. Taken together, our data provides molecular evidence to support the epidemiological observation that both, vitamin D and calcium are needed for protection against malignant transformation of the colon and that their effect is modulated by the presence of a functional CaSR. This article is part of a Special Issue

  7. Dexamethasone-(C21-phosphoramide)-[anti-EGFR]: molecular design, synthetic organic chemistry reactions, and antineoplastic cytotoxic potency against pulmonary adenocarcinoma (A549).

    Science.gov (United States)

    Coyne, Cody P; Narayanan, Lakshmi

    2016-01-01

    Corticosteroids are effective in the management of a variety of disease states, such as several forms of neoplasia (leukemia and lymphoma), autoimmune conditions, and severe inflammatory responses. Molecular strategies that selectively "target" delivery of corticosteroids minimize or prevents large amounts of the pharmaceutical moiety from passively diffusing into normal healthy cell populations residing within tissues and organ systems. The covalent immunopharmaceutical, dexamethasone-(C21-phosphoramide)-[anti-EGFR] was synthesized by reacting dexamethasone-21-monophosphate with a carbodiimide reagent to form a dexamethasone phosphate carbodiimide ester that was subsequently reacted with imidazole to create an amine-reactive dexamethasone-(C21-phosphorylimidazolide) intermediate. Monoclonal anti-EGFR immunoglobulin was combined with the amine-reactive dexamethasone-(C21-phosphorylimidazolide) intermediate, resulting in the synthesis of the covalent immunopharmaceutical, dexamethasone-(C21-phosphoramide)-[anti-EGFR]. Following spectrophotometric analysis and validation of retained epidermal growth factor receptor type 1 (EGFR)-binding avidity by cell-ELISA, the selective anti-neoplasic cytotoxic potency of dexamethasone-(C21-phosphoramide)-[anti-EGFR] was established by MTT-based vitality stain methodology using adherent monolayer populations of human pulmonary adenocarcinoma (A549) known to overexpress the tropic membrane receptors EGFR and insulin-like growth factor receptor type 1. The dexamethasone:IgG molar-incorporation-index for dexamethasone-(C21-phosphoramide)-[anti-EGFR] was 6.95:1 following exhaustive serial microfiltration. Cytotoxicity analysis: covalent bonding of dexamethasone to monoclonal anti-EGFR immunoglobulin did not significantly modify the ex vivo antineoplastic cytotoxicity of dexamethasone against pulmonary adenocarcinoma at and between the standardized dexamethasone equivalent concentrations of 10(-9) M and 10(-5) M. Rapid increases in

  8. Protocol Fuel Mix reporting

    International Nuclear Information System (INIS)

    2002-07-01

    The protocol in this document describes a method for an Electricity Distribution Company (EDC) to account for the fuel mix of electricity that it delivers to its customers, based on the best available information. Own production, purchase and sale of electricity, and certificates trading are taken into account. In chapter 2 the actual protocol is outlined. In the appendixes additional (supporting) information is given: (A) Dutch Standard Fuel Mix, 2000; (B) Calculation of the Dutch Standard fuel mix; (C) Procedures to estimate and benchmark the fuel mix; (D) Quality management; (E) External verification; (F) Recommendation for further development of the protocol; (G) Reporting examples

  9. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... instance is terminated prematurely and subsequently iterated. The combined set of leaves from all the tree instances can then be viewed as a graph code, which is decodable using belief propagation. The main design problem is determining the order of splitting, which enables successful decoding as early...

  10. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  11. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  12. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  13. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  14. Prevention of disease progression in a patient with a gastric cancer-re-recurrence. Outcome after intravenous treatment with the novel antineoplastic agent taurolidine. Report of a case

    Directory of Open Access Journals (Sweden)

    Menenakos Charalambos

    2006-06-01

    Full Text Available Abstract Background Taurolidine (TRD is a novel agent with multimodal antineoplastic effects. We present the case of a tumor remission after intravenous administration of taurolidine in a patient with gastric cancer re-recurrence. Case presentation A 58 years old male patient suffering from a gastric adenocarcinoma was submitted to partial gastrectomy and partial liver resection (pT2, pN1, pM1L (liver segment 2, N0, V0. 24 months later a local recurrence was diagnosed and the patient was reoperated. Postoperatively the patient underwent a palliative chemotherapy with eloxatin, FU, and leucovorin. A subsequent CT-revealed a liver metastasis and a recurrence adjacent to the hepatic artery. After successful radiofrequency ablation of the liver metastasis the patient was intravenously treated with 2% taurolidine. The patient endured the therapy well and no toxicity was observed. CT-scans revealed a stable disease without a tumor progression or metastatic spread. After 39 cycles the patient was submitted to left nephrectomy due to primary urothelial carcinoma and died 2 days later due to myocardial infarction. Postmortem histology of the esophageal-jejunal anastomosis and liver revealed complete remission of the known metastasized gastric adenocarcinoma. Conclusion The intravenous treatment with 2% taurolidine led to a histological remission of the tumor growth without any toxicity for the patient.

  15. Necroptosis mediates the antineoplastic effects of the soluble fraction of polysaccharide from red wine in Walker-256 tumor-bearing rats.

    Science.gov (United States)

    Stipp, Maria Carolina; Bezerra, Iglesias de Lacerda; Corso, Claudia Rita; Dos Reis Livero, Francislaine A; Lomba, Luiz Alexandre; Caillot, Adriana Rute Cordeiro; Zampronio, Aleksander Roberto; Queiroz-Telles, José Ederaldo; Klassen, Giseli; Ramos, Edneia A S; Sassaki, Guilherme Lanzi; Acco, Alexandra

    2017-03-15

    Polysaccharides are substances that modify the biological response to several stressors. The present study investigated the antitumor activity of the soluble fraction of polysaccharides (SFP), extracted from cabernet franc red wine, in Walker-256 tumor-bearing rats. The monosaccharide composition had a complex mixture, suggesting the presence of arabinoglactans, mannans, and pectins. Treatment with SFP (30 and 60mg/kg, oral) for 14days significantly reduced the tumor weight and volume compared with controls. Treatment with 60mg/kg SFP reduced blood monocytes and neutrophils, reduced the tumor activity of N-acetylglucosaminidase, myeloperoxidase, and nitric oxide, increased blood lymphocytes, and increased the levels of tumor necrosis factor α (TNF-α) in tumor tissue. Treatment with SFP also induced the expression of the cell necroptosis-related genes Rip1 and Rip3. The antineoplastic effect of SFP appears to be attributable to its action on the immune system by controlling the tumor microenvironment and stimulating TNF-α production, which may trigger the necroptosis pathway. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Omega-3 PUFA Loaded in Resveratrol-Based Solid Lipid Nanoparticles: Physicochemical Properties and Antineoplastic Activities in Human Colorectal Cancer Cells In Vitro

    Directory of Open Access Journals (Sweden)

    Simona Serini

    2018-02-01

    Full Text Available New strategies are being investigated to ameliorate the efficacy and reduce the toxicity of the drugs currently used in colorectal cancer (CRC, one of the most common malignancies in the Western world. Data have been accumulated demonstrating that the antineoplastic therapies with either conventional or single-targeted drugs could take advantage from a combined treatment with omega-3 polyunsaturated fatty acids (omega-3 PUFA. These nutrients, shown to be safe at the dosage generally used in human trials, are able to modulate molecules involved in colon cancer cell growth and survival. They have also the potential to act against inflammation, which plays a critical role in CRC development, and to increase the anti-cancer immune response. In the present study, omega-3 PUFA were encapsulated in solid lipid nanoparticles (SLN having a lipid matrix containing resveratrol esterified to stearic acid. Our aim was to increase the efficiency of the incorporation of these fatty acids into the cells and prevent their peroxidation and degradation. The Resveratrol-based SLN were characterized and investigated for their antioxidant activity. It was observed that the encapsulation of omega-3 PUFA into the SLN enhanced significantly their incorporation in human HT-29 CRC cells in vitro, and their growth inhibitory effects in these cancer cells, mainly by reducing cell proliferation.

  17. Effect of alpha-interferon alone and combined with other antineoplastic agents on renal cell carcinoma determined by the tetrazolium microculture assay.

    Science.gov (United States)

    Homma, Y; Aso, Y

    1994-01-01

    The antiproliferative effect of various alpha-interferons (alpha-IFNs), alone or combined with other agents, on a renal cell carcinoma cell line was evaluated by the tetrazolium microculture assay to examine the rationale for combination therapies. Cells incubated in 96-week microculture plates at 5 x 10(3)/well were exposed to various agents for 3 days. There were no obvious differences in the growth inhibition caused by the 5 kinds of alpha-IFN examined as single agents. The combination of alpha-IFN with the following agents was also assessed: 5-fluorouracil (5FU), methotrexate (MTX), mitomycin C, bleomycin, cis-diaminedichloroplatinum (CDDP), vinblastine, etoposide (ETOP), alpha-IFN, tumor necrosis factor-alpha (TNF), and alpha-difluoromethylornithine. Synergism was observed for the combination of alpha-IFN+TNF, while the other combinations had additive or subadditive effects. No interference or antagonism was found. Trimodal combinations of alpha-IFN+MTX with either 5FU, ETOP, or CDDP all showed subadditive effects. These results indicated that an increased antiproliferative effect, although not necessarily synergistic, was obtained by the combination of alpha-IFN with a variety of antineoplastic agents, providing a rationale to seek for combination therapies including alpha-IFN for treating renal cell carcinoma.

  18. Photo-Fenton and Fenton-like processes for the treatment of the antineoplastic drug 5-fluorouracil under simulated solar radiation.

    Science.gov (United States)

    Koltsakidou, Α; Antonopoulou, M; Sykiotou, M; Εvgenidou, Ε; Konstantinou, I; Lambropoulou, D A

    2017-02-01

    In the present study, photo-Fenton and Fenton-like processes were investigated for the degradation and mineralization of the antineoplastic drug 5-fluorouracil (5-FU). For the optimization of photo-Fenton treatment under simulated solar light (SSL) radiation, the effects of several operating parameters (i.e., 5-FU concentration, Fe 3+ , and oxidant concentration) on the treatment efficiency were studied. According to the results, SSL/[Fe(C 2 Ο 4 ) 3 ] 3- /Η 2 Ο 2 process was the most efficient, since faster degradation of 5-FU and higher mineralization percentages were achieved. All the applied processes followed quite similar transformation routes which include defluorination-hydroxylation as well as pyrimidine ring opening, as demonstrated by the transformation products identified by high resolution mass spectrometry analysis. The toxicity of the treated solutions was evaluated using the Microtox assay. In general, low toxicity was recorded for the initial solution and the solution at the end of the photocatalytic treatment, while an increase in the overall toxicity was observed only at the first stages of SSL/Fe 3+ /Η 2 Ο 2 and SSL/Fe 3+ /S 2 O 8 2- processes.

  19. In silico toxicology protocols.

    Science.gov (United States)

    Myatt, Glenn J; Ahlberg, Ernst; Akahori, Yumi; Allen, David; Amberg, Alexander; Anger, Lennart T; Aptula, Aynur; Auerbach, Scott; Beilke, Lisa; Bellion, Phillip; Benigni, Romualdo; Bercu, Joel; Booth, Ewan D; Bower, Dave; Brigo, Alessandro; Burden, Natalie; Cammerer, Zoryana; Cronin, Mark T D; Cross, Kevin P; Custer, Laura; Dettwiler, Magdalena; Dobo, Krista; Ford, Kevin A; Fortin, Marie C; Gad-McDonald, Samantha E; Gellatly, Nichola; Gervais, Véronique; Glover, Kyle P; Glowienke, Susanne; Van Gompel, Jacky; Gutsell, Steve; Hardy, Barry; Harvey, James S; Hillegass, Jedd; Honma, Masamitsu; Hsieh, Jui-Hua; Hsu, Chia-Wen; Hughes, Kathy; Johnson, Candice; Jolly, Robert; Jones, David; Kemper, Ray; Kenyon, Michelle O; Kim, Marlene T; Kruhlak, Naomi L; Kulkarni, Sunil A; Kümmerer, Klaus; Leavitt, Penny; Majer, Bernhard; Masten, Scott; Miller, Scott; Moser, Janet; Mumtaz, Moiz; Muster, Wolfgang; Neilson, Louise; Oprea, Tudor I; Patlewicz, Grace; Paulino, Alexandre; Lo Piparo, Elena; Powley, Mark; Quigley, Donald P; Reddy, M Vijayaraj; Richarz, Andrea-Nicole; Ruiz, Patricia; Schilter, Benoit; Serafimova, Rositsa; Simpson, Wendy; Stavitskaya, Lidiya; Stidl, Reinhard; Suarez-Rodriguez, Diana; Szabo, David T; Teasdale, Andrew; Trejo-Martin, Alejandra; Valentin, Jean-Pierre; Vuorinen, Anna; Wall, Brian A; Watts, Pete; White, Angela T; Wichard, Joerg; Witt, Kristine L; Woolley, Adam; Woolley, David; Zwickl, Craig; Hasselgren, Catrin

    2018-04-17

    The present publication surveys several applications of in silico (i.e., computational) toxicology approaches across different industries and institutions. It highlights the need to develop standardized protocols when conducting toxicity-related predictions. This contribution articulates the information needed for protocols to support in silico predictions for major toxicological endpoints of concern (e.g., genetic toxicity, carcinogenicity, acute toxicity, reproductive toxicity, developmental toxicity) across several industries and regulatory bodies. Such novel in silico toxicology (IST) protocols, when fully developed and implemented, will ensure in silico toxicological assessments are performed and evaluated in a consistent, reproducible, and well-documented manner across industries and regulatory bodies to support wider uptake and acceptance of the approaches. The development of IST protocols is an initiative developed through a collaboration among an international consortium to reflect the state-of-the-art in in silico toxicology for hazard identification and characterization. A general outline for describing the development of such protocols is included and it is based on in silico predictions and/or available experimental data for a defined series of relevant toxicological effects or mechanisms. The publication presents a novel approach for determining the reliability of in silico predictions alongside experimental data. In addition, we discuss how to determine the level of confidence in the assessment based on the relevance and reliability of the information. Copyright © 2018. Published by Elsevier Inc.

  20. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  1. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  2. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  3. Protocol Monitoring Energy Conservation; Protocol Monitoring Energiebesparing

    Energy Technology Data Exchange (ETDEWEB)

    Boonekamp, P.G.M. [ECN Beleidsstudies, Petten (Netherlands); Mannaerts, H. [Centraal Planburea CPB, Den Haag (Netherlands); Tinbergen, W. [Centraal Bureau voor de Statistiek CBS, Den Haag (Netherlands); Vreuls, H.H.J. [Nederlandse onderneming voor energie en milieu Novem, Utrecht (Netherlands); Wesselink, B. [Rijksinstituut voor Volksgezondheid en Milieuhygiene RIVM, Bilthoven (Netherlands)

    2001-12-01

    On request of the Dutch ministry of Economic Affairs five institutes have collaborated to create a 'Protocol Monitoring Energy Conservation', a common method and database to calculate the amount of energy savings realised in past years. The institutes concerned are the Central Bureau of Statistics (CBS), the Netherlands Bureau for Economic Policy Analysis (CPB), the Energy research Centre of the Netherlands (ECN), the National Agency for Energy and Environment (Novem) and the Netherlands Institute of Public Health and the Environment (RIVM). The institutes have agreed upon a clear definition of energy use and energy savings. The demarcation with renewable energy, the saving effects of substitution between energy carriers and the role of import and export of energy have been elaborated. A decomposition method is used to split up the observed change in energy use in a number of effects, on a national and sectoral level. This method includes an analysis of growth effects, effects of structural changes in production and consumption activities and savings on end use or with more efficient conversion processes. To calculate these effects the total energy use is desegregated as much as possible. For each segment a reference energy use is calculated according to the trend in a variable which is supposed to be representative for the use without savings. The difference with the actual energy use is taken as the savings realised. Results are given for the sectors households, industry, agriculture, services and government, transportation and the energy sector; as well as a national figure. A special feature of the protocol method is the application of primary energy use figures in the determination of savings for end users. This means that the use of each energy carrier is increased with a certain amount, according to the conversion losses caused elsewhere in the energy system. The losses concern the base year energy sector and losses abroad for imports of secondary

  4. Dexamethasone-(C21-phosphoramide-[anti-EGFR]: molecular design, synthetic organic chemistry reactions, and antineoplastic cytotoxic potency against pulmonary adenocarcinoma (A549

    Directory of Open Access Journals (Sweden)

    Coyne CP

    2016-08-01

    did not significantly modify the ex vivo antineoplastic cytotoxicity of dexamethasone against pulmonary adenocarcinoma at and between the standardized dexamethasone equivalent concentrations of 10-9 M and 10-5 M. Rapid increases in antineoplastic cytotoxicity were observed at and between the dexamethasone equivalent concentrations of 10-9 M and 10-7 M where cancer cell death increased from 7.7% to a maximum of 64.9% (92.3%–35.1% residual survival, respectively, which closely paralleled values for “free” noncovalently bound dexamethasone. Discussion: Organic chemistry reaction regimens were optimized to develop a multiphase synthesis regimen for dexamethasone-(C21-phosphoramide-[anti-EGFR]. Attributes of dexamethasone-(C21-phosphoramide-[anti-EGFR] include a high dexamethasone molar incorporation-index, lack of extraneous chemical group introduction, retained EGFR-binding avidity (“targeted” delivery properties, and potential to enhance long-term pharmaceutical moiety effectiveness. Keywords: dexamethasone, anti-EGFR, organic chemistry reactions, synthesis, selective “targeted” delivery, covalent immunopharmaceuticals, EGFR 

  5. Preemptive intravenous immunoglobulin allows safe and timely administration of antineoplastic therapies in patients with multiple myeloma and parvovirus B19 disease.

    Science.gov (United States)

    Katragadda, L; Shahid, Z; Restrepo, A; Muzaffar, J; Alapat, D; Anaissie, E

    2013-08-01

    Parvovirus B19 (B19) disease is a rare cause of anemia in cancer patients and often goes unrecognized, causing delays in anticancer therapy. A retrospective review was carried out of the records of patients with multiple myeloma who underwent melphalan-based autologous stem cell transplantation (MEL-ASCT) and developed B19 infection (January 2009-December 2011). Cases were defined by the presence of clinical and laboratory findings consistent with B19 disease in patients with repeatedly positive plasma quantitative polymerase chain reaction for parvovirus. Six patients qualified as cases; 5 presented with trilineage cytopenias (chronic in 1) and 1 with anemia later progressing to pancytopenia. Transfusion-dependent thrombocytopenia led to testing in 5 patients. Two of these patients also had manifestations of autoimmune disease. Therapy with intravenous immunoglobulin (IVIG) resulted in clinical and hematologic response in all; however, 1 patient, whose white blood cell counts and serum hemoglobin levels improved, required splenectomy for persistent thrombocytopenia. All patients required additional IVIG for recurrent B19 disease. Although viral load at diagnosis did not correlate with the severity of cytopenia, its decrease was associated with response during 17 of 20 evaluable episodes (P = 0.02). Preemptive IVIG allowed the safe administration of chemotherapy in 3 patients, including MEL-ASCT in 1. Parvovirus B19 can cause severe disease in myeloma patients including ASCT recipients. Thrombocytopenia - not anemia - was the leading presentation and may be associated with autoimmune conditions. Patients with unexplained cytopenias, particularly when prolonged, should undergo testing for circulating parvovirus. A reduction in viral load was associated with response to IVIG, although additional therapy was needed for recurrent disease. Most importantly, preemptive IVIG allowed for safe and timely administration of antineoplastic therapy in patients with ongoing B

  6. Gemcitabine-(5'-phosphoramidate)-[anti-IGF-1R]: molecular design, synthetic organic chemistry reactions, and antineoplastic cytotoxic potency in populations of pulmonary adenocarcinoma (A549).

    Science.gov (United States)

    Coyne, Cody P; Narayanan, Lakshmi

    2017-03-01

    One molecular-based approach that increases potency and reduces dose-limited sequela is the implementation of selective 'targeted' delivery strategies for conventional small molecular weight chemotherapeutic agents. Descriptions of the molecular design and organic chemistry reactions that are applicable for synthesis of covalent gemcitabine-monophosphate immunochemotherapeutics have to date not been reported. The covalent immunopharmaceutical, gemcitabine-(5'-phosphoramidate)-[anti-IGF-1R] was synthesized by reacting gemcitabine with a carbodiimide reagent to form a gemcitabine carbodiimide phosphate ester intermediate which was subsequently reacted with imidazole to create amine-reactive gemcitabine-(5'-phosphorylimidazolide) intermediate. Monoclonal anti-IGF-1R immunoglobulin was combined with gemcitabine-(5'-phosphorylimidazolide) resulting in the synthetic formation of gemcitabine-(5'-phosphoramidate)-[anti-IGF-1R]. The gemcitabine molar incorporation index for gemcitabine-(5'-phosphoramidate)-[anti-IGF-R1] was 2.67:1. Cytotoxicity Analysis - dramatic increases in antineoplastic cytotoxicity were observed at and between the gemcitabine-equivalent concentrations of 10 -9  M and 10 -7  M where lethal cancer cell death increased from 0.0% to a 93.1% maximum (100.% to 6.93% residual survival), respectively. Advantages of the organic chemistry reactions in the multistage synthesis scheme for gemcitabine-(5'-phosphoramidate)-[anti-IGF-1R] include their capacity to achieve high chemotherapeutic molar incorporation ratios; option of producing an amine-reactive chemotherapeutic intermediate that can be preserved for future synthesis applications; and non-dedicated organic chemistry reaction scheme that allows substitutions of either or both therapeutic moieties, and molecular delivery platforms. © 2016 The Authors Chemical Biology & Drug Design Published by John Wiley & Sons Ltd.

  7. Immunocytochemical methods and protocols

    National Research Council Canada - National Science Library

    Javois, Lorette C

    1999-01-01

    ... monoclonal antibodies to study cell differentiation during embryonic development. For a select few disciplines volumes have been published focusing on the specific application of immunocytochemical techniques to that discipline. What distinguished Immunocytochemical Methods and Protocols from earlier books when it was first published four years ago was i...

  8. Critical Response Protocol

    Science.gov (United States)

    Ellingson, Charlene; Roehrig, Gillian; Bakkum, Kris; Dubinsky, Janet M.

    2016-01-01

    This article introduces the Critical Response Protocol (CRP), an arts-based technique that engages students in equitable critical discourse and aligns with the "Next Generation Science Standards" vision for providing students opportunities for language learning while advancing science learning (NGSS Lead States 2013). CRP helps teachers…

  9. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    Current approaches to electronic implementations of voting protocols involve translating legal text to source code of an imperative programming language. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In r...

  10. Principles of Protocol Design

    DEFF Research Database (Denmark)

    Sharp, Robin

    This is a new and updated edition of a book first published in 1994. The book introduces the reader to the principles used in the construction of a large range of modern data communication protocols, as used in distributed computer systems of all kinds. The approach taken is rather a formal one...

  11. Model Additional Protocol

    International Nuclear Information System (INIS)

    Rockwood, Laura

    2001-01-01

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  12. The impact of religiosity and individual prayer activities on advanced cancer patients' health: is there any difference in function of whether or not receiving palliative anti-neoplastic therapy?

    Science.gov (United States)

    Paiva, Carlos Eduardo; Paiva, Bianca Sakamoto Ribeiro; Yennurajalingam, Sriram; Hui, David

    2014-12-01

    Consecutive patients (n = 221) presenting for initial consultation at a palliative care outpatient clinic were prospectively interviewed and then followed until death. Individual prayer activity (IPA) and global religion scores were associated with quality of life, symptoms, inflammatory markers, and survival. Analyses were adjusted for whether patients were still receiving anti-neoplastic therapies (ANTs) or not. Higher religion scores were associated with lower levels of inflammation in advanced cancer patients still undergoing ANTs. Additionally, higher IPA was an independent good prognostic factor in patients on active ANTs. Further studies are necessary to confirm these findings and to investigate possible biological mechanisms involved.

  13. Satellite Communications Using Commercial Protocols

    Science.gov (United States)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  14. Epistemic Protocols for Distributed Gossiping

    Directory of Open Access Journals (Sweden)

    Krzysztof R. Apt

    2016-06-01

    Full Text Available Gossip protocols aim at arriving, by means of point-to-point or group communications, at a situation in which all the agents know each other's secrets. We consider distributed gossip protocols which are expressed by means of epistemic logic. We provide an operational semantics of such protocols and set up an appropriate framework to argue about their correctness. Then we analyze specific protocols for complete graphs and for directed rings.

  15. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  16. Diplomacy and Diplomatic Protocol

    Directory of Open Access Journals (Sweden)

    Lect. Ph.D Oana Iucu

    2008-12-01

    Full Text Available The present study aims to observe relationships and determining factors between diplomacyand diplomatic protocol as outlined by historical and contextual analyses. The approach is very dynamic,provided that concepts are able to show their richness, antiquity and polyvalence at the level of connotations,semantics, grammatical and social syntax. The fact that this information is up to date determines anattitude of appreciation and a state of positive contamination.

  17. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...

  18. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  19. Dysphonia risk screening protocol

    Science.gov (United States)

    Nemr, Katia; Simões-Zenari, Marcia; da Trindade Duarte, João Marcos; Lobrigate, Karen Elena; Bagatini, Flavia Alves

    2016-01-01

    OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors) divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children), 29.25 (adult women), 22.75 (adult men), and 27.10 (seniors). CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics. PMID:27074171

  20. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  1. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Human Resources Division

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  2. Sincalide - the final protocol

    International Nuclear Information System (INIS)

    Clarke, E.A.; Notghi, A.; Hesslewood, S.R.; Harding, L.K.

    2002-01-01

    Full text: HIDA biliary studies examine the gallbladder (GB) to give a percentage ejection fraction (EF). Porcine CCK was an accepted agent for stimulating the GB prior to being withdrawn in the UK from 1998. Sincalide (a synthetic CCK) was the suggested replacement. We have tried many administration regimes in an attempt to get results comparable with our established CCK protocols. Dose concentration and length of infusion times have been studied. Initially a dose of 10 ngm/kg/min given over 2 minutes (manufacturer's recommended dose) was used. This gave falsely low ejection fractions. The dose was reduced to 3 ngm/kg/min over 3 minutes as it was felt the higher dose may be causing constriction of the sphincter of Oddi. This gave a slight improvement with 22 % of patients having normal EF (>35 %). The length of infusion was extended to 15 minutes and the dose concentration reduced again to 0.6 ngm/kg/min. 62 % of patients had a normal EF. However, on many of the curves the gallbladder was still contracting on completion of the 15 minute infusion and began to refill immediately after stopping Sincalide. A further change of protocol was indicated. The infusion time was extended to 30 minutes and the dose concentration per minute kept the same. Imaging began at 30 minutes post HIDA injection and continued for a total of 50 minutes. Sincalide infusion began at 35 minutes if a GB was visualized. This protocol has been performed on 17 patients. 53 % of these had a normal result (comparable with a normal rate of 40 % previously established with CCK) with a mean EF of 60 %. The mean EF of patients with abnormal studies was 15 %. Curves showed a plateau by 30 minutes in 94 % of patients indicating that gallbladder contraction was complete. No normal range is available so results were compared with ultrasound (US). All patients who had an abnormal US scan also had abnormal HIDA results. Three patients had a normal US scan and abnormal HIDA study. These are currently

  3. Distributed Network Protocols

    Science.gov (United States)

    1980-07-01

    MONITORING AGENCY NAME & ADDRESS(II different from Controlting Office) IS. SECURITY CLASS. (of this report) S Office of Naval Research Unclassified...All protocols are extended to networks with changing. topology. S80 8 4 246 DD0I iA 1473 EDITION OF INOV 65 IS OBSOLETE 8 0 24 SECURITY CLASSIFICATION...to the netowrk . f) Each node knows its adjacent links, but not necessarily the identity of its neighbors, i.e. the nodes at the other end of the links

  4. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  5. [Computerized clinical protocol for occlusion].

    Science.gov (United States)

    Salsench, J; Ferrer, J; Nogueras, J

    1988-11-01

    In making a protocol it is necessary that all members of the team who are going to collect information have the same unity of criterion about the different variables that compose it. The drawing up of this document is as much or more necessary than the protocol itself. In this work we all data collected in the protocol and we give the explanations of each concept.

  6. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques ...... suffice to identify several authentication flaws in symmetric and asymmetric key protocols such as Needham-Schroeder symmetric key, Otway-Rees, Yahalom, Andrew secure RPC, Needham-Schroeder asymmetric key, and Beller-Chang-Yacobi MSR...

  7. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...... they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern...

  8. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  9. Gene probes: principles and protocols

    National Research Council Canada - National Science Library

    Aquino de Muro, Marilena; Rapley, Ralph

    2002-01-01

    ... of labeled DNA has allowed genes to be mapped to single chromosomes and in many cases to a single chromosome band, promoting significant advance in human genome mapping. Gene Probes: Principles and Protocols presents the principles for gene probe design, labeling, detection, target format, and hybridization conditions together with detailed protocols, accom...

  10. Developing frameworks for protocol implementation

    NARCIS (Netherlands)

    de Barros Barbosa, C.; de barros Barbosa, C.; Ferreira Pires, Luis

    1999-01-01

    This paper presents a method to develop frameworks for protocol implementation. Frameworks are software structures developed for a specific application domain, which can be reused in the implementation of various different concrete systems in this domain. The use of frameworks support a protocol

  11. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  12. The FDA approved PI3K inhibitor GDC-0941 enhances in vitro the anti-neoplastic efficacy of Axitinib against c-myc-amplified high-risk medulloblastoma.

    Science.gov (United States)

    Ehrhardt, Michael; Craveiro, Rogerio B; Velz, Julia; Olschewski, Martin; Casati, Anna; Schönberger, Stefan; Pietsch, Torsten; Dilloo, Dagmar

    2018-04-01

    Aberrant receptor kinase signalling and tumour neovascularization are hallmarks of medulloblastoma development and are both considered valuable therapeutic targets. In addition to VEGFR1/2, expression of PDGFR α/β in particular has been documented as characteristic of metastatic disease correlating with poor prognosis. Therefore, we have been suggested that the clinically approved multi-kinase angiogenesis inhibitor Axitinib, which specifically targets these kinases, might constitute a promising option for medulloblastoma treatment. Indeed, our results delineate anti-neoplastic activity of Axitinib in medulloblastoma cell lines modelling the most aggressive c-myc-amplified Non-WNT/Non-SHH and SHH-TP53-mutated tumours. Exposure of medulloblastoma cell lines to Axitinib results in marked inhibition of proliferation and profound induction of cell death. The differential efficacy of Axitinib is in line with target expression of medulloblastoma cells identifying VEGFR 1/2, PDGFR α/β and c-kit as potential markers for drug application. The high specificity of Axitinib and the consequential low impact on the haematopoietic and immune system render this drug ideal multi-modal treatment approaches. In this context, we demonstrate that the clinically available PI3K inhibitor GDC-0941 enhances the anti-neoplastic efficacy of Axitinib against c-myc-amplified medulloblastoma. Our findings provide a rational to further evaluate Axitinib alone and in combination with other therapeutic agents for the treatment of most aggressive medulloblastoma subtypes. © 2018 The Authors. Journal of Cellular and Molecular Medicine published by John Wiley & Sons Ltd and Foundation for Cellular and Molecular Medicine.

  13. Deterministic secure communication protocol without using entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We show a deterministic secure direct communication protocol using single qubit in mixed state. The security of this protocol is based on the security proof of BB84 protocol. It can be realized with current technologies.

  14. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  15. The HPA photon protocol and proposed electron protocol

    International Nuclear Information System (INIS)

    Pitchford, W.G.

    1985-01-01

    The Hospital Physicists Association (HPA) photon dosimetry protocol has been produced and was published in 1983. Revised values of some components of Csub(lambda) and refinements introduced into the theory in the last few years have enabled new Csub(lambda) values to be produced. The proposed HPA electron protocol is at present in draft form and will be published shortly. Both protocels are discussed. (Auth.)

  16. Antibody engineering: methods and protocols

    National Research Council Canada - National Science Library

    Chames, Patrick

    2012-01-01

    "Antibody Engineering: Methods and Protocols, Second Edition was compiled to give complete and easy access to a variety of antibody engineering techniques, starting from the creation of antibody repertoires and efficient...

  17. Implementation of postoperative handoff protocol

    African Journals Online (AJOL)

    Background: Standardised handoff protocols have become necessary patient ... improve the perioperative handoff communications from the cardiac operating theatres to the ICU. ..... as you can imagine, there was push-back to the change.

  18. Data Exchange Protocol in Repsail

    Directory of Open Access Journals (Sweden)

    Gucma Maciej

    2017-12-01

    Full Text Available Article presents implantation and theoretical considerations of data exchange protocol developed for the RepSail project, where main objective was design and building innovative hybrid yacht. One of problems during the design process was improper functioning of data exchange protocols that were available in the commercially available devices to mention navigation purpose NMEA183 or 2000 as well as automation dedicated ones (CAN and similar. Author shows the basis of the dedicated format of exchange for in board devices.

  19. The Groningen protocol: another perspective

    OpenAIRE

    Jotkowitz, A B; Glick, S

    2006-01-01

    The Groningen protocol allows for the euthanasia of severely ill newborns with a hopeless prognosis and unbearable suffering. We understand the impetus for such a protocol but have moral and ethical concerns with it. Advocates for euthanasia in adults have relied on the concept of human autonomy, which is lacking in the case of infants. In addition, biases can potentially influence the decision making of both parents and physicians. It is also very difficult to weigh the element of quality of...

  20. Monoclonal antibodies technology. Protocols

    International Nuclear Information System (INIS)

    Acevado Castro, B.E.

    1997-01-01

    Full text: Immunization. The first step in preparing useful monoclonal antibodies (MAbs) is to immunize an animal (Balb/c for example) with an appropriate antigen. Methods (only for soluble antigen): Solubilize selected antigen in Phosphate buffer solution (PBS) at pH 7.2-7.4, ideally at a final concentration per animal between 10 to 50 μg/ml. It is recommended that the antigen under consideration be incorporated into the emulsion adjuvants in 1:1 volumetric relation. We commonly use Frend's adjuvant (FA) to prepared immunized solution. The first immunization should be prepared with complete FA, and the another could be prepared with incomplete FA. It is recommended to inject mice with 0.2 ml intraperitoneal (ip) or subcutaneous (sc). Our experience suggests the sc route is the preferred route. A minimum protocol for immunizing mice to generate cells for preparing hybridomas is s follows: immunize sc on day 0, boost sc on day 21, take a trial bleeding on day 26; if antibody titters are satisfactory, boost ip on day 35 with antigen only, and remove the spleen to obtain cells for fusion on day 38. Fusion protocol. The myeloma cell line we are using is X63 Ag8.653. At the moment of fusion myeloma cells need a good viability (at least a 95%). 1. Remove the spleen cells from immunized mice using sterile conditions. An immune spleen should yield between 7 a 10x10 7 nucleated cells. 2. Place the spleen in 20 ml of serum-free RPMI 1640 in a Petri dish. Using a needle and syringe, inject the spleen with medium to distend and disrupt the spleen stroma and free the nucleated cells. 3. Flush the cell suspension with a Pasteur pipet to disperse clumps of cells. 4. Centrifuge the spleen cell suspension at 250g for 10 min. Resuspend the pellet in serum-free RPMI 1640. Determine cell concentration using Neuhabuer chamber. 5. Mix the myeloma cells and spleen cells in a conical 50-ml tube in serum-free RPMI 1640, 1 x10 7 spleen cells to 1x10 6 myeloma cells (ratio 10:1). Centrifuge

  1. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  2. The Network Protocol Analysis Technique in Snort

    Science.gov (United States)

    Wu, Qing-Xiu

    Network protocol analysis is a network sniffer to capture data for further analysis and understanding of the technical means necessary packets. Network sniffing is intercepted by packet assembly binary format of the original message content. In order to obtain the information contained. Required based on TCP / IP protocol stack protocol specification. Again to restore the data packets at protocol format and content in each protocol layer. Actual data transferred, as well as the application tier.

  3. Understanding protocol performance: impact of test performance.

    Science.gov (United States)

    Turner, Robert G

    2013-01-01

    This is the second of two articles that examine the factors that determine protocol performance. The objective of these articles is to provide a general understanding of protocol performance that can be used to estimate performance, establish limits on performance, decide if a protocol is justified, and ultimately select a protocol. The first article was concerned with protocol criterion and test correlation. It demonstrated the advantages and disadvantages of different criterion when all tests had the same performance. It also examined the impact of increasing test correlation on protocol performance and the characteristics of the different criteria. To examine the impact on protocol performance when individual tests in a protocol have different performance. This is evaluated for different criteria and test correlations. The results of the two articles are combined and summarized. A mathematical model is used to calculate protocol performance for different protocol criteria and test correlations when there are small to large variations in the performance of individual tests in the protocol. The performance of the individual tests that make up a protocol has a significant impact on the performance of the protocol. As expected, the better the performance of the individual tests, the better the performance of the protocol. Many of the characteristics of the different criteria are relatively independent of the variation in the performance of the individual tests. However, increasing test variation degrades some criteria advantages and causes a new disadvantage to appear. This negative impact increases as test variation increases and as more tests are added to the protocol. Best protocol performance is obtained when individual tests are uncorrelated and have the same performance. In general, the greater the variation in the performance of tests in the protocol, the more detrimental this variation is to protocol performance. Since this negative impact is increased as

  4. The Geneva Protocol of 1925

    International Nuclear Information System (INIS)

    Mc Elroy, R.J.

    1991-01-01

    This paper reports that when President Gerald Ford signed the instruments of ratification for the Geneva Protocol of 1925 on January 22, 1975, a tortured, half-century-long chapter in U.S. arms control policy was brought to a close. Fifty years earlier, at the Geneva Conference for the Control of the International Trade in Arms, Munitions and Implements of War, the United States had played a key role in drafting and reaching agreement on the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases and of Bacteriological Methods of Warfare. The protocol, signed by thirty nations, including the United States, on June 17, 1925, prohibits the use in war of asphyxiating, poisonous or other gases, and of all analogous liquids, materials or devices as well as the use of bacteriological methods of warfare

  5. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  6. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  7. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  8. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison

  9. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  10. Art. 1 Eerste Protocol EVRM

    NARCIS (Netherlands)

    Poelmann, E.

    2014-01-01

    Het recht op bezit is niet in het Europees Verdrag ter bescherming van de rechten van de mens en de fundamentele vrijheden (hierna: EVRM) neergelegd, maar in het Eerste Protocol daarbij (hierna: EP), dat in 1954 in werking is getreden. Het is van belang voor ogen te houden dat de Tweede Wereldoorlog

  11. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  12. Affinity biosensors: techniques and protocols

    National Research Council Canada - National Science Library

    Rogers, Kim R; Mulchandani, Ashok

    1998-01-01

    ..., and government to begin or expand their biosensors research. This volume, Methods in Biotechnology vol. 7: Affinity Biosensors: Techniques and Protocols, describes a variety of classical and emerging transduction technologies that have been interfaced to bioaffinity elements (e.g., antibodies and receptors). Some of the reas...

  13. High Entropy Random Selection Protocols

    NARCIS (Netherlands)

    H. Buhrman (Harry); M. Christandl (Matthias); M. Koucky (Michal); Z. Lotker (Zvi); B. Patt-Shamir; M. Charikar; K. Jansen; O. Reingold; J. Rolim

    2007-01-01

    textabstractIn this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome.

  14. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  15. Cognitive Communications Protocols for SATCOM

    Science.gov (United States)

    2017-10-20

    communications protocols for satellite and space communications with possible broad applications in defense, homeland-security as well as consumer ...communications with possible broad applications in defense, homeland-security, and civilian as well as consumer telecommunications. Such cognitive...vulnerable against smart jammers that may attempt to learn the cognitive radios own behavior . In response, our second class of proposed algorithms

  16. Group covariant protocols for quantum string commitment

    International Nuclear Information System (INIS)

    Tsurumaru, Toyohiro

    2006-01-01

    We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next using this result, we prove that for every irreducible representation of a finite group, there always exists a corresponding nontrivial QSC protocol which reaches a level of security impossible to achieve classically

  17. Influence of Alternative Tubulin Inhibitors on the Potency of a Epirubicin-Immunochemotherapeutic Synthesized with an Ultra Violet Light-Activated Intermediate: Influence of incorporating an internal/integral disulfide bond structure and Alternative Tubulin/Microtubule Inhibitors on the Cytotoxic Anti-Neoplastic Potency of Epirubicin-(C3-amide)-Anti-HER2/neu Synthesized Utilizing a UV-Photoactivated Anthracycline Intermediate.

    Science.gov (United States)

    Coyne, C P; Jones, Toni; Bear, Ryan

    2012-11-01

    Immunochemotherapeutics, epirubicin-(C 3 - amide )-SS-[anti-HER2/ neu ] with an internal disulfide bond, and epirubicin-(C 3 - amide )-[anti-HER2/ neu ] were synthesized utilizing succinimidyl 2-[(4,4'-azipentanamido) ethyl]-1,3'-dithioproprionate or succinimidyl 4,4-azipentanoate respectively. Western blot analysis was used to determine the presence of any immunoglobulin fragmentation or IgG-IgG polymerization. Retained HER2/ neu binding characteristics of epirubicin-(C 3 - amide )-[anti-HER2/ neu ] and epirubicin-(C 3 - amide )-SS-[anti-HER2/ neu ] were validated by cell-ELISA using a mammary adenocarcinoma (SKBr-3) population that highly over-expresses trophic HER2/ neu receptor complexes. Cytotoxic anti-neoplastic potency of epirubicin-(C 3 - amide )-[anti-HER2/ neu ] and epirubicin-(C 3 - amide )-SS-[anti-HER2/ neu ] between epirubicin-equivalent concentrations of 10 -10 M and 10 -6 M was determined by measuring the vitality/proliferation of chemotherapeutic-resistant mammary adenocarcinoma (SKBr-3 cell type). Cytotoxic anti-neoplastic potency of benzimidazoles (albendazole, flubendazole, membendazole) and griseofulvin were assessed between 0-to-2 μg/ml and 0-to-100 μg/ml respectively while mebendazole and griseofulvin were analyzed at fixed concentrations of 0.35 μg/ml and 35 g/ml respectively in dual combination with gradient concentrations of epirubicin-(C 3 - amide )-[anti-HER2/ neu ] and epirubicin-(C 3 - amide )-SS-[anti-HER2/ neu ]. Cytotoxic anti-neoplastic potency for epirubicin-(C 3 - amide )-[anti-HER2/ neu ] and epirubicin-(C 3 - amide )-SS-[anti-HER2/ neu ] against chemotherapeutic-resistant mammary adenocarcinoma (SKBr-3) was nearly identical at epirubicin-equivalent concentrations of 10 -10 M and 10 -6 M. The benzimadazoles also possessed cytotoxic anti-neoplastic activity with flubendazole and albendazole being the most and least potent respectively. Similarly, griseofulvin had cytotoxic anti-neoplastic activity and was more potent than

  18. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  19. Using Ovsynch protocol versus Cosynch protocol in dairy cows

    Directory of Open Access Journals (Sweden)

    Ion Valeriu Caraba

    2013-10-01

    Full Text Available As a research on the reproductive physiology and endocrinology surrounding the estrous cycle in dairy cattle has been compiled, several estrous synchronization programs have been developed for use with dairy cows. These include several programs that facilitate the mass breeding of all animals at a predetermined time (timed-AI rather than the detection of estrus. We studied on 15 dary cows which were synchronized by Ovsynch and Cosynch programs. The estrus response for cows in Ovsynch protocol was of 63%. Pregnancy per insemination at 60 days was of 25%. Estrus response for cow in Cosynch protocol was of 57%. Pregnancy per insemination at 60 days was of 57%. Synchronization of ovulation using Ovsynch protocols can provide an effective way to manage reproduction in lactating dairy cows by eliminating the need for estrus detection. These are really efficient management programs for TAI of dairy cows that are able to reduce both the labour costs and the extra handling to daily estrus detection and AI.

  20. Phase Transition in Protocols Minimizing Work Fluctuations

    Science.gov (United States)

    Solon, Alexandre P.; Horowitz, Jordan M.

    2018-05-01

    For two canonical examples of driven mesoscopic systems—a harmonically trapped Brownian particle and a quantum dot—we numerically determine the finite-time protocols that optimize the compromise between the standard deviation and the mean of the dissipated work. In the case of the oscillator, we observe a collection of protocols that smoothly trade off between average work and its fluctuations. However, for the quantum dot, we find that as we shift the weight of our optimization objective from average work to work standard deviation, there is an analog of a first-order phase transition in protocol space: two distinct protocols exchange global optimality with mixed protocols akin to phase coexistence. As a result, the two types of protocols possess qualitatively different properties and remain distinct even in the infinite duration limit: optimal-work-fluctuation protocols never coalesce with the minimal-work protocols, which therefore never become quasistatic.

  1. Database communication protocol analyses and security detection

    International Nuclear Information System (INIS)

    Luo Qun; Liu Qiushi

    2003-01-01

    In this paper we introduced the analysis of TDS protocol in the communication application between Client and Server about SYBASE and MICROSOFT SQL SERVER and do some test for some bugs existed in the protocol. (authors)

  2. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effort...

  3. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs

    2016-01-01

    and published reports of academic clinical drug trials. METHODS: A comparison was made between study protocols and their corresponding published reports. We assessed the overall consistency, which was defined as the absence of discrepancy regarding study type (categorized as either exploratory or confirmatory...... in 1999, 2001, and 2003, 95 of which fulfilled the eligibility criteria and had at least one corresponding published report reporting data on trial subjects. Overall consistency was observed in 39% of the trials (95% CI: 29 to 49%). Randomized controlled trials (RCTs) constituted 72% (95% CI: 63 to 81......%) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  4. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  5. Feasible quantum communication complexity protocol

    International Nuclear Information System (INIS)

    Galvao, Ernesto F.

    2002-01-01

    I show that a simple multiparty communication task can be performed more efficiently with quantum communication than with classical communication, even with low detection efficiency η. The task is a communication complexity problem in which distant parties need to compute a function of the distributed inputs, while minimizing the amount of communication between them. A realistic quantum optical setup is suggested that can demonstrate a five-party quantum protocol with higher-than-classical performance, provided η>0.33

  6. Cost estimation of Kyoto Protocol

    International Nuclear Information System (INIS)

    Di Giulio, Enzo

    2005-01-01

    This article proposes a reflection on important aspects in the costs determination performance of Kyoto Protocol. The evaluation of the main models evidence possible impacts on the economies. A key role in the determination of the cost is represented by the relative hypothesis to emission trading and the projects CDM-JI and from the political capacity at the cost negative or equal to zero [it

  7. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  8. Behavior Protocols for Software Components

    Czech Academy of Sciences Publication Activity Database

    Plášil, František; Višňovský, Stanislav

    2002-01-01

    Roč. 28, č. 11 (2002), s. 1056-1076 ISSN 0098-5589 R&D Projects: GA AV ČR IAA2030902; GA ČR GA201/99/0244 Grant - others:Eureka(XE) Pepita project no.2033 Institutional research plan: AV0Z1030915 Keywords : behavior protocols * component-based programming * software architecture Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.170, year: 2002

  9. Desensitization protocols and their outcome.

    Science.gov (United States)

    Marfo, Kwaku; Lu, Amy; Ling, Min; Akalin, Enver

    2011-04-01

    In the last decade, transplantation across previously incompatible barriers has increasingly become popular because of organ donor shortage, availability of better methods of detecting and characterizing anti-HLA antibodies, ease of diagnosis, better understanding of antibody-mediated rejection, and the availability of effective regimens. This review summarizes all manuscripts published since the first publication in 2000 on desensitized patients and discusses clinical outcomes including acute and chronic antibody-mediated rejection rate, the new agents available, kidney paired exchange programs, and the future directions in sensitized patients. There were 21 studies published between 2000 and 2010, involving 725 patients with donor-specific anti-HLA antibodies (DSAs) who underwent kidney transplantation with different desensitization protocols. All studies were single center and retrospective. The patient and graft survival were 95% and 86%, respectively, at a 2-year median follow-up. Despite acceptable short-term patient and graft survivals, acute rejection rate was 36% and acute antibody-mediated rejection rate was 28%, which is significantly higher than in nonsensitized patients. Recent studies with longer follow-up of those patients raised concerns about long-term success of desensitization protocols. The studies utilizing protocol biopsies in desensitized patients also reported higher subclinical and chronic antibody-mediated rejection. An association between the strength of DSAs determined by median fluorescence intensity values of Luminex single-antigen beads and risk of rejection was observed. Two new agents, bortezomib, a proteasome inhibitor, and eculizumab, an anti-complement C5 antibody, were recently introduced to desensitization protocols. An alternative intervention is kidney paired exchange, which should be considered first for sensitized patients. © 2011 by the American Society of Nephrology

  10. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  11. Formal analysis of a fair payment protocol

    NARCIS (Netherlands)

    J.G. Cederquist; M.T. Dashti (Mohammad)

    2004-01-01

    textabstractWe formally specify a payment protocol. This protocol is intended for fair exchange of time-sensitive data. Here the ?-CRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free ?-calculus. These properties are then verified

  12. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, M.T.

    2004-01-01

    We formally specify a payment protocol. This protocol is intended for fair exchange of timesensitive data. Here the μCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free μ-calculus. These properties are then verified using the finite

  13. Formal Analysis of a Fair Payment Protocol

    NARCIS (Netherlands)

    Cederquist, J.G.; Dashti, Muhammad Torabi; Dimitrakos, Theo; Martinelli, Fabio

    We formally specify a payment protocol described by Vogt et al. This protocol is intended for fair exchange of time-sensitive data. Here the mCRL language is used to formalize the protocol. Fair exchange properties are expressed in the regular alternation-free mu-calculus. These properties are then

  14. Advanced dementia pain management protocols.

    Science.gov (United States)

    Montoro-Lorite, Mercedes; Canalias-Reverter, Montserrat

    Pain management in advanced dementia is complex because of neurological deficits present in these patients, and nurses are directly responsible for providing interventions for the evaluation, management and relief of pain for people suffering from this health problem. In order to facilitate and help decision-makers, pain experts recommend the use of standardized protocols to guide pain management, but in Spain, comprehensive pain management protocols have not yet been developed for advanced dementia. This article reflects the need for an integrated management of pain in advanced dementia. From the review and analysis of the most current and relevant studies in the literature, we performed an approximation of the scales for the determination of pain in these patients, with the observational scale PAINAD being the most recommended for the hospital setting. In addition, we provide an overview for comprehensive management of pain in advanced dementia through the conceptual framework «a hierarchy of pain assessment techniques by McCaffery and Pasero» for the development and implementation of standardized protocols, including a four-phase cyclical process (evaluation, planning/performance, revaluation and recording), which can facilitate the correct management of pain in these patients. Copyright © 2017 Elsevier España, S.L.U. All rights reserved.

  15. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  16. Ancestors protocol for scalable key management

    Directory of Open Access Journals (Sweden)

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  17. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  18. Asymptotic adaptive bipartite entanglement-distillation protocol

    International Nuclear Information System (INIS)

    Hostens, Erik; Dehaene, Jeroen; De Moor, Bart

    2006-01-01

    We present an asymptotic bipartite entanglement-distillation protocol that outperforms all existing asymptotic schemes. This protocol is based on the breeding protocol with the incorporation of two-way classical communication. Like breeding, the protocol starts with an infinite number of copies of a Bell-diagonal mixed state. Breeding can be carried out as successive stages of partial information extraction, yielding the same result: one bit of information is gained at the cost (measurement) of one pure Bell state pair (ebit). The basic principle of our protocol is at every stage to replace measurements on ebits by measurements on a finite number of copies, whenever there are two equiprobable outcomes. In that case, the entropy of the global state is reduced by more than one bit. Therefore, every such replacement results in an improvement of the protocol. We explain how our protocol is organized as to have as many replacements as possible. The yield is then calculated for Werner states

  19. Short Review on Quantum Key Distribution Protocols.

    Science.gov (United States)

    Giampouris, Dimitris

    2017-01-01

    Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.

  20. Revisiting the structure of the anti-neoplastic glucans of Mycobacterium bovis Bacille Calmette-Guerin. Structural analysis of the extracellular and boiling water extract-derived glucans of the vaccine substrains.

    Science.gov (United States)

    Dinadayala, Premkumar; Lemassu, Anne; Granovski, Pierre; Cérantola, Stéphane; Winter, Nathalie; Daffé, Mamadou

    2004-03-26

    The attenuated strain of Mycobacterium bovis Bacille Calmette-Guérin (BCG), used worldwide to prevent tuberculosis and leprosy, is also clinically used as an immunotherapeutic agent against superficial bladder cancer. An anti-tumor polysaccharide has been isolated from the boiling water extract of the Tice substrain of BCG and tentatively characterized as consisting primarily of repeating units of 6-linked-glucosyl residues. Mycobacterium tuberculosis and other mycobacterial species produce a glycogen-like alpha-glucan composed of repeating units of 4-linked glucosyl residues substituted at some 6 positions by short oligoglucosyl units that also exhibits an anti-tumor activity. Therefore, the impression prevails that mycobacteria synthesize different types of anti-neoplastic glucans or, alternatively, the BCG substrains are singular in producing a unique type of glucan that may confer to them their immunotherapeutic property. The present study addresses this question through the comparative analysis of alpha-glucans purified from the extracellular materials and boiling water extracts of three vaccine substrains. The polysaccharides were purified, and their structural features were established by mono- and two-dimensional NMR spectroscopy and matrix-assisted laser desorption/ionization time-of-flight mass spectrometry of the enzymatic and chemical degradation products of the purified compounds. The glucans isolated by the two methods from the three substrains of BCG were shown to exhibit identical structural features shared with the glycogen-like alpha-glucan of M. tuberculosis and other mycobacteria. Incidentally, we observed an occasional release of dextrans from Sephadex columns that may explain the reported occurrence of 6-substituted alpha-glucans in mycobacteria.

  1. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  2. Publication trends of study protocols in rehabilitation.

    Science.gov (United States)

    Jesus, Tiago S; Colquhoun, Heather L

    2017-09-04

    Growing evidence points for the need to publish study protocols in the health field. To observe whether the growing interest in publishing study protocols in the broader health field has been translated into increased publications of rehabilitation study protocols. Observational study using publication data and its indexation in PubMed. Not applicable. Not applicable. PubMed was searched with appropriate combinations of Medical Subject Headings up to December 2014. The effective presence of study protocols was manually screened. Regression models analyzed the yearly growth of publications. Two-sample Z-tests analyzed whether the proportion of Systematic Reviews (SRs) and Randomized Controlled Trials (RCTs) among study protocols differed from that of the same designs for the broader rehabilitation research. Up to December 2014, 746 publications of rehabilitation study protocols were identified, with an exponential growth since 2005 (r2=0.981; p<0.001). RCT protocols were the most common among rehabilitation study protocols (83%), while RCTs were significantly more prevalent among study protocols than among the broader rehabilitation research (83% vs. 35.8%; p<0.001). For SRs, the picture was reversed: significantly less common among study protocols (2.8% vs. 9.3%; p<0.001). Funding was more often reported by rehabilitation study protocols than the broader rehabilitation research (90% vs. 53.1%; p<0.001). Rehabilitation journals published a significantly lower share of rehabilitation study protocols than they did for the broader rehabilitation research (1.8% vs.16.7%; p<0.001). Identifying the reasons for these discrepancies and reverting unwarranted disparities (e.g. low rate of publication for rehabilitation SR protocols) are likely new avenues for rehabilitation research and its publication. SRs, particularly those aggregating RCT results, are considered the best standard of evidence to guide rehabilitation clinical practice; however, that standard can be improved

  3. Protein blotting protocol for beginners.

    Science.gov (United States)

    Petrasovits, Lars A

    2014-01-01

    The transfer and immobilization of biological macromolecules onto solid nitrocellulose or nylon (polyvinylidene difluoride (PVDF)) membranes subsequently followed by specific detection is referred to as blotting. DNA blots are called Southerns after the inventor of the technique, Edwin Southern. By analogy, RNA blots are referred to as northerns and protein blots as westerns (Burnette, Anal Biochem 112:195-203, 1981). With few exceptions, western blotting involves five steps, namely, sample collection, preparation, separation, immobilization, and detection. In this chapter, protocols for the entire process from sample collection to detection are described.

  4. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  5. Using semantics for representing experimental protocols.

    Science.gov (United States)

    Giraldo, Olga; García, Alexander; López, Federico; Corcho, Oscar

    2017-11-13

    An experimental protocol is a sequence of tasks and operations executed to perform experimental research in biological and biomedical areas, e.g. biology, genetics, immunology, neurosciences, virology. Protocols often include references to equipment, reagents, descriptions of critical steps, troubleshooting and tips, as well as any other information that researchers deem important for facilitating the reusability of the protocol. Although experimental protocols are central to reproducibility, the descriptions are often cursory. There is the need for a unified framework with respect to the syntactic structure and the semantics for representing experimental protocols. In this paper we present "SMART Protocols ontology", an ontology for representing experimental protocols. Our ontology represents the protocol as a workflow with domain specific knowledge embedded within a document. We also present the S ample I nstrument R eagent O bjective (SIRO) model, which represents the minimal common information shared across experimental protocols. SIRO was conceived in the same realm as the Patient Intervention Comparison Outcome (PICO) model that supports search, retrieval and classification purposes in evidence based medicine. We evaluate our approach against a set of competency questions modeled as SPARQL queries and processed against a set of published and unpublished protocols modeled with the SP Ontology and the SIRO model. Our approach makes it possible to answer queries such as Which protocols use tumor tissue as a sample. Improving reporting structures for experimental protocols requires collective efforts from authors, peer reviewers, editors and funding bodies. The SP Ontology is a contribution towards this goal. We build upon previous experiences and bringing together the view of researchers managing protocols in their laboratory work. Website: https://smartprotocols.github.io/ .

  6. Physical Therapy Protocols for Arthroscopic Bankart Repair.

    Science.gov (United States)

    DeFroda, Steven F; Mehta, Nabil; Owens, Brett D

    Outcomes after arthroscopic Bankart repair can be highly dependent on compliance and participation in physical therapy. Additionally, there are many variations in physician-recommended physical therapy protocols. The rehabilitation protocols of academic orthopaedic surgery departments vary widely despite the presence of consensus protocols. Descriptive epidemiology study. Level 3. Web-based arthroscopic Bankart rehabilitation protocols available online from Accreditation Council for Graduate Medical Education (ACGME)-accredited orthopaedic surgery programs were included for review. Individual protocols were reviewed to evaluate for the presence or absence of recommended therapies, goals for completion of ranges of motion, functional milestones, exercise start times, and recommended time to return to sport. Thirty protocols from 27 (16.4%) total institutions were identified out of 164 eligible for review. Overall, 9 (30%) protocols recommended an initial period of strict immobilization. Variability existed between the recommended time periods for sling immobilization (mean, 4.8 ± 1.8 weeks). The types of exercises and their start dates were also inconsistent. Goals to full passive range of motion (mean, 9.2 ± 2.8 weeks) and full active range of motion (mean, 12.2 ± 2.8 weeks) were consistent with other published protocols; however, wide ranges existed within the reviewed protocols as a whole. Only 10 protocols (33.3%) included a timeline for return to sport, and only 3 (10%) gave an estimate for return to game competition. Variation also existed when compared with the American Society of Shoulder and Elbow Therapists' (ASSET) consensus protocol. Rehabilitation protocols after arthroscopic Bankart repair were found to be highly variable. They also varied with regard to published consensus protocols. This discrepancy may lead to confusion among therapists and patients. This study highlights the importance of attending surgeons being very clear and specific with

  7. Implementation of the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-07-01

    The Rio Earth summit in 1992 has been the starting point of an international awareness about the global risk of climatic change. At this occasion, the richest countries committed themselves to stabilize their greenhouse gas emissions and to reach by the year 2000 an emissions level equivalent to the one of 1990. The Kyoto protocol in 1997 has permitted to convert this will into juridically constraining quantitative commitments. In 2005, Russia ratified the protocol while in 2001 the USA refused to do so. Because the commitments signed are ambitious, flexibility mechanisms have been implemented: 'emission permits' (emissions trading), 'joint implementation' allowing the investments abroad for greenhouse gases abatement in another developed country, and 'clean development mechanisms' when investments are made in a developing country. The Marrakech conference of December 2001 has permitted to fix up the eligibility criteria of projects belonging to the joint implementation and clean development mechanisms. The effective implementation of these mechanisms still raises technical difficulties to evaluate and measure the effective abatement of greenhouse gas emissions. (J.S.)

  8. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Matei, M.; Matei, L.

    2005-01-01

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  9. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  10. In-memory interconnect protocol configuration registers

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  11. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... active and adaptive corruptions in the random oracle model. Due to its simplicity, the protocol is extremely efficient and it allows to perform m 1-out-of-n OTs using only: - Computation: (n+1)m+2 exponentiations (mn for the receiver, mn+2 for the sender) and - Communication: 32(m+1) bytes (for the group...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  12. In-memory interconnect protocol configuration registers

    Science.gov (United States)

    Cheng, Kevin Y.; Roberts, David A.

    2017-09-19

    Systems, apparatuses, and methods for moving the interconnect protocol configuration registers into the main memory space of a node. The region of memory used for storing the interconnect protocol configuration registers may also be made cacheable to reduce the latency of accesses to the interconnect protocol configuration registers. Interconnect protocol configuration registers which are used during a startup routine may be prefetched into the host's cache to make the startup routine more efficient. The interconnect protocol configuration registers for various interconnect protocols may include one or more of device capability tables, memory-side statistics (e.g., to support two-level memory data mapping decisions), advanced memory and interconnect features such as repair resources and routing tables, prefetching hints, error correcting code (ECC) bits, lists of device capabilities, set and store base address, capability, device ID, status, configuration, capabilities, and other settings.

  13. Blockchain Consensus Protocols in the Wild

    OpenAIRE

    Cachin, Christian; Vukolić, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  14. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  15. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  16. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  17. Telomerase Repeated Amplification Protocol (TRAP).

    Science.gov (United States)

    Mender, Ilgen; Shay, Jerry W

    2015-11-20

    Telomeres are found at the end of eukaryotic linear chromosomes, and proteins that bind to telomeres protect DNA from being recognized as double-strand breaks thus preventing end-to-end fusions (Griffith et al. , 1999). However, due to the end replication problem and other factors such as oxidative damage, the limited life span of cultured cells (Hayflick limit) results in progressive shortening of these protective structures (Hayflick and Moorhead, 1961; Olovnikov, 1973). The ribonucleoprotein enzyme complex telomerase-consisting of a protein catalytic component hTERT and a functional RNA component hTR or hTERC - counteracts telomere shortening by adding telomeric repeats to the end of chromosomes in ~90% of primary human tumors and in some transiently proliferating stem-like cells (Shay and Wright, 1996; Shay and Wright, 2001). This results in continuous proliferation of cells which is a hallmark of cancer. Therefore, telomere biology has a central role in aging, cancer progression/metastasis as well as targeted cancer therapies. There are commonly used methods in telomere biology such as Telomere Restriction Fragment (TRF) (Mender and Shay, 2015b), Telomere Repeat Amplification Protocol (TRAP) and Telomere dysfunction Induced Foci (TIF) analysis (Mender and Shay, 2015a). In this detailed protocol we describe Telomere Repeat Amplification Protocol (TRAP). The TRAP assay is a popular method to determine telomerase activity in mammalian cells and tissue samples (Kim et al. , 1994). The TRAP assay includes three steps: extension, amplification, and detection of telomerase products. In the extension step, telomeric repeats are added to the telomerase substrate (which is actually a non telomeric oligonucleotide, TS) by telomerase. In the amplification step, the extension products are amplified by the polymerase chain reaction (PCR) using specific primers (TS upstream primer and ACX downstream primer) and in the detection step, the presence or absence of telomerase is

  18. Search and nonsearch protocols for radiographic consultation

    International Nuclear Information System (INIS)

    Swensson, R.G.; Theodore, G.H.

    1989-01-01

    Six radiologists, acting as film reviewers, used two different consultation protocols to differentiate among 292 ambiguous findings on chest films: 120 simulated nodules and 172 normal findings (previous readers' false-positive reports of nodules). The non-search protocol identified each finding (by location), and reviewers rated its likelihood as a nodule. The search protocol, which asked reviewers to report and rate all locations regarded as possible nodules on each film, assigned a default negative rating to any unreported finding (nodule or normal). Receiver operator characteristic analyses demonstrated a significantly higher accuracy for each reviewer's search- protocol discriminations between these nodules and confusing normal findings

  19. Adaptive Protocols for Mobile Wireless Networks

    National Research Council Canada - National Science Library

    Pursley, Michael B

    2005-01-01

    .... Research results are presented on adaptive, energy-efficient, distributed protocols for mobile wireless networks that must operate effectively over unreliable communication links in highly dynamic...

  20. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  1. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  2. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  3. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  4. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  5. Secure Multi-Player Protocols

    DEFF Research Database (Denmark)

    Fehr, Serge

    While classically cryptography is concerned with the problem of private communication among two entities, say players, in modern cryptography multi-player protocols play an important role. And among these, it is probably fair to say that secret sharing, and its stronger version verifiable secret...... sharing (VSS), as well as multi-party computation (MPC) belong to the most appealing and/or useful ones. The former two are basic tools to achieve better robustness of cryptographic schemes against malfunction or misuse by “decentralizing” the security from one single to a whole group of individuals...... (captured by the term threshold cryptography). The latter allows—at least in principle—to execute any collaboration among a group of players in a secure way that guarantees the correctness of the outcome but simultaneously respects the privacy of the participants. In this work, we study three aspects...

  6. Software for simulating IMRT protocol

    Energy Technology Data Exchange (ETDEWEB)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de, E-mail: tcff@ufmg.b, E-mail: campos@nuclear.ufmg.b [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte, MG (Brazil). Dept. de Engenharia Nuclear

    2009-07-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  7. Software for simulating IMRT protocol

    International Nuclear Information System (INIS)

    Fonseca, Thelma C.F.; Campos, Tarcisio P.R. de

    2009-01-01

    The Intensity Modulated Radiation Therapy - IMRT is an advanced technique to cancer treatment widely used on oncology around the world. The present paper describes the SOFT-RT software which is a tool for simulating IMRT protocol. Also, it will be present a cerebral tumor case of studied in which three irradiation windows with distinct orientation were applied. The SOFT-RT collect and export data to MCNP code. This code simulates the photon transport on the voxel model. Later, a out-module from SOFT-RT import the results and express the dose-response superimposing dose and voxel model in a tree-dimensional graphic representation. The present paper address the IMRT software and its function as well a cerebral tumor case of studied is showed. The graphic interface of the SOFT-RT illustrates the example case. (author)

  8. Fetal MRI: techniques and protocols

    International Nuclear Information System (INIS)

    Prayer, Daniela; Brugger, Peter Christian; Prayer, Lucas

    2004-01-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  9. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial...... standards used for implementing the service-oriented applications. By doing so, we will be able to not only reason about applications at different levels of abstractions, but also to build a bridge between the views of researchers on formal methods and developers in industry. We apply our approach...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  10. Protocol Monitoring Passive Solar Energy

    International Nuclear Information System (INIS)

    Van den Ham, E.R.; Bosselaar, L.

    1998-01-01

    A method has been developed by means of which the contribution of passive solar energy to the Dutch energy balance can be quantified univocally. The contribution was 57 PJ in 1990 and also 57 PJ in 1995. The efficiency of passive solar energy systems increased from -31.5% to -28.1% in the period 1990-1995, mainly as a result of the use of extra insulating glazing. As a result of the reduction of energy consumption for heating in houses it is expected that the extra contribution of 2 PJ will not be realized in the year 2010. It is suggested that the method to determine the absolute contribution of passive solar energy to the energy demand of dwellings is to be included in the protocol monitoring renewable energy. For the method to be included in the energy statistics of Statistics Netherlands (CBS) it can be considered only to take into account the difference compared to 1990. 11 refs

  11. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  12. Vitamina D y cáncer: acción antineoplásica de la 1α, 25(OH2 -vitamina D3 Vitamin D and cancer: antineoplastic effects of 1α,25(OH2-vitamin D3

    Directory of Open Access Journals (Sweden)

    Verónica González Pardo

    2012-04-01

    Full Text Available La forma hormonalmente activa de la vitamina D, 1α,25(OH2-vitamina D3 (1α,25(OH2D3, además de desempeñar un rol crucial en el mantenimiento de la homeostasis de calcio en el cuerpo, también regula el crecimiento y la diferenciación de diferentes tipos celulares, incluyendo células cancerosas. Actualmente hay numerosos estudios que investigan los efectos de la hormona en estas células, debido al interés en el uso terapéutico del 1α,25(OH2D3 y de análogos con menor actividad calcémica para el tratamiento o prevención del cáncer. En este trabajo de revisión se describe el sistema endocrino de la vitamina D, su mecanismo de acción, su acción antineoplásica y se provee información sobre los últimos avances en el estudio de nuevos análogos de la hormona con menos actividad calcémica para el tratamiento del cáncer.The hormonal form of vitamin D, 1α,25(OH2-vitamin D3 (1α,25(OH2D3, in addition of playing a central role in the control of calcium homeostasis in the body, regulates the growth and differentiation of different cell types, including cancer cells. At present several epidemiologic and clinical studies investigate the effect of the hormone in these cells due to the interest in the therapeutic use of 1α,25(OH2D3 and analogues with less calcemic activity for prevention or treatment of cancer. This review describes vitamin D endocrine system, its mechanism of action, its antineoplastic activity and provides information about the latest advances in the study of new hormone analogues with less calcemic activity for cancer treatment.

  13. Wind power agreement protocol; Protocole d'accord eolien

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    The aim of this protocol of agreement is to propose to wind turbine fitters some models of contracts allowing the setting up of wind turbines on agricultural lots. These documents, which make an indissociable ensemble, apply to both phases of development of a wind power project: the feasibility study phase, for a duration comprised between 2 and 5 years (studies, administrative procedures, precise definition of the project), and the construction, exploitation and dismantling phase. These documents will serve as common guidelines for both the farmers and the wind turbine designers. Both parties agree to meet together in the future to propose some modifications of these texts if necessary. The four models of contracts are attached to the document: contract for the feasibility study phase, first contract between the landlord and the farmer for the cancellation of the rural lease, second contract between the landlord and the wind power exploitation company for the common right lease, and the third contract between the farmer and the wind power company for the indemnification convention. (J.S.)

  14. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    J. Pang

    2002-01-01

    textabstractNeedham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over

  15. An Argument Approach to Observation Protocol Validity

    Science.gov (United States)

    Bell, Courtney A.; Gitomer, Drew H.; McCaffrey, Daniel F.; Hamre, Bridget K.; Pianta, Robert C.; Qi, Yi

    2012-01-01

    This article develops a validity argument approach for use on observation protocols currently used to assess teacher quality for high-stakes personnel and professional development decisions. After defining the teaching quality domain, we articulate an interpretive argument for observation protocols. To illustrate the types of evidence that might…

  16. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  17. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    Comsan, M.N.H.

    2007-01-01

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO 2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  18. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Loose, H.

    2001-01-01

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  19. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process b...

  20. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  1. Cryptanalysis of the arbitrated quantum signature protocols

    International Nuclear Information System (INIS)

    Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan

    2011-01-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  2. Nucleic acid protocols: Extraction and optimization

    Directory of Open Access Journals (Sweden)

    Saeed El-Ashram

    2016-12-01

    Full Text Available Yield and quality are fundamental features for any researchers during nucleic acid extraction. Here, we describe a simplified, semi-unified, effective, and toxic material free protocol for extracting DNA and RNA from different prokaryotic and eukaryotic sources exploiting the physical and chemical properties of nucleic acids. Furthermore, this protocol showed that DNA and RNA are under triple protection (i.e. EDTA, SDS and NaCl during lysis step, and this environment is improper for RNase to have DNA liberated of RNA and even for DNase to degrade the DNA. Therefore, the complete removal of RNA under RNase influence is achieved when RNase is added after DNA extraction, which gives optimal quality with any protocols. Similarly, DNA contamination in an isolated RNA is degraded by DNase to obtain high-quality RNA. Our protocol is the protocol of choice in terms of simplicity, recovery time, environmental safety, amount, purity, PCR and RT-PCR applicability.

  3. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  4. A Comparison Between Inter-Asterisk eXchange Protocol and Jingle Protocol: Session Time

    Directory of Open Access Journals (Sweden)

    H. S. Haj Aliwi

    2016-08-01

    Full Text Available Over the last few years, many multimedia conferencing and Voice over Internet Protocol (VoIP applications have been developed due to the use of signaling protocols in providing video, audio and text chatting services between at least two participants. This paper compares between two widely common signaling protocols: InterAsterisk eXchange Protocol (IAX and the extension of the eXtensible Messaging and Presence Protocol (Jingle in terms of delay time during call setup, call teardown, and media sessions.

  5. A family of multi-party authentication protocols

    NARCIS (Netherlands)

    Cremers, C.J.F.; Mauw, S.

    2006-01-01

    We introduce a family of multi-party authentication protocols and discuss six novel protocols, which are members of this family. The first three generalize the well-known Needham-Schroeder-Lowe public-key protocol, the Needham-Schroeder private-key protocol, and the Bilateral Key Exchange protocol.

  6. Universally composable protocols with relaxed set-up assumptions

    DEFF Research Database (Denmark)

    Barak, Boaz; Canetti, Ran; Nielsen, Jesper Buus

    2004-01-01

    A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally composable (UC) protocols provide this guarantee in a strong sense: A protocol remains secure even when composed concurrently with an unbounded number of ...

  7. Live chat alternative security protocol

    Science.gov (United States)

    Rahman, J. P. R.; Nugraha, E.; Febriany, A.

    2018-05-01

    Indonesia is one of the largest e-commerce markets in Southeast Asia, as many as 5 million people do transactions in e-commerce, therefore more and more people use live chat service to communicate with customer service. In live chat, the customer service often asks customers’ data such as, full name, address, e-mail, transaction id, which aims to verify the purchase of the product. One of the risks that will happen is sniffing which will lead to the theft of confidential information that will cause huge losses to the customer. The anticipation that will be done is build an alternative security protocol for user interaction in live chat by using a cryptographic algorithm that is useful for protecting confidential messages. Live chat requires confidentiality and data integration with encryption and hash functions. The used algorithm are Rijndael 256 bits, RSA, and SHA256. To increase the complexity, the Rijndael algorithm will be modified in the S-box and ShiftRow sections based on the shannon principle rule, the results show that all pass the Randomness test, but the modification in Shiftrow indicates a better avalanche effect. Therefore the message will be difficult to be stolen or changed.

  8. A Simple XML Producer-Consumer Protocol

    Science.gov (United States)

    Smith, Warren; Gunter, Dan; Quesnel, Darcy; Biegel, Bryan (Technical Monitor)

    2001-01-01

    There are many different projects from government, academia, and industry that provide services for delivering events in distributed environments. The problem with these event services is that they are not general enough to support all uses and they speak different protocols so that they cannot interoperate. We require such interoperability when we, for example, wish to analyze the performance of an application in a distributed environment. Such an analysis might require performance information from the application, computer systems, networks, and scientific instruments. In this work we propose and evaluate a standard XML-based protocol for the transmission of events in distributed systems. One recent trend in government and academic research is the development and deployment of computational grids. Computational grids are large-scale distributed systems that typically consist of high-performance compute, storage, and networking resources. Examples of such computational grids are the DOE Science Grid, the NASA Information Power Grid (IPG), and the NSF Partnerships for Advanced Computing Infrastructure (PACIs). The major effort to deploy these grids is in the area of developing the software services to allow users to execute applications on these large and diverse sets of resources. These services include security, execution of remote applications, managing remote data, access to information about resources and services, and so on. There are several toolkits for providing these services such as Globus, Legion, and Condor. As part of these efforts to develop computational grids, the Global Grid Forum is working to standardize the protocols and APIs used by various grid services. This standardization will allow interoperability between the client and server software of the toolkits that are providing the grid services. The goal of the Performance Working Group of the Grid Forum is to standardize protocols and representations related to the storage and distribution of

  9. The Development of Korea Additional Protocol System

    International Nuclear Information System (INIS)

    Shim, Hye Won; Yeo, Jin Kyun

    2008-01-01

    The Agreement between the Republic of Korea (ROK) and the IAEA for the Application of Safeguards in Connection with the Treaty on the Non-Proliferation of Nuclear Weapons (the Safeguards Agreement) entered into force on 14 November 1975. The Additional Protocol to the Safeguards Agreement (the Additional Protocol) was signed on 21 June 1999 and entered into force on 19 February 2004. ROK has been submitting annual updated reports of initial declaration on every May 15th since August 2004. Additional protocol reports were submitted through Protocol Reporter provided by IAEA. Annual declarations were simply uploaded and stored in the Accounting Information Treatment System of KINAC, which did not provide data analysis and management function. There have been demands for improvement to handle ever-increasing information. KAPS (Korea Additional Protocol System) has been developed to assist and administrate the additional protocol related works effectively. The new system enables integrated management including composition of additional protocol report and version control, periodical update of related information, results of IAEA complementary access to each facility

  10. New logistics protocols for distributed interactive simulation

    Science.gov (United States)

    Taylor, Darrin; Morrison, John; Katz, Warren; Felton, Erik; Herman, Deborah A.

    1995-06-01

    In today's environment, the transportation and maintenance of military forces is nearly as important as combat operations. Rapid deployment to regions of low-intensity conflict will become a very common training scenario for the U.S. military. Thus it is desirable to apply distributed simulation technology to train logistics personnel in their combat support roles. Currently, distributed interactive simulation (DIS) only contains rudimentary logistics protocols. This paper introduces new protocols designed to handle the logistics problem. The Newtonian protocol takes a physics-based approach to modeling interactions on the simulation network. This protocol consists of a family of protocol data units (PDUs) which are used to communicate forces in different circumstances. The protocol implements a small set of physical relations. This represents a flexible and general mechanism to describe battlefield interactions between network entities. The migratory object protocol (MOP) family addresses the transfer of control. General mechanisms provide the means to simulate resupply, repair, and maintenance of entities at any level of abstraction (individual soldier to division). It can also increase the fidelity of mine laying, enable handover of weapons for terminal guidance, allow for the distribution of aggregate-level simulation entities, provide capabilities for the simulation of personnel, etc.

  11. The Kyoto Protocol. An economic appraisal

    International Nuclear Information System (INIS)

    Grubb, M.

    2000-05-01

    This paper examines the overall economics of the Kyoto Protocol on climate change, in three main parts. The first part explores the structure of the Protocol and how this matches against classical economic criteria of an 'optimal' climate change agreement. This discussion also considers the nature of and reasons for shortcomings, and the prospects for its evolution. Given the various flexibilities in the agreement, the Kyoto Protocol is far more economically efficient in its structure than any previous global environmental agreement. The central conclusion is that, from an economic perspective, the Protocol's structure for industrialised country commitments is as good as could reasonably be expected. The second part of the paper explores more closely the economics of the commitments themselves and how they combine with the various flexibilities, briefly reviewing the available literature and using a simple spreadsheet model of how the commitments might combine with trading mechanisms under a range of assumptions. Flexibility is intrinsic and necessary, but it is argued that the allocations to Russia and Ukraine in particular mean that unlimited flexibility could render the Protocol's commitments weaker in their impacts than is economically desirable to address climate change. It is argued that, should this prove to be the case, access to the large surplus in the transition economies could be used as a control valve to limit the costs of the Protocol to within acceptable limits. Finally, the paper considers the issues of developing country involvement in the Kyoto Protocol, and the Protocol's longer-term impact and evolution, including its impact on technological evolution and dissemination and the evolution of future commitments. It is argued that taking account of such issues critically affects views of the Protocol

  12. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  13. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  14. Event-by-event simulation of quantum cryptography protocols

    NARCIS (Netherlands)

    Zhao, S.; Raedt, H. De

    We present a new approach to simulate quantum cryptography protocols using event-based processes. The method is validated by simulating the BB84 protocol and the Ekert protocol, both without and with the presence of an eavesdropper.

  15. Protocolized hyperventilation enhances electroconvulsive therapy.

    Science.gov (United States)

    de Arriba-Arnau, Aida; Dalmau, Antonia; Soria, Virginia; Salvat-Pujol, Neus; Ribes, Carmina; Sánchez-Allueva, Ana; Menchón, José Manuel; Urretavizcaya, Mikel

    2017-08-01

    Hyperventilation is recommended in electroconvulsive therapy (ECT) to enhance seizures and to increase patients' safety. However, more evidence is needed regarding its effects and the optimum method of application. This prospective study involving 21 subjects compared two procedures, protocolized hyperventilation (PHV) and hyperventilation as usual (HVau), applied to the same patient in two consecutive sessions. Transcutaneous partial pressure of carbon dioxide (TcPCO 2 ) was measured throughout all sessions. Ventilation parameters, hemodynamic measures, seizure characteristics, and side effects were also explored. PHV resulted in lower TcPCO 2 after hyperventilation (p=.008) and over the whole session (p=.035). The lowest TcPCO 2 was achieved after voluntary hyperventilation. Changes in TcPCO 2 from baseline showed differences between HVau and PHV at each session time-point (all p<.05). Between- and within-subjects factors were statistically significant in a general linear model. Seizure duration was greater in PHV sessions (p=.028), without differences in other seizure quality parameters or adverse effects. Correlations were found between hypocapnia induction and seizure quality indexes. Secondary outcomes could be underpowered. PHV produces hypocapnia before the stimulus, modifies patients' TcPCO 2 values throughout the ECT session and lengthens seizure duration. Voluntary hyperventilation is the most important part of the PHV procedure with respect to achieving hypocapnia. A specific ventilation approach, CO 2 quantification and monitoring may be advisable in ECT. PHV is easy to apply in daily clinical practice and does not imply added costs. Ventilation management has promising effects in terms of optimizing ECT technique. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. The protocol amending the 1963 Vienna Convention

    International Nuclear Information System (INIS)

    Lamm, V.

    2006-01-01

    Technically the Vienna Convention was revised by the adoption of the protocol to amend the instrument. and according to Article 19 of the protocol 'A State which is Party to this Protocol but not to the 1963 Vienna Convention shall be bound by the provisions of that Convention as amended by this Protocol in relation to other States Parties hereto, and failing an expression of a different intention by that State at the time of deposit of an instrument referred to in Article 20 shall be bound by the provisions of the 1963 Vienna Convention in relation to States which are only Parties thereto'. This solution has created a special situation, because after the entry into force of the protocol there will be living together or operating in practice 'two' Vienna Conventions, notably the convention's original text of 1963 and its new version as amended by the protocol. After the protocol has come into force, a state may only accede to the amended version, but in the inter se relations of the States Party to the 'old' Vienna Convention the provisions of that convention will remain in force until such time as they have acceded to the new protocol. This rather complicated situation is nevertheless understandable and is fully in accord with Article 40 of the 1969 Vienna Convention on the Law of Treaties, which provides for the amendment of multilateral treaties. In 1989 the negotiations on the revision of the Vienna Convention had begun with the aim of strengthening the existing nuclear liability regime and of improving the situation of potential victims of nuclear accidents. The Protocol to Amend the Vienna Convention serves those purposes; it also reflects a good compromise, since it is the outcome of a negotiation process in which experts from both nuclear and non-nuclear states, from Contacting Parties and non-Contracting Parties were very active. That affords some assurance that the compromise solution reached is acceptable to all States participating in the adoption of

  17. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  18. Security Protocol Review Method Analyzer(SPRMAN)

    OpenAIRE

    Navaz, A. S. Syed; Narayanan, H. Iyyappa; Vinoth, R.

    2013-01-01

    This Paper is designed using J2EE (JSP, SERVLET), HTML as front end and a Oracle 9i is back end. SPRMAN is been developed for the client British Telecom (BT) UK., Telecom company. Actually the requirement of BT is, they are providing Network Security Related Products to their IT customers like Virtusa,Wipro,HCL etc., This product is framed out by set of protocols and these protocols are been associated with set of components. By grouping all these protocols and components together, product is...

  19. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  20. Establishing treatment protocols for clinical mastitis.

    Science.gov (United States)

    Roberson, Jerry R

    2003-03-01

    Each farm has a unique mix of mastitis pathogens and management procedures that have evolved over time. The herd veterinarian should work with the manager/owner to systematically develop treatment protocols that meet the needs and management of the farm. To establish a mastitis treatment protocol, it is necessary to develop a system to routinely identify clinical mastitis cases, develop a herd-specific severity level assessment system, manage the clinical mastitis cases based on severity level and culture result (when available), avoid antibiotic residues, and monitor the success of the system and alter the protocol as necessary.

  1. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  2. The Singapore protocol [for quantum cryptography

    International Nuclear Information System (INIS)

    Englert, B.

    2005-01-01

    The qubit protocol for quantum key distribution presented in this talk is fully tomographic and more efficient than other tomographic protocols. Under ideal circumstances the efficiency is log 2 (4/3) = 0.415 key bits per qubit sent, which is 25% more than the efficiency of 1/3 = 0.333 for the standard 6-state protocol. One can extract 0.4 key bits per qubit by a simple two-way communication scheme, and can so get close to the information-theoretical limit. The noise thresholds for secure key bit generation in the presence of unbiased noise will be reported and discussed. (author)

  3. A Logical Analysis of Quantum Voting Protocols

    Science.gov (United States)

    Rad, Soroush Rafiee; Shirinkalam, Elahe; Smets, Sonja

    2017-12-01

    In this paper we provide a logical analysis of the Quantum Voting Protocol for Anonymous Surveying as developed by Horoshko and Kilin in (Phys. Lett. A 375, 1172-1175 2011). In particular we make use of the probabilistic logic of quantum programs as developed in (Int. J. Theor. Phys. 53, 3628-3647 2014) to provide a formal specification of the protocol and to derive its correctness. Our analysis is part of a wider program on the application of quantum logics to the formal verification of protocols in quantum communication and quantum computation.

  4. Taking an idea to a research protocol

    African Journals Online (AJOL)

    2013-11-13

    Nov 13, 2013 ... Review Article: Taking an idea to a research protocol ... step is to identify the knowledge gap within the intended field of research by examining the background ... be found by writing a critical narrative review of the literature.

  5. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... results. The most important generalization is the support for all security properties of the geometric fragment proposed by [Gut14]....... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...

  6. Oxygen tolerance test : A standardised protocol

    Directory of Open Access Journals (Sweden)

    D K Ghosh

    2015-01-01

    Conclusion: By following a standardised protocol for Oxygen Tolerance Test, an objective assessment and recordkeeping is possible. This shall entail a more effective screening during the initial diving medical examination.

  7. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  8. Authentication Protocol using Quantum Superposition States

    Energy Technology Data Exchange (ETDEWEB)

    Kanamori, Yoshito [University of Alaska; Yoo, Seong-Moo [University of Alabama, Huntsville; Gregory, Don A. [University of Alabama, Huntsville; Sheldon, Frederick T [ORNL

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  9. Technical Analysis of SSP-21 Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bromberger, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-09

    As part of the California Energy Systems for the Twenty-First Century (CES-21) program, in December 2016 San Diego Gas and Electric (SDG&E) contracted with Lawrence Livermore National Laboratory (LLNL) to perform an independent verification and validation (IV&V) of a white paper describing their Secure SCADA Protocol for the Twenty-First Century (SSP-21) in order to analyze the effectiveness and propriety of cryptographic protocol use within the SSP-21 specification. SSP-21 is designed to use cryptographic protocols to provide (optional) encryption, authentication, and nonrepudiation, among other capabilities. The cryptographic protocols to be used reflect current industry standards; future versions of SSP-21 will use other advanced technologies to provide a subset of security services.

  10. Adaptive security protocol selection for mobile computing

    NARCIS (Netherlands)

    Pontes Soares Rocha, B.; Costa, D.N.O.; Moreira, R.A.; Rezende, C.G.; Loureiro, A.A.F.; Boukerche, A.

    2010-01-01

    The mobile computing paradigm has introduced new problems for application developers. Challenges include heterogeneity of hardware, software, and communication protocols, variability of resource limitations and varying wireless channel quality. In this scenario, security becomes a major concern for

  11. Entanglement distillation protocols and number theory

    International Nuclear Information System (INIS)

    Bombin, H.; Martin-Delgado, M.A.

    2005-01-01

    We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension D benefits from applying basic concepts from number theory, since the set Z D n associated with Bell diagonal states is a module rather than a vector space. We find that a partition of Z D n into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analytically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension D. When D is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively

  12. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  13. Verbal protocols as methodological resources: research evidence

    Directory of Open Access Journals (Sweden)

    Alessandra Baldo

    2012-01-01

    Full Text Available This article aims at reflecting on the use of verbal protocols as a methodological resource in qualitative research, more specifically on the aspect regarded as the main limitation of a study about lexical inferencing in L2 (BALDO; VELASQUES, 2010: its subjective trait. The article begins with a brief literature review on protocols, followed by a description of the study in which they were employed as methodological resources. Based on that, protocol subjectivity is illustrated through samples of unparalleled data classification, carried out independently by two researchers. In the final section, the path followed to minimize the problem is presented, intending to contribute to improve efficiency in the use of verbal protocols in future research.

  14. Real-Time Fault Tolerant Networking Protocols

    National Research Council Canada - National Science Library

    Henzinger, Thomas A

    2004-01-01

    We made significant progress in the areas of video streaming, wireless protocols, mobile ad-hoc and sensor networks, peer-to-peer systems, fault tolerant algorithms, dependability and timing analysis...

  15. Development of measurement protocols for quantum magnetometry

    DEFF Research Database (Denmark)

    Stark, Alexander

    and protocols to enhance the lifetime and the coherences of the NV center with the overall goal of enhancing the capabilities of this sensor in the field of magnetometry. In order to realize complex protocols, a sophisticated software control of the measurement setup is required. A general software framework......, is serving as rigorous framework to reduce the complexity of the setup configuration by a fundamental separation of tasks. As a consequence, the general idea of this framework is not limited to experiments with color centers in diamond, but can find application in any laboratory environment. The measurement...... of magnetic fields in the high-frequency GHz regimes is challenging. In this thesis, a continuous dynamical decoupling protocol is developed and implemented, which extends the capabilities of the NV sensor to probe GHz signals with a narrow bandwidth. Moreover, the protocol protects the system from noise...

  16. How to write a research protocol

    African Journals Online (AJOL)

    A research protocol is best viewed as a key to open the gates between the researcher and ... studies will be quantitative designs and these form the focus of this paper. ..... applied to the underlying clinical problem addressed by the study.

  17. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  18. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    events. Methods like strand spaces and the inductive method of Paulson have been designed to support an intensional, event-based, style of reasoning. These methods have successfully tackled a number of protocols though in an ad hoc fashion. They make an informal spring from a protocol to its......-nets. They have persistent conditions and as we show in this thesis, unfold under reasonable assumptions to a more basic kind of nets. We relate SPL-nets to strand spaces and inductive rules, as well as trace languages and event structures so unifying a range of approaches, as well as providing conditions under...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...

  19. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    Ogawa, T.

    2001-01-01

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  20. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  1. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  2. An Evaluation Methodology for Protocol Analysis Systems

    Science.gov (United States)

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  3. Topology Discovery Using Cisco Discovery Protocol

    OpenAIRE

    Rodriguez, Sergio R.

    2009-01-01

    In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of discovering topology ...

  4. Emulation of Industrial Control Field Device Protocols

    Science.gov (United States)

    2013-03-01

    today. The protocol operates at the application layer of the open systems interconnection ( OSI ) model, meaning it operates independently of the...the OSI model. Their job is to receive serial data from an MTU in the Modbus RTU or ASCII protocol, encapsulate and transmit the data to another modem...facing connection and out-of-band logging capabilities over the other LAN -facing connection. Despite the fact that the hardware configuration of the

  5. A Review of Fair Exchange Protocols

    OpenAIRE

    Abdullah AlOtaibi; Hamza Aldabbas

    2012-01-01

    Recently, the Internet has become an essential business platform, aiding trading, distribution and sales between organisations, consumers and even between consumers themselves. This technology revolution has brought e-commerce to an entirely new level, which therefore has raised some new security issues. Security protocols in e-commerce are required to manage the transactions between buyers and sellers. In order to engage customers in e-commerce, these protocols should be well formulated and ...

  6. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek's spect...... of messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  7. Broadening and Simplifying the First SETI Protocol

    Science.gov (United States)

    Michaud, M. A. G.

    The Declaration of Principles Concerning Activities Following the Detection of Extraterrestrial Intelligence, known informally as the First SETI Protocol, is the primary existing international guidance on this subject. During the fifteen years since the document was issued, several people have suggested revisions or additional protocols. This article proposes a broadened and simplified text that would apply to the detection of alien technology in our solar system as well as to electromagnetic signals from more remote sources.

  8. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  9. Dynamic Aggregation Protocol for Wireless Sensor Networks

    OpenAIRE

    Mounir Said , Adel; William Ibrahim , Ashraf; Soua , Ahmed; Afifi , Hossam

    2013-01-01

    International audience; Sensor networks suffer from limited capabilities such as bandwidth, low processing power, and memory size. There is therefore a need for protocols that deliver sensor data in an energy-efficient way to the sink. One of those techniques, it gathers sensors' data in a small size packet suitable for transmission. In this paper, we propose a new Effective Data Aggregation Protocol (DAP) to reduce the energy consumption in Wireless Sensor Networks (WSNs), which prolongs the...

  10. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    Davidson, S.B.

    1982-01-01

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  11. Network-topology-adaptive quantum conference protocols

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication, quantum multiparty conference has made multiparty secret communication possible. Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology. However, the topology of the quantum network significantly affects the communication efficiency, e.g., parallel transmission in a channel with limited bandwidth. We have proposed two distinctive protocols, which work in two basic network topologies with efficiency higher than the existing ones. We first present a protocol which works in the reticulate network using Greeberger—Horne—Zeilinger states and entanglement swapping. Another protocol, based on quantum multicasting with quantum data compression, which can improve the efficiency of the network, works in the star-like network. The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption. In general, the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols. (general)

  12. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  13. MDEP Protocol VICWG-01. MDEP Protocol: Witnessed, Joint, and Multinational Vendor Inspection Protocol

    International Nuclear Information System (INIS)

    2014-01-01

    The Multinational Design Evaluation Programme (MDEP) was launched in 2006 by the US Nuclear Regulatory Commission (NRC) and the French Nuclear Safety Authority (ASN) with the aim of developing innovative approaches to leverage the resources and knowledge of national regulatory authorities reviewing new reactor designs. MDEP full members are regulators from Canada, People's Republic of China, Finland, France, India, Japan, Republic of Korea, Russian Federation, South Africa, Sweden, the United Kingdom and the United States of America. The United Arab Emirates and Turkey are associate members. The OECD Nuclear Energy Agency (NEA) acts as the Technical Secretariat for the MDEP. The International Atomic Energy Agency (IAEA) participates in many of the MDEP activities, including harmonisation efforts. The Vendor Inspection Cooperation Working Group (VICWG) is one of the issue-specific working groups that the MDEP members are undertaking with one long term goal of the VICWG being to maximize the use of the results obtained from other regulator's efforts in inspecting vendors. To accomplish this goal, it is vital that the regulators learn about each other's procedures, processes, and regulations. To facilitate the learning process the VICWG is coordinating vendor inspections among the involved regulatory authorities with the purpose of enhancing the understanding of each other's vendor inspection procedures. This programme is administered by the NEA. Involvement in specific inspections provides a number of opportunities for member state regulators to witness other regulators' inspection methods, gain useful information on the quality systems and manufacturing arrangements of specific vendors and where appropriate, actively participate in the inspection. The purpose of this protocol is to provide guidance to regulators that wish to carry out vendor inspections or participate in or witness other regulators' vendor inspections. It also provides

  14. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    An application-layer protocol and a network architecture have been proposed for data communications among multiple autonomous spacecraft that are required to fly in a precise formation in order to perform scientific observations. The protocol could also be applied to other autonomous vehicles operating in formation, including robotic aircraft, robotic land vehicles, and robotic underwater vehicles. A group of spacecraft or other vehicles to which the protocol applies could be characterized as a precision-formation- flying (PFF) network, and each vehicle could be characterized as a node in the PFF network. In order to support precise formation flying, it would be necessary to establish a corresponding communication network, through which the vehicles could exchange position and orientation data and formation-control commands. The communication network must enable communication during early phases of a mission, when little positional knowledge is available. Particularly during early mission phases, the distances among vehicles may be so large that communication could be achieved only by relaying across multiple links. The large distances and need for omnidirectional coverage would limit communication links to operation at low bandwidth during these mission phases. Once the vehicles were in formation and distances were shorter, the communication network would be required to provide high-bandwidth, low-jitter service to support tight formation-control loops. The proposed protocol and architecture, intended to satisfy the aforementioned and other requirements, are based on a standard layered-reference-model concept. The proposed application protocol would be used in conjunction with conventional network, data-link, and physical-layer protocols. The proposed protocol includes the ubiquitous Institute of Electrical and Electronics Engineers (IEEE) 802.11 medium access control (MAC) protocol to be used in the datalink layer. In addition to its widespread and proven use in

  15. Metabolism and disposition of a novel antineoplastic JS-38 (Benzamide, N-[4-(2,4-dimethoxyphenyl)-4,5-dihydro-5-oxo-1,2-dithiolo[4,3-b]pyrrol-6-yl]-3,5-bis (trifluoromethyl)-(9Cl)) in rats.

    Science.gov (United States)

    Zhang, Hong; Liu, Quanhai; Fan, Tingting; Fang, Yu; Li, Ying; Wang, Guoping

    2012-03-01

    The metabolism and catabolism of a novel antineoplastic (ID code JS-38),Benzamide, N-[4-(2,4-dimethoxyphenyl)-4,5-dihydro-5-oxo-1,2-dithiolo[4,3-b]pyrrol-6-yl]-3,5-bis (trifluoromethyl)-(9Cl), were investigated in Wistar rats (3 female, 3 male). LC/UV, LC/MS, LC/MS/MS, NMR and acid hydrolysis methods showed that the metabolic process of JS-38 consists of a series of acetylation and glucoronation that form a metabolic product with a unique pharmacologic property of accelerating bone-marrow cell formation, and also showed a novel metabolic pathway of being acetylated and glucuronated in series.

  16. MODELLING AND VERIFICATION OF KITSAT PACKET COMMUNICATION PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Young-Ro Lee

    1996-06-01

    Full Text Available In this paper, in order to verify KITSAT 1/2 packet communication protocols, we model the AX.25 protocol and PACSAT protocol by using an extended Petri net and then verify the correctness, boundedness, liveness and deadlock freeness of packet protocols by utilizing reachability trees.

  17. Differential phase-time shifting protocol for QKD (DPTS)

    DEFF Research Database (Denmark)

    Usuga Castaneda, Mario A.; Bacco, Davide; Christensen, Jesper Bjerge

    2016-01-01

    We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols.......We explore the implementation of a novel protocol for fiber-based high-dimensional quantum key distribution (QKD) which improves over the traditional DPS-QKD and COW protocols....

  18. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  19. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    NARCIS (Netherlands)

    Niekerk, van T.G.C.M.; Gunnink, H.; Reenen, van C.G.

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  20. Nursing Music Protocol and Postoperative Pain.

    Science.gov (United States)

    Poulsen, Michael J; Coto, Jeffrey

    2018-04-01

    Pain has always been a major concern for patients and nurses during the postoperative period. Therapies, medicines, and protocols have been developed to improve pain and anxiety but have undesirable risks to the patient. Complementary and alternative medicine therapies have been studied but have not been applied as regular protocols in the hospital setting. Music is one type of complementary and alternative medicine therapy that has been reported to have favorable results on reducing postoperative pain, anxiety, and opioid usage. However, music lacks a protocol that nurses can implement during the perioperative process. This paper is an in-depth literature review assessing a best practice recommendation and protocol that establishes a consensus in the use of music therapy. The results suggest that music therapy may consist of calming, soft tones of 60-80 beats per minute for at least 15-30 minutes at least twice daily during the pre- and postoperative periods. It is suggested that music only be used in conjunction with standards of care and not as the primary intervention of pain or anxiety. This evidence suggests that proper use of music therapy can significantly reduce surgical pain. Implementing these protocols and allowing the freedom of nursing staff to use them may lead to greater reductions in surgical pain and anxiety and a reduction in opioid use. Copyright © 2017 American Society for Pain Management Nursing. Published by Elsevier Inc. All rights reserved.

  1. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  2. A Lightweight Protocol for Secure Video Streaming.

    Science.gov (United States)

    Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis

    2018-05-14

    The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

  3. Two Cheers for the Trafficking Protocol

    Directory of Open Access Journals (Sweden)

    Anne T Gallagher

    2015-04-01

    Full Text Available The Trafficking Protocol makes an easy target for attack. Its origins lie in an attempt to control a particularly exploitative form of migration that was challenging the ability of States to control their own borders. Its parent instrument is a framework agreement to address transnational organised crime. While paying fleeting attention to the rights of victims, the Protocol, with its emphasis on criminalisation and border protection is nowhere near being a human rights treaty. On top of all that it does not even have a credible enforcement mechanism, allowing states parties wide latitude in interpreting and applying their obligations. Strangely, these seemingly insurmountable flaws have not stopped the Protocol’s emergence as perhaps the single most important development in the fight against human trafficking. Without the Protocol, arguments around definitions would have continued to block the evolution of principles and rules. Without the Protocol it is likely that the human rights system would have continued its shameful tradition of sidelining issues such as forced labour, forced sex, forced marriage and the ritual exploitation of migrant workers through debt. Most critically, the Protocol provided the impetus and template for a series of legal and political developments that, over time, have served to ameliorate some of its greatest weaknesses, including the lack of human rights protections and of a credible oversight mechanism.

  4. Supporting Adaptation of Wireless Communication Protocols

    International Nuclear Information System (INIS)

    Dhomeja, L.D.; Soomro, I.A.; Malkani, Y.A.

    2016-01-01

    Pervasive devices such as mobile phones and PDAs (Personal Digital Assistants) come with different wireless communication capabilities, for example, WiFi (Wireless Fidelity), Bluetooth, IrDA (Infrared), etc. In order for pervasive devices to interact with each other, they need to have matching (alike) communication capabilities, otherwise such heterogeneous devices would not be able to interact with each other. In this paper we address this issue and propose a system that makes devices with heterogeneous wireless communication capabilities communicate with each other. The proposed system supports adaptation of wireless communication protocols through a proxy, which sits between a client and a server, and supports adaptation of wireless communication protocols. Its functionality involves intercepting a request made by a client with a different wireless communication capability (e.g. Bluetooth) from what the server has (e.g. WiFi), connecting to the server and then sending results back to the client. We have tested the system by implementing a messaging service application and running it on the system. The proxy supports all Bluetooth protocols, i.e. OBEX (Object Exchange), L2CAP (Logical Link Control and Adaptation Protocol), RFCOM (Radio Frequency Communication) and WiFi protocol and can run on (J2MW (Java 2 Micro Edition) enabled mobile phones which support both Bluetooth and WiFi capabilities. (author)

  5. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  6. Decellularization of placentas: establishing a protocol

    Directory of Open Access Journals (Sweden)

    L.C.P.C. Leonel

    2017-11-01

    Full Text Available Biological biomaterials for tissue engineering purposes can be produced through tissue and/or organ decellularization. The remaining extracellular matrix (ECM must be acellular and preserve its proteins and physical features. Placentas are organs of great interest because they are discarded after birth and present large amounts of ECM. Protocols for decellularization are tissue-specific and have not been established for canine placentas yet. This study aimed at analyzing a favorable method for decellularization of maternal and fetal portions of canine placentas. Canine placentas were subjected to ten preliminary tests to analyze the efficacy of parameters such as the type of detergents, freezing temperatures and perfusion. Two protocols were chosen for further analyses using histology, scanning electron microscopy, immunofluorescence and DNA quantification. Sodium dodecyl sulfate (SDS was the most effective detergent for cell removal. Freezing placentas before decellularization required longer periods of incubation in different detergents. Both perfusion and immersion methods were capable of removing cells. Placentas decellularized using Protocol I (1% SDS, 5 mM EDTA, 50 mM TRIS, and 0.5% antibiotic preserved the ECM structure better, but Protocol I was less efficient to remove cells and DNA content from the ECM than Protocol II (1% SDS, 5 mM EDTA, 0.05% trypsin, and 0.5% antibiotic.

  7. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  8. Efficient Communication Protocols for Deciding Edit Distance

    DEFF Research Database (Denmark)

    Jowhari, Hossein

    2012-01-01

    In this paper we present two communication protocols on computing edit distance. In our first result, we give a one-way protocol for the following Document Exchange problem. Namely given x ∈ Σn to Alice and y ∈ Σn to Bob and integer k to both, Alice sends a message to Bob so that he learns x...... or truthfully reports that the edit distance between x and y is greater than k. For this problem, we give a randomized protocol in which Alice transmits at most O ˜ (klog 2 n) bits and each party’s time complexity is O ˜ (nlogn+k 2 log 2 n) . Our second result is a simultaneous protocol for edit distance over...... permutations. Here Alice and Bob both send a message to a third party (the referee) who does not have access to the input strings. Given the messages, the referee decides if the edit distance between x and y is at most k or not. For this problem we give a protocol in which Alice and Bob run a O...

  9. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  10. A class-chest for deriving transport protocols

    Energy Technology Data Exchange (ETDEWEB)

    Strayer, W.T.

    1996-10-01

    Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

  11. An one-time-pad key communication protocol with entanglement

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    We present an one-time-pad key communication protocol that allows secure direct communication with entanglement. Alice can send message to Bob in a deterministic manner by using local measurements and public communication. The theoretical efficiency of this protocol is double compared with BB84 protocol. We show this protocol is unconditional secure under arbitrary quantum attack. And we discuss that this protocol can be perfectly implemented with current technologies.

  12. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols.

    Science.gov (United States)

    Campagne, Fabien

    2008-02-29

    The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC), organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation). The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches). Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79-0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86-0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT Evaluation or variants of these protocols can fully substitute

  13. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    . The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA......The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not...

  14. Breaking Megrelishvili protocol using matrix diagonalization

    Science.gov (United States)

    Arzaki, Muhammad; Triantoro Murdiansyah, Danang; Adi Prabowo, Satrio

    2018-03-01

    In this article we conduct a theoretical security analysis of Megrelishvili protocol—a linear algebra-based key agreement between two participants. We study the computational complexity of Megrelishvili vector-matrix problem (MVMP) as a mathematical problem that strongly relates to the security of Megrelishvili protocol. In particular, we investigate the asymptotic upper bounds for the running time and memory requirement of the MVMP that involves diagonalizable public matrix. Specifically, we devise a diagonalization method for solving the MVMP that is asymptotically faster than all of the previously existing algorithms. We also found an important counterintuitive result: the utilization of primitive matrix in Megrelishvili protocol makes the protocol more vulnerable to attacks.

  15. Automatic Generation of Network Protocol Gateways

    DEFF Research Database (Denmark)

    Bromberg, Yérom-David; Réveillère, Laurent; Lawall, Julia

    2009-01-01

    for describing protocol behaviors, message structures, and the gateway logic.  Z2z includes a compiler that checks essential correctness properties and produces efficient code. We have used z2z to develop a number of gateways, including SIP to RTSP, SLP to UPnP, and SMTP to SMTP via HTTP, involving a range......The emergence of networked devices in the home has made it possible to develop applications that control a variety of household functions. However, current devices communicate via a multitude of incompatible protocols, and thus gateways are needed to translate between them.  Gateway construction......, however, requires an intimate knowledge of the relevant protocols and a substantial understanding of low-level network programming, which can be a challenge for many application programmers. This paper presents a generative approach to gateway construction, z2z, based on a domain-specific language...

  16. Magnetic resonance imaging protocols for paediatric neuroradiology

    International Nuclear Information System (INIS)

    Saunders, Dawn E.; Thompson, Clare; Gunny, Roxanne; Jones, Rod; Cox, Tim; Chong, Wui Khean

    2007-01-01

    Increasingly, radiologists are encouraged to have protocols for all imaging studies and to include imaging guidelines in care pathways set up by the referring clinicians. This is particularly advantageous in MRI where magnet time is limited and a radiologist's review of each patient's images often results in additional sequences and longer scanning times without the advantage of improvement in diagnostic ability. The difficulties of imaging small children and the challenges presented to the radiologist as the brain develops are discussed. We present our protocols for imaging the brain and spine of children based on 20 years experience of paediatric neurological MRI. The protocols are adapted to suit children under the age of 2 years, small body parts and paediatric clinical scenarios. (orig.)

  17. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security analysis of communication protocols is a slippery business; many “secure” protocols later turn out to be insecure. Among many, two complains are more frequent: inadequate definition of security and unstated assumptions in the security model. In our experience, one principal cause...... for such state of affairs is an apparent overlap of security and correctness, which may lead to many sloppy security definitions and security models. Although there is no inherent need to separate security and correctness requirements, practically, such separation is significant. It makes security analysis...... easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...

  18. Will OPEC lose from the Kyoto Protocol?

    International Nuclear Information System (INIS)

    Barnett, Jon; Dessai, Suraje; Webber, Michael

    2004-01-01

    A range of energy-economy models forecast losses to members of the Organisation of Petroleum Exporting Countries (OPEC) should the Kyoto Protocol come into force. These forecasts are a powerful influence in the United Nations Framework Convention on Climate Change negotiations. They are used by OPEC to advance the agenda on the impacts of response measures, covertly arguing for compensation for lost oil revenues arising from implementation of the Protocol. This paper discusses this issue, and explores the key assumptions of these models and their uncertainties. Assumptions about carbon leakage, future availability of oil reserves, substitution, innovation, and capital turnover are considered. The paper suggests that losses will not affect OPEC countries equally, and that these losses are not likely to be as substantial as the models forecast. A range of policy measures are proposed to lessen any impact the Protocol may have on OPEC

  19. Structured Transition Protocol for Children with Cystinosis

    Directory of Open Access Journals (Sweden)

    Rupesh Raina

    2017-08-01

    Full Text Available The transition from pediatric to adult medical services has a greater impact on the care of adolescents or young adults with chronic diseases such as cystinosis. This transition period is a time of psychosocial development and new responsibilities placing these patients at increased risk of non-adherence. This can lead to serious adverse effects such as graft loss and progression of the disease. Our transition protocol will provide patients, families, physicians, and all those involved a structured guide to transitioning cystinosis patients. This structured protocol depends on four areas of competency: Recognition, Insight, Self-reliance, and Establishment of healthy habits (RISE. This protocol has not been tested and therefore challenges not realized. With a focus on medical, social, and educational/vocational aspects, we aim to improve transition for cystinosis patients in all aspects of their lives.

  20. Newborn hearing screening protocol in tuscany region.

    Science.gov (United States)

    Berrettini, Stefano; Ghirri, Paolo; Lazzerini, Francesco; Lenzi, Giovanni; Forli, Francesca

    2017-09-20

    Newborn hearing screening has to be considered the first step of a program for the identification, diagnosis, treatment and habilitation/rehabilitation of children with hearing impairment. In Tuscany Region of Italy, the universal newborn hearing screening is mandatory since november 2007. The first guidelines for the execution of the screening have been released in June 2008; then many other Italian regions partially or totally adopted these guidelines. On the basis of the experience from 2008 and according to the recent evidences in the scientific literature, a new screening protocol was released in Tuscany region. The new protocol is an evolution of the previous one. Some issues reported in the previous protocol and in the Joint Committee on Infant Hearing statement published in 2007 were revised, such as the risk factors for auditory neuropathy and for late onset, progressive or acquired hearing loss. The new updated guidelines were submitted to the Sanitary Regional Council and then they have been approved in August 2016. The updated screening protocol is mainly aimed to identify newborns with a congenital moderate-to-profound hearing loss, but it also provides indications for the audiological follow-up of children with risk's factor for progressive or late onset hearing loss; further it provides indications for the audiological surveillance of children at risk for acquired hearing impairment. Then, in the new guidelines the role of the family paediatrician in the newborn hearing screening and audiological follow-up and surveillance is underscored. Finally the new guidelines provide indications for the treatment with hearing aids and cochlear implant, in accordance with the recent Italian Health Technology Assessment (HTA) guidelines. In the paper we report the modality of execution of the universal newborn hearing screening in the Tuscany Region, according to the recently updated protocol. The main features of the protocol and the critical issues are

  1. Turf Conversion Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M and V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings as a result of water conservation measures (WCMs) in energy performance contracts associated with converting turfgrass or other water-intensive plantings to water-wise and sustainable landscapes. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M and V plan, and details the procedures to use to determine water savings.

  2. Outdoor Irrigation Measurement and Verification Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Kurnik, Charles W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Stoughton, Kate M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Figueroa, Jorge [Western Resource Advocates, Boulder, CO (United States)

    2017-12-05

    This measurement and verification (M&V) protocol provides procedures for energy service companies (ESCOs) and water efficiency service companies (WESCOs) to determine water savings resulting from water conservation measures (WCMs) in energy performance contracts associated with outdoor irrigation efficiency projects. The water savings are determined by comparing the baseline water use to the water use after the WCM has been implemented. This protocol outlines the basic structure of the M&V plan, and details the procedures to use to determine water savings.

  3. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  4. Vicissitudes of Nagoya Protocol in Colombia

    International Nuclear Information System (INIS)

    Rojas Blanco, Diana Lorena

    2013-01-01

    The fair and equitable sharing of benefits arising from the utilization of genetic resources is not only one of the central objectives of the Nagoya Protocol, but also a challenge for communities of scientists, researchers, and indigenous ancestral generally for the educational community. It is therefore essential to know what the real and material implications for the population, the ratification of the Nagoya Protocol, which despite having sufficient justification and argued, highlights the need to develop legal tools, economic, technological and education for proper and fair implementation.

  5. Evolution of a C2 protocol gateway

    CSIR Research Space (South Africa)

    Duvenhage, A

    2008-06-01

    Full Text Available real-time or slower than real-time, depending on the type of link and the data source: The gateway normally reads logged raw protocol data much faster than real-time; a simulation could also start running slower than real-time if it requires too... inherent support for logging and playback of the raw protocol data. From a software architecture perspective, each link has a corresponding link component that is responsible for opening and closing the connection, as well as reading and writing...

  6. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom......Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any...

  7. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Science.gov (United States)

    Mehmood, Zahid; Chen, Gongliang; Li, Jianhua; Li, Linsen; Alzahrani, Bander

    2017-01-01

    Over the past few years, Session Initiation Protocol (SIP) is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  8. A robust ECC based mutual authentication protocol with anonymity for session initiation protocol.

    Directory of Open Access Journals (Sweden)

    Zahid Mehmood

    Full Text Available Over the past few years, Session Initiation Protocol (SIP is found as a substantial application-layer protocol for the multimedia services. It is extensively used for managing, altering, terminating and distributing the multimedia sessions. Authentication plays a pivotal role in SIP environment. Currently, Lu et al. presented an authentication protocol for SIP and profess that newly proposed protocol is protected against all the familiar attacks. However, the detailed analysis describes that the Lu et al.'s protocol is exposed against server masquerading attack and user's masquerading attack. Moreover, it also fails to protect the user's identity as well as it possesses incorrect login and authentication phase. In order to establish a suitable and efficient protocol, having ability to overcome all these discrepancies, a robust ECC-based novel mutual authentication mechanism with anonymity for SIP is presented in this manuscript. The improved protocol contains an explicit parameter for user to cope the issues of security and correctness and is found to be more secure and relatively effective to protect the user's privacy, user's masquerading and server masquerading as it is verified through the comprehensive formal and informal security analysis.

  9. A Clustering Routing Protocol for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinke Huang

    2016-01-01

    Full Text Available The dynamic topology of a mobile ad hoc network poses a real challenge in the design of hierarchical routing protocol, which combines proactive with reactive routing protocols and takes advantages of both. And as an essential technique of hierarchical routing protocol, clustering of nodes provides an efficient method of establishing a hierarchical structure in mobile ad hoc networks. In this paper, we designed a novel clustering algorithm and a corresponding hierarchical routing protocol for large-scale mobile ad hoc networks. Each cluster is composed of a cluster head, several cluster gateway nodes, several cluster guest nodes, and other cluster members. The proposed routing protocol uses proactive protocol between nodes within individual clusters and reactive protocol between clusters. Simulation results show that the proposed clustering algorithm and hierarchical routing protocol provide superior performance with several advantages over existing clustering algorithm and routing protocol, respectively.

  10. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    is formalised in an extension of the LySa process calculus with blinding signatures. The analysis, which is fully automatic, pinpoints previously undiscovered flaws related to verifiability and accuracy and we suggest modifications of the protocol needed for validating these properties....

  11. Development of bull trout sampling protocols

    Science.gov (United States)

    R. F. Thurow; J. T. Peterson; J. W. Guzevich

    2001-01-01

    This report describes results of research conducted in Washington in 2000 through Interagency Agreement #134100H002 between the U.S. Fish and Wildlife Service (USFWS) and the U.S. Forest Service Rocky Mountain Research Station (RMRS). The purpose of this agreement is to develop a bull trout (Salvelinus confluentus) sampling protocol by integrating...

  12. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  13. The Nagoya Protocol: Fragmentation or Consolidation?

    Directory of Open Access Journals (Sweden)

    Carmen Richerzhagen

    2014-02-01

    Full Text Available In October, 2010, a protocol on access and benefit-sharing (ABS of genetic resources was adopted, the so-called Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity. Before the adoption of the Nagoya Protocol, the governance architecture of ABS was already characterized by a multifaceted institutional environment. The use of genetic resources is confronted with many issues (conservation, research and development, intellectual property rights, food security, health issues, climate change that are governed by different institutions and agreements. The Nagoya Protocol contributes to increased fragmentation. However, the question arises whether this new regulatory framework can help to advance the implementation of the ABS provisions of the Convention on Biological Diversity (CBD. This paper attempts to find an answer to that question by following three analytical steps. First, it analyzes the causes of change against the background of theories of institutional change. Second, it aims to assess the typology of the architecture in order to find out if this new set of rules will contribute to a more synergistic, cooperative or conflictive architecture of ABS governance. Third, the paper looks at the problem of “fit” and identifies criteria that can be used to assess the new ABS governance architecture with regard to its effectiveness.

  14. Real-time communication protocols: an overview

    NARCIS (Netherlands)

    Hanssen, F.T.Y.; Jansen, P.G.

    2003-01-01

    This paper describes several existing data link layer protocols that provide real-time capabilities on wired networks, focusing on token-ring and Carrier Sense Multiple Access based networks. Existing modifications to provide better real-time capabilities and performance are also described. Finally

  15. Protocol design and implementation using formal methods

    NARCIS (Netherlands)

    van Sinderen, Marten J.; Ferreira Pires, Luis; Pires, L.F.; Vissers, C.A.

    1992-01-01

    This paper reports on a number of formal methods that support correct protocol design and implementation. These methods are placed in the framework of a design methodology for distributed systems that was studied and developed within the ESPRIT II Lotosphere project (2304). The paper focuses on

  16. On BAN logics for industrial security protocols

    NARCIS (Netherlands)

    Agray, N.; Hoek, van der W.; Vink, de E.P.; Dunin-Keplicz, B.; Nawarecki, E.

    2002-01-01

    This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism

  17. Radiotherapy QA of the DAHANCA 19 protocol

    DEFF Research Database (Denmark)

    Samsøe, E.; Andersen, E.; Hansen, C. R.

    2015-01-01

    Purpose/Objective: It has been demonstrated that nonadherence to protocol-specified radiotherapy (RT) requirements is associated with reduced survival, local control and potentially increased toxicity [1]. Thus, quality assurance (QA) of RT is important when evaluating the results of clinical...

  18. Recursion Versus Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Hüttel, Hans; Srba, Jiri

    2005-01-01

    We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbee...

  19. Semantics and logic for security protocols

    NARCIS (Netherlands)

    Jacobs, B.P.F.; Hasuo, I.

    2009-01-01

    This paper presents a sound BAN-like logic for reasoning about security protocols with theorem prover support. The logic has formulas for sending and receiving messages (with nonces, public and private encryptions, etc.), and has both temporal and epistemic operators (describing the knowledge of

  20. Monitoring System with Two Central Facilities Protocol

    Directory of Open Access Journals (Sweden)

    Caesar Firdaus

    2017-03-01

    Full Text Available The security of data and information on government’s information system required proper way of defending against threat. Security aspect can be achieved by using cryptography algorithm, applying information hiding concept, and implementing security protocol. In this research, two central facilities protocol was implemented on Research and Development Center of Mineral and Coal Technology’s Cooperation Contract Monitoring System by utilizing AES and whitespace manipulation algorithm. Adjustment on the protocol by creating several rule of validation ID’s generation and checking processes could fulfill two of four cryptography objectives, consist of authentication and non-repudiation. The solid collaboration between central legitimization agency (CLA, central tabulating facility (CTF, and client is the main idea in two central facilities protocol. The utilization of AES algorithm could defend the data on transmission from man in the middle attack scenario. On the other hand, whitespace manipulation algorithm provided data integrity aspect of the document that is uploaded to the system itself. Both of the algorithm fulfill confidentiality, data integrity, and authentication.

  1. Formalization of Quantum Protocols using Coq

    Directory of Open Access Journals (Sweden)

    Jaap Boender

    2015-11-01

    Full Text Available Quantum Information Processing, which is an exciting area of research at the intersection of physics and computer science, has great potential for influencing the future development of information processing systems. The building of practical, general purpose Quantum Computers may be some years into the future. However, Quantum Communication and Quantum Cryptography are well developed. Commercial Quantum Key Distribution systems are easily available and several QKD networks have been built in various parts of the world. The security of the protocols used in these implementations rely on information-theoretic proofs, which may or may not reflect actual system behaviour. Moreover, testing of implementations cannot guarantee the absence of bugs and errors. This paper presents a novel framework for modelling and verifying quantum protocols and their implementations using the proof assistant Coq. We provide a Coq library for quantum bits (qubits, quantum gates, and quantum measurement. As a step towards verifying practical quantum communication and security protocols such as Quantum Key Distribution, we support multiple qubits, communication and entanglement. We illustrate these concepts by modelling the Quantum Teleportation Protocol, which communicates the state of an unknown quantum bit using only a classical channel.

  2. Equilibria of Generalized Cut and Choose Protocols

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis; Kurokawa, David

    Classic cake cutting protocols — which fairly allocate a divisible good among agents with heterogeneous preferences — are susceptible to manipulation. Do their strategic outcomes still guarantee fairness? To answer this question we adopt a novel algo rithmic approach, proposing a concrete computa...

  3. Behaviour Protocols Verification: Fighting State Explosion

    Czech Academy of Sciences Publication Activity Database

    Mach, M.; Plášil, František; Kofroň, Jan

    2005-01-01

    Roč. 6, č. 2 (2005), s. 22-30 ISSN 1525-9293 R&D Projects: GA ČR(CZ) GA102/03/0672 Institutional research plan: CEZ:AV0Z10300504 Keywords : formal verification * software components * stateexplos ion * behavior protocols * parse trees Subject RIV: JC - Computer Hardware ; Software

  4. An evidence based blunt trauma protocol

    NARCIS (Netherlands)

    Vugt, R. van; Kool, D.R.; Lubeek, S.F.K.; Dekker, H.M.; Brink, M.; Deunk, J.; Edwards, M.J.R.

    2013-01-01

    OBJECTIVE: Currently CT is rapidly implemented in the evaluation of trauma patients. In anticipation of a large international multicentre trial, this study's aim was to evaluate the clinical feasibility of a new diagnostic protocol, used for the primary radiological evaluation in adult blunt

  5. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 3. IPv6: The Next Generation Internet Protocol - IPv4 and its Shortcomings. Harsha Srinath. General Article Volume 8 Issue 3 March 2003 pp 33-41. Fulltext. Click here to view fulltext PDF. Permanent link:

  6. IPv6: The Next Generation Internet Protocol

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 4. IPv6: The Next Generation Internet Protocol - New Features in IPv6. Harsha Srinath. General Article Volume 8 Issue 4 April 2003 pp 8-16. Fulltext. Click here to view fulltext PDF. Permanent link:

  7. Rethinking Protocol Analysis from a Cultural Perspective.

    Science.gov (United States)

    Smagorinsky, Peter

    2001-01-01

    Outlines a cultural-historical activity theory (CHAT) perspective that accounts for protocol analysis along three key dimensions: the relationship between thinking and speech from a representational standpoint; the social role of speech in research methodology; and the influence of speech on thinking and data collection. (Author/VWL)

  8. Current Sterilization Protocols-An Orthodontic Perspective

    Directory of Open Access Journals (Sweden)

    Abraham Vinod Korath

    2010-01-01

    Part I of this article focuses on the working principles of various methods of sterilization with an appraisalof their effects on orthodontic instruments. Additionally,contributory factors of instrument damage is enumerated to emphasis the importance of adhering to precise protocols and manufacturer recommendations as well as in alleviating some misconceptions about sterilization induced instrument damage.

  9. A Geographical Heuristic Routing Protocol for VANETs

    Science.gov (United States)

    Urquiza-Aguiar, Luis; Tripp-Barba, Carolina; Aguilar Igartua, Mónica

    2016-01-01

    Vehicular ad hoc networks (VANETs) leverage the communication system of Intelligent Transportation Systems (ITS). Recently, Delay-Tolerant Network (DTN) routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR) protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation). PMID:27669254

  10. International protocol on volatile organic compounds

    International Nuclear Information System (INIS)

    Gauthier, J.-P.

    1992-01-01

    In August 1991, negotiations between Canada, the USA, and 33 European countries led to an international protocol on reducing the emissions of volatile organic compounds (VOC), which are responsible for serious ozone pollution problems. This was the third transborder pollution agreement developed under the auspices of the United Nations Economic Commission for Europe. Certain aspects of negotiations related to an earlier protocol developed for SO 2 and nitrogen oxide emissions had reappeared during the VOC negotiations, and these aspects are discussed. The VOC protocol proposes three approaches to satisfy basic obligations: reducing VOC emissions of a country by 30%, reducing VOC emissions by 30% in certain regions, and ensuring a freeze in VOC emissions in a country starting on a specified date. The protocol also introduces a new concept, that of zones of tropospheric ozone management. In Canada, plans for management of nitrogen oxides and VOC have been adapted to the ozone problem, and the management plan has been developed by a consultation process involving all sectors of society including industry, environmental groups, and governments. In Canada, it will be sufficient to reduce total VOC emissions by 16% during a first phase and to increase these reductions slightly in the second phase. Special ozone management zones in the Quebec City/Windsor corridor and the Fraser River valley have been established

  11. Performance comparison of secure comparison protocols

    NARCIS (Netherlands)

    Kerschbaum, F.; Biswas, D.; Hoogh, de S.J.A.

    2009-01-01

    Secure multiparty computation (SMC) has gained tremendous importance with the growth of the Internet and e-commerce, where mutually untrusted parties need to jointly compute a function of their private inputs. However, SMC protocols usually have very high computational complexities, rendering them

  12. Novel protocol for persister cells isolation.

    Directory of Open Access Journals (Sweden)

    Silvia J Cañas-Duarte

    Full Text Available Bacterial persistence, where a fraction of a population presents a transient resistance to bactericidal substances, has great medical importance due to its relation with the appearance of antibiotic resistances and untreatable bacterial chronic infections. The mechanisms behind this phenomenon remain largely unknown in spite of recent advances, in great part because of the difficulty in isolating the very small fraction of the population that is in this state at any given time. Current protocols for persister isolation have resulted in possible biases because of the induction of this state by the protocol itself. Here we present a novel protocol that allows rapid isolation of persister cells both from exponential and stationary phase. Moreover, it is capable of differentiating between type I and type II persister cells, which should allow the field to move beyond its current state of studying only one type. While this protocol prompts a revision of many of the current results, it should greatly facilitate further advances in the field.

  13. Direct data access protocols benchmarking on DPM

    Science.gov (United States)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  14. Quantum protocols within Spekkens' toy model

    Science.gov (United States)

    Disilvestro, Leonardo; Markham, Damian

    2017-05-01

    Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.

  15. SPECT/CT workflow and imaging protocols

    Energy Technology Data Exchange (ETDEWEB)

    Beckers, Catherine [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Hustinx, Roland [University Hospital of Liege, Division of Nuclear Medicine and Oncological Imaging, Department of Medical Physics, Liege (Belgium); Domaine Universitaire du Sart Tilman, Service de Medecine Nucleaire et Imagerie Oncologique, CHU de Liege, Liege (Belgium)

    2014-05-15

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  16. SPECT/CT workflow and imaging protocols

    International Nuclear Information System (INIS)

    Beckers, Catherine; Hustinx, Roland

    2014-01-01

    Introducing a hybrid imaging method such as single photon emission computed tomography (SPECT)/CT greatly alters the routine in the nuclear medicine department. It requires designing new workflow processes and the revision of original scheduling process and imaging protocols. In addition, the imaging protocol should be adapted for each individual patient, so that performing CT is fully justified and the CT procedure is fully tailored to address the clinical issue. Such refinements often occur before the procedure is started but may be required at some intermediate stage of the procedure. Furthermore, SPECT/CT leads in many instances to a new partnership with the radiology department. This article presents practical advice and highlights the key clinical elements which need to be considered to help understand the workflow process of SPECT/CT and optimise imaging protocols. The workflow process using SPECT/CT is complex in particular because of its bimodal character, the large spectrum of stakeholders, the multiplicity of their activities at various time points and the need for real-time decision-making. With help from analytical tools developed for quality assessment, the workflow process using SPECT/CT may be separated into related, but independent steps, each with its specific human and material resources to use as inputs or outputs. This helps identify factors that could contribute to failure in routine clinical practice. At each step of the process, practical aspects to optimise imaging procedure and protocols are developed. A decision-making algorithm for justifying each CT indication as well as the appropriateness of each CT protocol is the cornerstone of routine clinical practice using SPECT/CT. In conclusion, implementing hybrid SPECT/CT imaging requires new ways of working. It is highly rewarding from a clinical perspective, but it also proves to be a daily challenge in terms of management. (orig.)

  17. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  18. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  19. Cross-Layer Protocol as a Better Option in Wireless Mesh Network with Respect to Layered-Protocol

    OpenAIRE

    Ahmed Abdulwahab Al-Ahdal; Dr. V. P. Pawar; G. N. Shinde

    2014-01-01

    The Optimal way to improve Wireless Mesh Networks (WMNs) performance is to use a better network protocol, but whether layered-protocol design or cross-layer design is a better option to optimize protocol performance in WMNs is still an on-going research topic. In this paper, we focus on cross-layer protocol as a better option with respect to layered-protocol. The layered protocol architecture (OSI) model divides networking tasks into layers and defines a pocket of services for each layer to b...

  20. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  1. Sufficient Conditions for Vertical Composition of Security Protocols (Extended Version)

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Viganò, Luca

    a certain kind of channel as a goal and another secure protocol P2 that assumes this kind of channel, can we then derive that their vertical composition P2[P1] is secure? It is well known that protocol composition can lead to attacks even when the individual protocols are all secure in isolation......Vertical composition of security protocols means that an application protocol (e.g., a banking service) runs over a channel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that provides....... In this paper, we formalize seven easy-to-check static conditions that support a large class of channels and applications and that we prove to be su_cient for vertical security protocol composition....

  2. SPIRIT 2013 Statement: defining standard protocol items for clinical trials.

    Science.gov (United States)

    Chan, An-Wen; Tetzlaff, Jennifer M; Altman, Douglas G; Laupacis, Andreas; Gøtzsche, Peter C; Krle A-Jerić, Karmela; Hrobjartsson, Asbjørn; Mann, Howard; Dickersin, Kay; Berlin, Jesse A; Dore, Caroline J; Parulekar, Wendy R; Summerskill, William S M; Groves, Trish; Schulz, Kenneth F; Sox, Harold C; Rockhold, Frank W; Rennie, Drummond; Moher, David

    2015-12-01

    The protocol of a clinical trial serves as the foundation for study planning, conduct, reporting, and appraisal. However, trial protocols and existing protocol guidelines vary greatly in content and quality. This article describes the systematic development and scope of SPIRIT (Standard Protocol Items: Recommendations for Interventional Trials) 2013, a guideline for the minimum content of a clinical trial protocol. The 33-item SPIRIT checklist applies to protocols for all clinical trials and focuses on content rather than format. The checklist recommends a full description of what is planned; it does not prescribe how to design or conduct a trial. By providing guidance for key content, the SPIRIT recommendations aim to facilitate the drafting of high-quality protocols. Adherence to SPIRIT would also enhance the transparency and completeness of trial protocols for the benefit of investigators, trial participants, patients, sponsors, funders, research ethics committees or institutional review boards, peer reviewers, journals, trial registries, policymakers, regulators, and other key stakeholders.

  3. Analytical protocols for characterisation of sulphur-free lignin

    NARCIS (Netherlands)

    Gosselink, R.J.A.; Abächerli, A.; Semke, H.; Malherbe, R.; Käuper, P.; Nadif, A.; Dam, van J.E.G.

    2004-01-01

    Interlaboratory tests for chemical characterisation of sulphur-free lignins were performed by five laboratories to develop useful analytical protocols, which are lacking, and identify quality-related properties. Protocols have been established for reproducible determination of the chemical

  4. Large family of quantum weak coin-flipping protocols

    International Nuclear Information System (INIS)

    Mochon, Carlos

    2005-01-01

    Each classical public-coin protocol for coin flipping is naturally associated with a quantum protocol for weak coin flipping. The quantum protocol is obtained by replacing classical randomness with quantum entanglement and by adding a cheat detection test in the last round that verifies the integrity of this entanglement. The set of such protocols defines a family which contains the protocol with bias 0.192 previously found by the author, as well as protocols with bias as low as 1/6 described herein. The family is analyzed by identifying a set of optimal protocols for every number of messages. In the end, tight lower bounds for the bias are obtained which prove that 1/6 is optimal for all protocols within the family

  5. Principles of the new quantum cryptography protocols building

    International Nuclear Information System (INIS)

    Kurochkin, V.; Kurochkin, Yu.

    2009-01-01

    The main aim of the quantum cryptography protocols is the maximal secrecy under the conditions of the real experiment. This work presents the result of the new protocol building with the use of the secrecy maximization. While using some well-known approaches this method has allowed one to achieve completely new results in quantum cryptography. The process of the protocol elaboration develops from the standard BB84 protocol upgrading to the building of completely new protocol with arbitrary large bases number. The secrecy proofs of the elaborated protocol appear to be natural continuation of the protocol building process. This approach reveals possibility to reach extremely high parameters of the protocol. It suits both the restrictions of contemporary technologies and requirements for high bit rate while being absolutely secret

  6. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  7. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  8. Securing statically-verified communications protocols against timing attacks

    DEFF Research Database (Denmark)

    Buchholtz, Mikael; Gilmore, Stephen; Hillston, Jane

    2004-01-01

    We present a federated analysis of communication protocols which considers both security properties and timing. These are not entirely independent observations of a protocol; by using timing observations of an executing protocol it is possible to deduce derived information about the nature...... of the communication even in the presence of unbreakable encryption. Our analysis is based on expressing the protocol as a process algebra model and deriving from this process models analysable by the Imperial PEPA Compiler and the LySatool....

  9. Re-examining the security of blind quantum signature protocols

    International Nuclear Information System (INIS)

    Wang Mingming; Chen Xiubo; Niu Xinxin; Yang Yixian

    2012-01-01

    Recently, blind quantum signature (BQS) protocols have been proposed with the help of a third-party verifier. However, our research shows that some of the BQS protocols are unable to complete the blind signature task fairly if the verifier is dishonest. Indeed, these protocols can be viewed as variants of the classical digital signature scheme of symmetric-key cryptography. If nobody is trusted in such protocols, digital signature cannot be implemented since disagreements cannot be solved fairly.

  10. Optimized UAV Communication Protocol Based on Prior Locations

    OpenAIRE

    Sboui, Lokman; Rabah, Abdullatif

    2015-01-01

    In this paper, we adopt a new communication protocol between the UAV and fixed on-ground nodes. This protocol tends to reduce communication power consumption by stopping communication if the channel is not good to communicate (i.e. far nodes, obstacles, etc.) The communication is performed using the XBee 868M standard and Libelium wapsmotes. Our designed protocol is based on a new communication model that we propose in this paper. The protocole decides wether to communicate or not after compu...

  11. An Optimal Non-Interactive Message Authentication Protocol

    OpenAIRE

    Pasini, Sylvain; Vaudenay, Serge

    2006-01-01

    Vaudenay recently proposed a message authentication protocol which is interactive and based on short authenticated strings (SAS). We study here SAS-based non-interactive message authentication protocols (NIMAP). We start by the analysis of two popular non-interactive message authentication protocols. The first one is based on a collision-resistant hash function and was presented by Balfanz et al. The second protocol is based on a universal hash function family and was proposed by Gehrmann, Mi...

  12. CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, M. G.; Kabir, M. Hasnat; Rahim, M. Sajjadur; Ullah, Sk. Enayet

    2012-01-01

    A new two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP) is proposed in this paper. It is an extension of LEACH routing protocol. We introduce cluster head-set idea for cluster-based routing where several clusters are formed with the deployed sensors to collect information from target field. On rotation basis, a head-set member receives data from the neighbor nodes and transmits the aggregated results to the distance base station. This protocol ...

  13. A model based security testing method for protocol implementation.

    Science.gov (United States)

    Fu, Yu Long; Xin, Xiao Long

    2014-01-01

    The security of protocol implementation is important and hard to be verified. Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required. In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

  14. Mouse cell culture - Methods and protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-12-01

    Full Text Available The mouse is, out of any doubt, the experimental animal par excellence for many many colleagues within the scientific community, notably for those working in mammalian biology (in a broad sense, from basic genetic to modeling human diseases, starting at least from 1664 Robert Hooke experiments on air’s propertyn. Not surprising then that mouse cell cultures is a well established field of research itself and that there are several handbooks devoted to this discipline. Here, Andrew Ward and David Tosh provide a necessary update of the protocols currently needed. In fact, nearly half of the book is devoted to stem cells culture protocols, mainly embryonic, from a list of several organs (kidney, lung, oesophagus and intestine, pancreas and liver to mention some........

  15. Gamma camera performance: technical assessment protocol

    International Nuclear Information System (INIS)

    Bolster, A.A.; Waddington, W.A.

    1996-01-01

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera's computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author)

  16. Kyoto protocol and Nepal's energy sector

    International Nuclear Information System (INIS)

    Pokharel, Shaligram

    2007-01-01

    Nepal has recently ratified Kyoto Protocol, which considers justifiable use of resources to limit or reduce the emission of gases that contribute to green house gas inventory in the atmosphere. Nepal's per capita green gas (GHG) emission from energy use is insignificant. However, it is important for Nepal to adopt environmentally friendly energy options based on local resources like hydropower and biomass. Nepal can benefit from the provisions of clean development mechanism (CDM) under the Kyoto Protocol of the United Nations Framework Convention on Climate Change (UNFCC) or carbon funds being promoted by various organizations in order to obtain funding for new projects that reduce GHG emissions (ER). Funding can be generated through Carbon trading in international market as well. In this paper, the country's current contribution to GHG due to energy consumption is evaluated. Options for promoting more sustainable and environmentally friendly projects have also been discussed

  17. Automated Verification of Quantum Protocols using MCMAS

    Directory of Open Access Journals (Sweden)

    F. Belardinelli

    2012-07-01

    Full Text Available We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC, an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  18. May the Kyoto protocol produce results?

    International Nuclear Information System (INIS)

    Jaureguy-Naudin, M.

    2009-01-01

    A not well managed drastic reduction of greenhouse emissions might result in significant decrease of living standards, but without such reduction efforts, climate change might have five to twenty times higher costs. Thus, while indicating estimated consequences or evolutions of greenhouse emissions and temperature, the author stresses the need of emission reduction. She discusses the role of economic instruments which can be used in policies aimed at the struggle against climate change. She recalls the emission reduction commitments specified in the Kyoto protocol, discusses the present status, operation and results of the international emission trading scheme, the lessons learned after the first years of operation, comments the involvement of emerging countries in relationship with another mechanism defined in the protocol: the Clean Development Mechanism

  19. Direct data access protocols benchmarking on DPM

    CERN Document Server

    Furano, Fabrizio; Keeble, Oliver; Mancinelli, Valentina

    2015-01-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring infor...

  20. Internet Core Protocols Help for Network Administrators

    CERN Document Server

    Hall, Eric

    2000-01-01

    If you've ever been responsible for a network, you know that sinkingfeeling: your pager has gone off at 2 a.m., the network is broken, and you can't figure out why by using a dial-in connection from home. You drive into the office, dig out your protocol analyzer, and spend the next fourhours trying to put things back together before the staff shows up for work. When this happens, you often find yourself looking at the low-level guts of the Internet protocols: you're deciphering individual packets, trying to figure out what is (or isn't) happening. Until now, the only real guide to the protoc

  1. UV Impacts Avoided by the Montreal Protocol

    Science.gov (United States)

    Newman, Paul; McKenzie, Richard

    2010-01-01

    Temporal and geographical variabilities in the future "World Expected" UV environment are compared with the "World Avoided", which would have occurred without the Montreal Protocol on protection of the ozone layer and its subsequent amendments and adjustments. Based on calculations of clear-sky UV irradiances, the effects of the Montreal Protocol have been hugely beneficial to avoid the health risks, such as skin cancer, which are associated with high UV, while there is only a small increase in health risks, such as vitamin D deficiency, that are associated with low UV. However, interactions with climate change may lead to changes in cloud and albedo, and possibly behavioural changes which could also be important.

  2. Protocol for the verification of minimum criteria

    International Nuclear Information System (INIS)

    Gaggiano, M.; Spiccia, P.; Gaetano Arnetta, P.

    2014-01-01

    This Protocol has been prepared with reference to the provisions of article 8 of the Legislative Decree of May 26, 2000 No. 187. Quality controls of radiological equipment fit within the larger 'quality assurance Program' and are intended to ensure the correct operation of the same and the maintenance of that State. The pursuit of this objective guarantees that the radiological equipment subjected to those controls also meets the minimum criteria of acceptability set out in annex V of the aforementioned legislative decree establishing the conditions necessary to allow the functions to which each radiological equipment was designed, built and for which it is used. The Protocol is established for the purpose of quality control of radiological equipment of Cone Beam Computer Tomography type and reference document, in the sense that compliance with stated tolerances also ensures the subsistence minimum acceptability requirements, where applicable.

  3. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i.......e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful...... in this direction is to extend saturation-based techniques so that enough state information can be modelled and analysed. Finally, we present a methodology for proving the same security properties in the computational model, by means of typing protocol implementations....

  4. Gamma camera performance: technical assessment protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bolster, A.A. [West Glasgow Hospitals NHS Trust, London (United Kingdom). Dept. of Clinical Physics; Waddington, W.A. [University College London Hospitals NHS Trust, London (United Kingdom). Inst. of Nuclear Medicine

    1996-12-31

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera`s computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author).

  5. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  6. Montreal Protocol Benefits simulated with CCM SOCOL

    Directory of Open Access Journals (Sweden)

    T. Egorova

    2013-04-01

    Full Text Available Ozone depletion is caused by the anthropogenic increase of halogen-containing species in the atmosphere, which results in the enhancement of the concentration of reactive chlorine and bromine in the stratosphere. To reduce the influence of anthropogenic ozone-depleting substances (ODS, the Montreal Protocol was agreed by Governments in 1987, with several Amendments and Adjustments adopted later. In order to assess the benefits of the Montreal Protocol and its Amendments and Adjustments (MPA on ozone and UV radiation, two different runs of the chemistry-climate model (CCM SOCOL have been carried out. The first run was driven by the emission of ozone depleting substances (ODS prescribed according to the restrictions of the MPA. For the second run we allow the ODS to grow by 3% annually. We find that the MPA would have saved up to 80% of the global annual total ozone by the end of the 21st century. Our calculations also show substantial changes of the stratospheric circulation pattern as well as in surface temperature and precipitations that could occur in the world without MPA implementations. To illustrate the changes in UV radiation at the surface and to emphasise certain features, which can only be seen for some particular regions if the influence of the cloud cover changes is accounted for, we calculate geographical distribution of the erythemally weighted irradiance (Eery. For the no Montreal Protocol simulation Eery increases by factor of 4 to 16 between the 1970s and 2100. For the scenario including the Montreal Protocol it is found that UV radiation starts to decrease in 2000, with continuous decline of 5% to 10% at middle latitudes in the both Northern and Southern Hemispheres.

  7. 47 CFR 11.31 - EAS protocol.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false EAS protocol. 11.31 Section 11.31... characters. FM or TV call signs must use a slash ASCII character number 47 (/) in lieu of a dash. (c) The EAS... the State EAS Mapbook. FIPS# State: AL 01 AK 02 AZ 04 AR 05 CA 06 CO 08 CT 09 DE 10 DC 11 FL 12 GA 13...

  8. Building America House Simulation Protocols (Revised)

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  9. D-RATS 2011: RAFT Protocol Overview

    Science.gov (United States)

    Utz, Hans

    2011-01-01

    A brief overview presentation on the protocol used during the D-RATS2011 field test for file transfer from the field-test robots at Black Point Lava Flow AZ to Johnson Space Center, Houston TX over a simulated time-delay. The file transfer actually uses a commercial implementation of an open communications standard. The focus of the work lies on how to make the state of the distributed system observable.

  10. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  11. Modeling and Verification of the Bitcoin Protocol

    OpenAIRE

    Chaudhary, Kaylash; Fehnker, Ansgar; van de Pol, Jaco; Stoelinga, Marielle

    2015-01-01

    Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would...

  12. Witnet: A Decentralized Oracle Network Protocol

    OpenAIRE

    de Pedro, Adán Sánchez; Levi, Daniele; Cuende, Luis Iván

    2017-01-01

    Witnet is a decentralized oracle network (DON) that connects smart contracts to the outer world. Generally speaking, it allows any piece of software to retrieve the contents published at any web address at a certain point in time, with complete and verifiable proof of its integrity and without blindly trusting any third party. Witnet runs on a blockchain with a native protocol token (called Wit), which miners-called witnesses-earn by retrieving, attesting and delivering web contents for clien...

  13. Internet of Things: Architectures, Protocols, and Applications

    OpenAIRE

    Sethi, Pallavi; Sarangi, Smruti R.

    2017-01-01

    The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human ...

  14. MR efficiency using automated MRI-desktop eProtocol

    Science.gov (United States)

    Gao, Fei; Xu, Yanzhe; Panda, Anshuman; Zhang, Min; Hanson, James; Su, Congzhe; Wu, Teresa; Pavlicek, William; James, Judy R.

    2017-03-01

    MRI protocols are instruction sheets that radiology technologists use in routine clinical practice for guidance (e.g., slice position, acquisition parameters etc.). In Mayo Clinic Arizona (MCA), there are over 900 MR protocols (ranging across neuro, body, cardiac, breast etc.) which makes maintaining and updating the protocol instructions a labor intensive effort. The task is even more challenging given different vendors (Siemens, GE etc.). This is a universal problem faced by all the hospitals and/or medical research institutions. To increase the efficiency of the MR practice, we designed and implemented a web-based platform (eProtocol) to automate the management of MRI protocols. It is built upon a database that automatically extracts protocol information from DICOM compliant images and provides a user-friendly interface to the technologists to create, edit and update the protocols. Advanced operations such as protocol migrations from scanner to scanner and capability to upload Multimedia content were also implemented. To the best of our knowledge, eProtocol is the first MR protocol automated management tool used clinically. It is expected that this platform will significantly improve the radiology operations efficiency including better image quality and exam consistency, fewer repeat examinations and less acquisition errors. These protocols instructions will be readily available to the technologists during scans. In addition, this web-based platform can be extended to other imaging modalities such as CT, Mammography, and Interventional Radiology and different vendors for imaging protocol management.

  15. An entanglement concentration protocol for cluster states using ...

    Indian Academy of Sciences (India)

    Permanent link: http://www.ias.ac.in/article/fulltext/pram/086/05/0973-0983 ... The purpose of this paper is a proposal on entanglement concentration protocol forcluster states. The protocol ... We also make a comparative numerical study of the residual entanglement left out after the execution of each step of the protocol.

  16. Feeling Is Believing: A Secure Template Exchange Protocol

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.; Lee, Seong-Whan; Li, Stan Z.

    We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol efficiently calculates a shared secret key from biometric data. The protocol is used in an application where grip

  17. Caltech computer scientists develop FAST protocol to speed up Internet

    CERN Multimedia

    2003-01-01

    "Caltech computer scientists have developed a new data transfer protocol for the Internet fast enough to download a full-length DVD movie in less than five seconds. The protocol is called FAST, standing for Fast Active queue management Scalable Transmission Control Protocol" (1 page).

  18. A correctness proof of the bakery protocol in $ mu $CRL

    NARCIS (Netherlands)

    J.F. Groote (Jan Friso); H.P. Korver

    1994-01-01

    textabstractA specification of a bakery protocol is given in $mu$CRL. We provide a simple correctness criterion for the protocol. Then the protocol is proven correct using a proof system that has been developed for $mu$CRL. The proof primarily consists of algebraic manipulations based on

  19. FLIP: An Internetwork Protocol for Supporting Distributed Systems

    NARCIS (Netherlands)

    Kaashoek, M.F.; van Renesse, R.; van Staveren, H.; Tanenbaum, A.S.

    1993-01-01

    Most modern network protocols give adequate support for traditional applications such as file transfer and remote login. Distributed applications, however, have different requirements 1993. Instead of using ad hoc protocols to meet each of the new requirements, we have designed a new protocol,

  20. On consensus through communication without a commonly known protocol

    OpenAIRE

    Tsakas Elias; Voorneveld Mark

    2010-01-01

    The present paper extends the standard model of pairwise communication among Bayesianagents to cases where the structure of the communication protocol is not commonly known.We show that, even under strict conditions on the structure of the protocols and the nature of the transmitted signals, a consensus may never be reached if very little asymmetric information about the protocol is introduced.

  1. An improved AODV routing protocol based on tower structure

    Directory of Open Access Journals (Sweden)

    Li Yong Qiang

    2016-01-01

    Full Text Available The paper proposed a new routing protocol(IAODV based on tower structure in the Ad Hoc network for the problem which Location Routing Protocol need hardware and Complex algorithm. By the simulation, The complexity of the new routing protocol is reduced without reducing the performance of the network.

  2. The Groningen Protocol - the Jewish perspective.

    Science.gov (United States)

    Gesundheit, Benjamin; Steinberg, Avraham; Blazer, Shraga; Jotkowitz, Alan

    2009-01-01

    Despite significant advances in neonatology, there will always be newborns with serious life-threatening conditions creating most difficult bioethical dilemmas. Active euthanasia for adult patients is one of the most controversial bioethical questions; for severely ill neonates, the issue is even more complex, due to their inability to take part in any decision concerning their future. The Groningen Protocol introduced in 2005 by P.J. Sauer proposes criteria allowing active euthanasia for severely ill, not necessarily terminal, newborns with incurable conditions and poor quality of life in order to spare them unbearable suffering. We discuss the ethical dilemma and ideological foundations of the protocol, the opinions of its defenders and critics, and the dangers involved. The Jewish perspective relating to the subject is presented based on classical Jewish sources, which we trust may enrich modern bioethical debates. In Jewish law, the fetus acquires full legal status only after birth. However, while the lives of terminally ill neonates must in no way be actively destroyed or shortened, there is no obligation to make extraordinary efforts to prolong their lives. Accurate preimplantation or prenatal diagnosis might significantly reduce the incidence of nonviable births, but active killing of infants violates the basic foundations of Jewish law, and opens the 'slippery slope' for uncontrolled abuse. Therefore, we call upon the international medical and bioethical community to reject the Groningen Protocol that permits euthanization and to develop ethical guidelines for the optimal care of severely compromised neonates. Copyright 2009 S. Karger AG, Basel.

  3. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  4. Modeling and Verification of the Bitcoin Protocol

    Directory of Open Access Journals (Sweden)

    Kaylash Chaudhary

    2015-11-01

    Full Text Available Bitcoin is a popular digital currency for online payments, realized as a decentralized peer-to-peer electronic cash system. Bitcoin keeps a ledger of all transactions; the majority of the participants decides on the correct ledger. Since there is no trusted third party to guard against double spending, and inspired by its popularity, we would like to investigate the correctness of the Bitcoin protocol. Double spending is an important threat to electronic payment systems. Double spending would happen if one user could force a majority to believe that a ledger without his previous payment is the correct one. We are interested in the probability of success of such a double spending attack, which is linked to the computational power of the attacker. This paper examines the Bitcoin protocol and provides its formalization as an UPPAAL model. The model will be used to show how double spending can be done if the parties in the Bitcoin protocol behave maliciously, and with what probability double spending occurs.

  5. Analysis of Security Protocols for Mobile Healthcare.

    Science.gov (United States)

    Wazid, Mohammad; Zeadally, Sherali; Das, Ashok Kumar; Odelu, Vanga

    2016-11-01

    Mobile Healthcare (mHealth) continues to improve because of significant improvements and the decreasing costs of Information Communication Technologies (ICTs). mHealth is a medical and public health practice, which is supported by mobile devices (for example, smartphones) and, patient monitoring devices (for example, various types of wearable sensors, etc.). An mHealth system enables healthcare experts and professionals to have ubiquitous access to a patient's health data along with providing any ongoing medical treatment at any time, any place, and from any device. It also helps the patient requiring continuous medical monitoring to stay in touch with the appropriate medical staff and healthcare experts remotely. Thus, mHealth has become a major driving force in improving the health of citizens today. First, we discuss the security requirements, issues and threats to the mHealth system. We then present a taxonomy of recently proposed security protocols for mHealth system based on features supported and possible attacks, computation cost and communication cost. Our detailed taxonomy demonstrates the strength and weaknesses of recently proposed security protocols for the mHealth system. Finally, we identify some of the challenges in the area of security protocols for mHealth systems that still need to be addressed in the future to enable cost-effective, secure and robust mHealth systems.

  6. 'BREAKS' Protocol for Breaking Bad News.

    Science.gov (United States)

    Narayanan, Vijayakumar; Bista, Bibek; Koshy, Cheriyan

    2010-05-01

    Information that drastically alters the life world of the patient is termed as bad news. Conveying bad news is a skilled communication, and not at all easy. The amount of truth to be disclosed is subjective. A properly structured and well-orchestrated communication has a positive therapeutic effect. This is a process of negotiation between patient and physician, but physicians often find it difficult due to many reasons. They feel incompetent and are afraid of unleashing a negative reaction from the patient or their relatives. The physician is reminded of his or her own vulnerability to terminal illness, and find themselves powerless over emotional distress. Lack of sufficient training in breaking bad news is a handicap to most physicians and health care workers. Adherence to the principles of client-centered counseling is helpful in attaining this skill. Fundamental insight of the patient is exploited and the bad news is delivered in a structured manner, because the patient is the one who knows what is hurting him most and he is the one who knows how to move forward. Six-step SPIKES protocol is widely used for breaking bad news. In this paper, we put forward another six-step protocol, the BREAKS protocol as a systematic and easy communication strategy for breaking bad news. Development of competence in dealing with difficult situations has positive therapeutic outcome and is a professionally satisfying one.

  7. [Protocols for the health surveillance of fisherman].

    Science.gov (United States)

    Soleo, Leonardo; Cannizzaro, Emanuele; Lovreglio, Piero; Basso, Antonella; D'Errico, Maria Nicolà; Pira, Enrico

    2013-01-01

    To define protocols for health surveillance of workers in the marine fishing sector for specific occupational risk factors, considering the latest and most advanced scientific knowledge. The specific literature was analyzed to identify the occupational risk factors to which fishermen are exposed. Then, for each risk factor a protocol for the relative health checkups and their time schedule was defined. The risk factors to which fishermen are exposed are essentially noise, vibrations, solar and ultraviolet radiation, climatic agents (heat, cold, wind, rain, damp), chemical agents, shifts, work rate, night work, physical strain, stress, manual handling of loads, upper limb repetitive tasks, incongruous postures. The health protocols stipulate the health screening investigations to be carried out in all workers of a homogeneous group, and in-depth diagnostic investigations to be carried out in symptomatic workers. Complementary health investigations must be focused on a functional exploration of the organs specifically exposed to the risk factor. For hearing impairments due to noise exposure, the medico-legal measures with which the occupational health physician must comply, in cases of occupational disease, are indicated.

  8. Biologic comparison of partial breast irradiation protocols

    International Nuclear Information System (INIS)

    Rosenstein, Barry S.; Lymberis, Stella C.; Formenti, Silvia C.

    2004-01-01

    Purpose: To analyze the dose/fractionation schedules currently used in ongoing clinical trials of partial breast irradiation (PBI) by comparing their biologically effective dose (BED) values to those of three standard whole breast protocols commonly used after segmental mastectomy in the treatment of breast cancer. Methods and materials: The BED equation derived from the linear-quadratic model for radiation-induced cell killing was used to calculate the BEDs for three commonly used whole breast radiotherapy regimens, in addition to a variety of external beam radiotherapy, as well as high-dose-rate and low-dose-rate brachytherapy, PBI protocols. Results: The BED values of most PBI protocols resulted in tumor control BEDs roughly equivalent to a 50-Gy standard treatment, but consistently lower than the BEDs for regimens in which the tumor bed receives a total dose of either 60 Gy or 66 Gy. The BED values calculated for the acute radiation responses of erythema and desquamation were nearly all lower for the PBI schedules, and the late-response BEDs for most PBI regimens were in a similar range to the BEDs for the standard treatments. Conclusion: Biologically effective dose modeling raises the concern that inadequate doses might be delivered by PBI to ensure optimal in-field tumor control

  9. Interoperability and Reliability of Multiplatform MPLS VPN: Comparison of Traffic Engineering with RSVP-TE Protocol and LDP Protocol

    Directory of Open Access Journals (Sweden)

    Nanang Ismail

    2017-10-01

    48% of packet loss per 100 sent packets while on RSVP packet loss percentage is 35.5% per 100 sent packets. Both protocols have interoperability on the third layer of multiplatform MPLS VPN, but on heavy loaded traffic condition, RSVP protocol has better reliability than the LDP protocol.

  10. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees.

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-04-01

    A novel Protocol Ethics Tool Kit ('Ethics Tool Kit') has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  11. Maximally efficient protocols for direct secure quantum communication

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, Anindita [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); Department of Physics and Center for Astroparticle Physics and Space Science, Bose Institute, Block EN, Sector V, Kolkata 700091 (India); Pathak, Anirban, E-mail: anirban.pathak@jiit.ac.in [Department of Physics and Materials Science Engineering, Jaypee Institute of Information Technology, A-10, Sector-62, Noida, UP-201307 (India); RCPTM, Joint Laboratory of Optics of Palacky University and Institute of Physics of Academy of Science of the Czech Republic, Faculty of Science, Palacky University, 17. Listopadu 12, 77146 Olomouc (Czech Republic)

    2012-10-01

    Two protocols for deterministic secure quantum communication (DSQC) using GHZ-like states have been proposed. It is shown that one of these protocols is maximally efficient and that can be modified to an equivalent protocol of quantum secure direct communication (QSDC). Security and efficiency of the proposed protocols are analyzed and compared. It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. Maximally efficient QSDC protocols are shown to be more efficient than their DSQC counterparts. This additional efficiency arises at the cost of message transmission rate. -- Highlights: ► Two protocols for deterministic secure quantum communication (DSQC) are proposed. ► One of the above protocols is maximally efficient. ► It is modified to an equivalent protocol of quantum secure direct communication (QSDC). ► It is shown that dense coding is sufficient but not essential for DSQC and QSDC protocols. ► Efficient QSDC protocols are always more efficient than their DSQC counterparts.

  12. A case for evaluating sensor network protocols concurrently

    KAUST Repository

    Gnawali, Omprakash; Guibas, Leonidas; Levis, Philip

    2010-01-01

    Researchers typically evaluate and compare protocols on the testbeds by running them one at a time. This methodology ignores the variation in link qualities and wireless environment across these experiments. These variations can introduce significant noise in the results. Evaluating two protocols concurrently, however, suffers from inter-protocol interactions. These interactions can perturb performance even under very light load, especially timing and timing sensitive protocols. We argue that the benefits of running protocols concurrently greatly outweigh the disadvantages. Protocols rarely run in isolation in real networks, and so considering such interactions is valuable. Although the wireless environment is still uncontrolled, concurrent evaluations make comparisons fair and more statistically sound. Through experiments on two testbeds, we make the case for evaluating and comparing low data-rate sensor network protocols by running them concurrently. Copyright 2010 ACM.

  13. A secure key agreement protocol based on chaotic maps

    International Nuclear Information System (INIS)

    Wang Xing-Yuan; Luan Da-Peng

    2013-01-01

    To guarantee the security of communication in the public channel, many key agreement protocols have been proposed. Recently, Gong et al. proposed a key agreement protocol based on chaotic maps with password sharing. In this paper, Gong et al.'s protocol is analyzed, and we find that this protocol exhibits key management issues and potential security problems. Furthermore, the paper presents a new key agreement protocol based on enhanced Chebyshev polynomials to overcome these problems. Through our analysis, our key agreement protocol not only provides mutual authentication and the ability to resist a variety of common attacks, but also solve the problems of key management and security issues existing in Gong et al.'s protocol

  14. SPP: A data base processor data communications protocol

    Science.gov (United States)

    Fishwick, P. A.

    1983-01-01

    The design and implementation of a data communications protocol for the Intel Data Base Processor (DBP) is defined. The protocol is termed SPP (Service Port Protocol) since it enables data transfer between the host computer and the DBP service port. The protocol implementation is extensible in that it is explicitly layered and the protocol functionality is hierarchically organized. Extensive trace and performance capabilities have been supplied with the protocol software to permit optional efficient monitoring of the data transfer between the host and the Intel data base processor. Machine independence was considered to be an important attribute during the design and implementation of SPP. The protocol source is fully commented and is included in Appendix A of this report.

  15. Mac protocols for wireless sensor network (wsn): a comparative study

    International Nuclear Information System (INIS)

    Arshad, J.; Akram, Q.; Saleem, Y.

    2014-01-01

    Data communication between nodes is carried out under Medium Access Control (MAC) protocol which is defined at data link layer. The MAC protocols are responsible to communicate and coordinate between nodes according to the defined standards in WSN (Wireless Sensor Networks). The design of a MAC protocol should also address the issues of energy efficiency and transmission efficiency. There are number of MAC protocols that exist in the literature proposed for WSN. In this paper, nine MAC protocols which includes S-MAC, T-MAC, Wise-MAC, Mu-MAC, Z-MAC, A-MAC, D-MAC, B-MAC and B-MAC+ for WSN have been explored, studied and analyzed. These nine protocols are classified in contention based and hybrid (combination of contention and schedule based) MAC protocols. The goal of this comparative study is to provide a basis for MAC protocols and to highlight different mechanisms used with respect to parameters for the evaluation of energy and transmission efficiency in WSN. This study also aims to give reader a better understanding of the concepts, processes and flow of information used in these MAC protocols for WSN. A comparison with respect to energy reservation scheme, idle listening avoidance, latency, fairness, data synchronization, and throughput maximization has been presented. It was analyzed that contention based MAC protocols are less energy efficient as compared to hybrid MAC protocols. From the analysis of contention based MAC protocols in term of energy consumption, it was being observed that protocols based on preamble sampling consume lesser energy than protocols based on static or dynamic sleep schedule. (author)

  16. Climate change scenarios and Technology Transfer Protocols

    International Nuclear Information System (INIS)

    Kypreos, Socrates; Turton, Hal

    2011-01-01

    We apply a specific version of MERGE-ETL, an integrated assessment model, to study global climate policies supported by Technology Transfer Protocols (TTPs). We model a specific formulation of such a TTP where donor countries finance via carbon tax revenues, the diffusion of carbon-free technologies in developing countries (DCs) and quantify its benefits. Industrialized countries profit from increased technology exports, global diffusion of advanced technology (leading to additional technology learning and cost reductions) and reduced climate damages through the likelihood of greater global participation in a new international agreement. DCs experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and expected secondary benefits of carbon abatement (such as reduced local and regional air pollution). The analysis identifies potential candidate technologies that could be supported under a TTP, and the impact of a TTP on economic development (including the flow of transfer subsidies) and global emissions. Although a TTP may encourage additional participation, such a proposal is only likely to be successful if an increased willingness to pay to avoid climate damages is accepted, first by the present and future generations of the industrialized world and later on, when sufficient economic growth is accumulated, by today's developing countries. - Research Highlights: → Climate policy scenarios are assessed with differentiated commitments in carbon emission control supported by Technology Transfer Protocols. → Donor countries finance, via carbon-tax revenues, the exports of carbon-free technologies in developing countries helping to get a new international agreement. → Developing countries experience increased welfare from access to subsidized technology, and profit from the reduction of damages related to climate change and secondary benefits. → Under Technology Protocols alone and

  17. Observing documentary reading by verbal protocol

    Directory of Open Access Journals (Sweden)

    Fujita Mariangela Spotti Lopes

    2003-01-01

    Full Text Available Verifies the applicability to research on indexers' reading strategies of the process observing technique known as Verbal Protocol or Thinking Aloud. This interpretative-qualitative data collecting technique allows the observation of different kinds of process during the progress of different kinds of tasks. Presents a theoretical investigation into "reading" and into formal methodological procedures to observe reading processes. Describes details of the methodological procedures adopted in five case studies with analysis of samples of data. The project adopted three kinds of parameters for data analysis: theoretical, normative, empirical (derived from observations made in the first case study. The results are compared, and important conclusions regarding documentary reading are drawn.

  18. Rosetta Ligand docking with flexible XML protocols.

    Science.gov (United States)

    Lemmon, Gordon; Meiler, Jens

    2012-01-01

    RosettaLigand is premiere software for predicting how a protein and a small molecule interact. Benchmark studies demonstrate that 70% of the top scoring RosettaLigand predicted interfaces are within 2Å RMSD from the crystal structure [1]. The latest release of Rosetta ligand software includes many new features, such as (1) docking of multiple ligands simultaneously, (2) representing ligands as fragments for greater flexibility, (3) redesign of the interface during docking, and (4) an XML script based interface that gives the user full control of the ligand docking protocol.

  19. Right to Food and the Nagoya Protocol

    Directory of Open Access Journals (Sweden)

    Romina Ysabel Bazán Barba

    2016-12-01

    Full Text Available In the perspective of Environmental Law, the juridical-sociological aspect addresses the problem for the Right to Food, which has been intensified by the lack of equity, social justice and mainly by environmental degradation. Based on theoretical research, the Constitution and international treaties on the subject, the problem of hunger is studied, with emphasis on the Nagoya Protocol – a new international instrument for access and distribution of genetic resources. It aims to analyze the geopolitics behind the hunger issue; the indiscriminate use of agrochemicals; the monopoly of seeds; and the lives wasted in the process of maintenance/circulation in the food market.

  20. Protocol for counterfactually transporting an unknown qubit

    Directory of Open Access Journals (Sweden)

    Hatim eSalih

    2016-01-01

    Full Text Available Quantum teleportation circumvents the uncertainty principle using dual channels: a quantum one consisting of previously-shared entanglement, and a classical one, together allowing the disembodied transport of an unknown quantum state over distance. It has recently been shown that a classical bit can be counterfactually communicated between two parties in empty space, Alice and Bob. Here, by using our dual version of the chained quantum Zeno effect to achieve a counterfactual CNOT gate, we propose a protocol for transporting an unknown qubit counterfactually, that is without any physical particles travelling between Alice and Bob—no classical channel and no previously-shared entanglement.

  1. A Safe Protocol for Amalgam Removal

    Directory of Open Access Journals (Sweden)

    Dana G. Colson

    2012-01-01

    Full Text Available Today's environment has different impacts on our body than previous generations. Heavy metals are a growing concern in medicine. Doctors and individuals request the removal of their amalgam (silver mercury restorations due to the high mercury content. A safe protocol to replace the silver mercury filling will ensure that there is minimal if any absorption of materials while being removed. Strong alternative white composite and lab-processed materials are available today to create a healthy and functioning mouth. Preparation of the patient prior to the procedure and after treatment is vital to establish the excretion of the mercury from the body.

  2. Tools for Performance Assessment of OLSR Protocol

    Directory of Open Access Journals (Sweden)

    Makoto Ikeda

    2009-01-01

    Full Text Available In this paper, we evaluate the performance of Optimized Link State Routing (OLSR protocol by experimental and simulation results. The experiments are carried out by using our implemented testbed and the simulations by using ns-2 simulator. We also designed and implemented a new interface for the ad-hoc network testbed in order to make more easier the experiments. The comparison between experimental and simulation results shows that for the same parameters set, in the simulation we did not notice any packet loss. On the other hand, in the experiments we experienced packet loss because of the environment effects and traffic interference.

  3. Delay tolerant networks protocols and applications

    CERN Document Server

    Vasilakos, Athanasios V; Spyropoulos, Thrasyvoulos

    2011-01-01

    Delay Tolerant Networks (DTN) - which include terrestrial mobile networks, exotic media networks, ad-hoc networks, and sensor networks - are becoming more important and may not be well served by the current end-to-end TCP/IP model. This book provides a self-contained, one-stop reference for researchers and practitioners who are looking toward the future of networking. The text presents a systematic exploration of DTN concepts, architectures, protocols, enabling technologies, and applications. It also discusses various challenges associated with DTN. The author includes a wealth of illustrative

  4. 2014 Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht-Metzger, C. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Horowitz, S. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hendron, R. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2014-03-01

    As BA has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  5. 2014 Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, E. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Engebrecht, C. Metzger [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Horowitz, S. [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Hendron, R. [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2014-03-01

    As Building America has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocol (HSP) document provides guidance to program partners and managers so they can compare energy savings for new construction and retrofit projects. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

  6. Cognitive Radio MAC Protocol for WLAN

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    hole; moreover, it designs dual inband sensing scheme to detect primary user appearance. Additionally, C-CSMA/CA has the advantage to effectively solve the cognitive radio self-coexistence issues in the overlapping CR BSSs scenario. It also realizes station-based dynamic resource selection......To solve the performance degradation issue in current WLAN caused by the crowded unlicensed spectrum, we propose a cognitive radio (CR) media access protocol, C-CSMA/CA. The basic idea is that with cognitive radio techniques the WLAN devices can not only access the legacy WLAN unlicensed spectrum...

  7. Network protocols. Special issue; Netwerkprotocollen. Themanummer

    Energy Technology Data Exchange (ETDEWEB)

    Jansen, G.A. [RTB Van Heugten, Nijmegen (Netherlands); Rooijakkers, G.W.J. [GTI Building Automation, Amsterdam (Netherlands); Peterse, A. [Regel Partners, Hoevelaken (Netherlands); Smits, P. [Konnex Nederland, Valkenswaard (Netherlands); Hamers, E.P. [Van Dorp Installaties, Breda (Netherlands); Van der Velden, J.A.J. [Kropman, Rijswijk (Netherlands); Van Lingen, G.; Wijn, D.M. [Engineer Johnson Controls, Gorinchem (Netherlands); Deckere, W.J.M.A. [Deerns raadgevende ingenieurs, Rijswijk (Netherlands); Driessen, B. [Saia Burgess, Gouda (Netherlands); Van Olst, K. [K en R Consultants, Deventer (Netherlands); Mosterman, F. [Wago Building Technology, Harderwijk (Netherlands); Staub, R. [BUS-House, Zuerich (Switzerland); Meiring, O.B.; Hut, W.H. [Sauter Building Control Nederland, Amsterdam (Netherlands); Tukker, A. [Webeasy Products, Sliedrecht (Netherlands); Bakker, L.G.; Soethout, L.L.; Elkhuizen, P.A. [TNO Bouw en Ondergrond, Delft (Netherlands); Haeseler, U. [TAC GmbH, Berlin (Germany); Kerdel, J.F. [Siemens Building Technologies, Zoetermeer (Netherlands); Lugt, G.L.; Draijer, G.W.

    2007-11-15

    In 20 articles attention is paid to several aspects of network protocols by means of which building automation systems can exchange data: building automation and management, history of technical installations management, the open communication standard BACnet (Building Automation and Control network), the so-called ISO/IEC domotics and communication standard KNX or Konnex, the integration of electrotechnical and engineering installations by the LonWorks technology, other standard protocols as Modbus, M-bus, OPC (OLE for Process Control), an outline of TCP/IP, smart design of networks, automation and networks and building owners, the use of BACnet and Ethernet in a renovated office building, the use of an open management network in buildings, wireless open integrated systems, terminology in network communication, the use of BACnet in combination with KNX, the impact of BACnet on building automation, the role of the installation sector in the ICT-environment, knowledge of building automation and management, regulations with respect to building automation, and BACnet MSTP (Multiple Spanning Tree Protocol) [Dutch] In 20 artikelen wordt in dit themanummer aandacht besteed aan diverse aspecten m.b.t. netwerkprotocollen waarmee verschillende automatiseringssystemen gegevens met elkaar uitwisselen: gebouwautomatisering en beheer, geschiedenis van technisch installatie beheer, de open communicatie standaard BACnet (Building Automation and Control network), de zogenaamde ISO/IEC domotica en communicatie standaard KNX of Konnex, de integratie van electrotechnische en werktuigbouwkundige installaties met behulp van de LonWorks technologie, andere standaard protocollen zoals Modbus, M-bus, OPC (OLE for Process Control), uitleg over TCP/IP, slim ontwerpen van netwerken, gebouweigenaren over automatisering en netwerken, het gebruik van BACnet en Ethernet in een tot kantoorgebouw gerenoveerd monumentaal gebouw, het gebruik van een open management netwerk in gebouwen, draadloos met

  8. Statistical principles for prospective study protocols:

    DEFF Research Database (Denmark)

    Christensen, Robin; Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research...... to quantify relationships in data. Despite an increased focus on statistical content and complexity of biomedical research these topics remain difficult for most researchers. Statistical methods enable researchers to condense large spreadsheets with data into means, proportions, and difference between means...... the statistical principles for trial protocols in terms of design, analysis, and reporting of findings....

  9. Perforated Sigmoid Diverticular Disease: a Management Protocol

    Science.gov (United States)

    Moin, Thajammul

    2008-01-01

    Background: To develop an evidence-based protocol for the management of perforated sigmoid diverticular disease. Methods: A search of the literature was undertaken. All publications pertaining to perforated sigmoid diverticular disease were analyzed and then categorized according to their level of evidence. Recommendations were then made on the basis of this. Results: Multiple case reports suggest that primary closure of perforation of sigmoid diverticula is safe in the absence of peritoneal contamination. Conclusions: A 2-stage laparoscopic approach incorporating the principles of damage limitation surgery may be a safe strategy in the management of perforated diverticular disease. PMID:18435896

  10. Analysis of protection spanning-tree protocol

    Directory of Open Access Journals (Sweden)

    Б.Я. Корнієнко

    2007-01-01

    Full Text Available  Extraordinary sweeping  of  IT – development  causes vulnerabilities and, thereafter, attacks that use these vulnerabilities. That is why one must post factum or even in advance speed up invention of new information  security systems as well as develop the old ones. The matter of article concerns Spanning-Tree Protocol  – the vivid example of the case, when the cure of the vulnerability creates dozen of new "weak spots".

  11. Proposed protocols for peripheral and renal Doppler

    International Nuclear Information System (INIS)

    Fonseca Portuguez, Adriana

    2009-01-01

    A literature review was performed in order to prepare a summary of the important concepts of Doppler and applications in peripheral vascular evaluation and renal. The normal characteristics are summarized and explained in each vascular system and diagnostic criteria of the disorders frequently encountered in practice. Requested more studies have been identified and proposed protocols and report sheets have been developed to standardize the methodology of realization of several Doppler studies. The variability between operators has been treated to reduce as much as possible and follow-up studies have provided in patients who need. (author) [es

  12. Hospital Casemix Protocol - Medibank Private Perspective.

    Science.gov (United States)

    Szakiel, John

    2010-06-01

    Hospital Casemix Protocol data provide a brief summary outlining morbidity data and costs associated with an episode of care. Federal government legislation requires that hospitals report this information to private health insurers who, in turn, merge these data with benefit outlays and report their findings to the Department of Health and Ageing (DoHA). This article gives a brief outline of the collection, cleansing and processing of these data and subsequent reporting to DoHA by Medibank Private, which accounts for approximately 30% of collected data.

  13. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    Directory of Open Access Journals (Sweden)

    CHRISTIE GRAF RIBEIRO

    Full Text Available ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c. Methods: this is a descriptive study, with the methodology divided into three phases: (1 development of a theoretical ophthalmologic database with emphasis on strabismus; (2 computerization of this theoretical ophthalmologic database using SINPE(c and (3 interpretation of the information with demonstration of results to validate the protocol. We inputed data from the charts of fifty patients with known strabismus through the Electronic Protocol for testing and validation. Results: the new electronic protocol was able to store information regarding patient history, physical examination, laboratory exams, imaging results, diagnosis and treatment of patients with ophthalmologic diseases, with emphasis on strabismus. We included 2,141 items in this master protocol and created 20 new specific electronic protocols for strabismus, each with its own specifics. Validation was achieved through correlation and corroboration of the symptoms and confirmed diagnoses of the fifty included patients with the diagnostic criteria for the twenty new strabismus protocols. Conclusion: a new, validated electronic database focusing on ophthalmology, with emphasis on strabismus, was successfully created through the standardized collection of information, and computerization of the database using proprietary software. This protocol is ready for deployment to facilitate data collection, sorting and application for practitioners and researchers in numerous specialties.

  14. A 2004 view of the Kyoto Protocol

    International Nuclear Information System (INIS)

    Singer, F.

    2004-01-01

    It may not be a household word, but by now the Kyoto Protocol has become a well-known political slogan. It is either ''fundamentally flawed'' (George W. Bush) or it is essential for saving the climate and humanity (Al Gore). There seems to be no in between. The Kyoto Protocol is a treaty to limit (i.e., ration) the use of energy to satisfy the concerns of environmental groups and other believers in global warming catastrophes. This group includes not only certified kooks but also such notables as former Treasury Secretary Paul O'Neill and Sir David King, chief scientific adviser to Her Majesty's government who equates the threat of warming with that of international terrorism. But Kyoto is quite ineffective, that is, it cannot really affect climate or even change the composition of the atmosphere. It is costly. And it is probably also defunct. Where did this treaty come from? Why is it being adopted by some countries but not by others? And what is its likely future?

  15. A high performance totally ordered multicast protocol

    Science.gov (United States)

    Montgomery, Todd; Whetten, Brian; Kaplan, Simon

    1995-01-01

    This paper presents the Reliable Multicast Protocol (RMP). RMP provides a totally ordered, reliable, atomic multicast service on top of an unreliable multicast datagram service such as IP Multicasting. RMP is fully and symmetrically distributed so that no site bears un undue portion of the communication load. RMP provides a wide range of guarantees, from unreliable delivery to totally ordered delivery, to K-resilient, majority resilient, and totally resilient atomic delivery. These QoS guarantees are selectable on a per packet basis. RMP provides many communication options, including virtual synchrony, a publisher/subscriber model of message delivery, an implicit naming service, mutually exclusive handlers for messages, and mutually exclusive locks. It has commonly been held that a large performance penalty must be paid in order to implement total ordering -- RMP discounts this. On SparcStation 10's on a 1250 KB/sec Ethernet, RMP provides totally ordered packet delivery to one destination at 842 KB/sec throughput and with 3.1 ms packet latency. The performance stays roughly constant independent of the number of destinations. For two or more destinations on a LAN, RMP provides higher throughput than any protocol that does not use multicast or broadcast.

  16. Fibred Coalgebraic Logic and Quantum Protocols

    Directory of Open Access Journals (Sweden)

    Daniel Marsden

    2014-12-01

    Full Text Available Motivated by applications in modelling quantum systems using coalgebraic techniques, we introduce a fibred coalgebraic logic. Our approach extends the conventional predicate lifting semantics with additional modalities relating conditions on different fibres. As this fibred setting will typically involve multiple signature functors, the logic incorporates a calculus of modalities enabling the construction of new modalities using various composition operations. We extend the semantics of coalgebraic logic to this setting, and prove that this extension respects behavioural equivalence. We show how properties of the semantics of modalities are preserved under composition operations, and then apply the calculational aspect of our logic to produce an expressive set of modalities for reasoning about quantum systems, building these modalities up from simpler components. We then demonstrate how these modalities can describe some standard quantum protocols. The novel features of our logic are shown to allow for a uniform description of unitary evolution, and support local reasoning such as "Alice's qubit satisfies condition" as is common when discussing quantum protocols.

  17. ISS protocol for EPR tooth dosimetry

    International Nuclear Information System (INIS)

    Onori, S.; Aragno, D.; Fattibene, P.; Petetti, E.; Pressello, M.C.

    2000-01-01

    The accuracy in Electron Paramagnetic Resonance (EPR) dose reconstruction with tooth enamel is affected by sample preparation, dosimetric signal amplitude evaluation and unknown dose estimate. Worldwide efforts in the field of EPR dose reconstruction with tooth enamel are focused on the optimization of the three mentioned steps in dose assessment. In the present work, the protocol implemented at ISS in the framework of the European Community Nuclear Fission Safety project 'Dose Reconstruction' is presented. A combined mechanical-chemical procedure for ground enamel sample preparation is used. The signal intensity evaluation is carried out with powder spectra simulation program. Finally, the unknown dose is evaluated individually for each sample with the additive dose method. The unknown dose is obtained by subtracting a mean native dose from the back-extrapolated dose. As an example of the capability of the ISS protocol in unknown dose evaluation, the results obtained in the framework of the 2nd International Intercomparison on EPR tooth enamel dosimetry are reported

  18. Croatia energy planning and Kyoto Protocol

    International Nuclear Information System (INIS)

    Duic, Neven; Juretic, Franjo; Zeljko, Mladen; Bogdan, Z.

    2005-01-01

    Croatia as an Annex I country of the UN Framework Convention on Climate Change and a country that has pledged in the Annex B of the Kyoto Protocol to reduce its GHG emissions by 5% will have to envisage a new energy strategy. Compared to the energy consumption collapse in some transitional countries, Croatia has passed through a relatively short-term reduction of GHG emissions since 1990 because of higher energy efficiency of its pretransition economy. It is expected that in case of baseline scenario, it will breach the Kyoto target in 2003. Several scenarios of power generation are compared from the point of view of GHG emissions. The cost-effective scenario expects a mixture of coal and gas fired power plants to be built to satisfy the new demand and to replace the old power plants that are being decommissioned. More Kyoto friendly scenario envisages forcing the compliance with the Protocol with measures only in power generation sector by the construction of mainly zero emission generating capacity in the future, while decommissioning the old plants as planned, and is compared to the others from the GHG emissions point of view. The conclusion is that by measures tackling only power generation, it will not be possible to keep GHG emission under the Kyoto target level. The case of including the emissions from Croatian owned power plants in former Yugoslavia is also discussed

  19. The Montreal Protocol for Identification of Amusia.

    Science.gov (United States)

    Vuvan, D T; Paquette, S; Mignault Goulet, G; Royal, I; Felezeu, M; Peretz, I

    2018-04-01

    The Montreal Battery for the Evaluation of Amusia (MBEA; Peretz, Champod, & Hyde Annals of the New York Academy of Sciences, 999, 58-75, 2003) is an empirically grounded quantitative tool that is widely used to identify individuals with congenital amusia. The use of such a standardized measure ensures that the individuals tested will conform to a specific neuropsychological profile, allowing for comparisons across studies and research groups. Recently, a number of researchers have published credible critiques of the usefulness of the MBEA as a diagnostic tool for amusia. Here we argue that the MBEA and its online counterpart, the AMUSIA tests (Peretz et al. Music Perception, 25, 331-343, 2008), should be considered steps in a screening process for amusia, rather than standalone diagnostic tools. The goal of this article is to present, in detailed and easily replicable format, the full protocol through which congenital amusics should be identified. In providing information that has often gone unreported in published articles, we aim to clarify the strengths and limitations of the MBEA and to make recommendations for its continued use by the research community as part of the Montreal Protocol for Identification of Amusia.

  20. Hardening Stratum, the Bitcoin Pool Mining Protocol

    Directory of Open Access Journals (Sweden)

    Recabarren Ruben

    2017-07-01

    Full Text Available Stratum, the de-facto mining communication protocol used by blockchain based cryptocurrency systems, enables miners to reliably and efficiently fetch jobs from mining pool servers. In this paper we exploit Stratum’s lack of encryption to develop passive and active attacks on Bitcoin’s mining protocol, with important implications on the privacy, security and even safety of mining equipment owners. We introduce StraTap and ISP Log attacks, that infer miner earnings if given access to miner communications, or even their logs. We develop BiteCoin, an active attack that hijacks shares submitted by miners, and their associated payouts. We build BiteCoin on WireGhost, a tool we developed to hijack and surreptitiously maintain Stratum connections. Our attacks reveal that securing Stratum through pervasive encryption is not only undesirable (due to large overheads, but also ineffective: an adversary can predict miner earnings even when given access to only packet timestamps. Instead, we devise Bedrock, a minimalistic Stratum extension that protects the privacy and security of mining participants. We introduce and leverage the mining cookie concept, a secret that each miner shares with the pool and includes in its puzzle computations, and that prevents attackers from reconstructing or hijacking the puzzles.

  1. Separable states improve protocols with finite randomness

    International Nuclear Information System (INIS)

    Bobby, Tan Kok Chuan; Paterek, Tomasz

    2014-01-01

    It is known from Bell's theorem that quantum predictions for some entangled states cannot be mimicked using local hidden variable (LHV) models. From a computer science perspective, LHV models may be interpreted as classical computers operating on a potentially infinite number of correlated bits originating from a common source. As such, Bell inequality violations achieved through entangled states are able to characterize the quantum advantage of certain tasks, so long as the task itself imposes no restriction on the availability of correlated bits. However, if the number of shared bits is limited, additional constraints are placed on the possible LHV models, and separable, i.e. disentangled states may become a useful resource. Bell violations are therefore no longer necessary to achieve a quantum advantage. Here we show that, in particular, separable states improve the so-called random access codes, which is a class of communication problem wherein one party tries to read a portion of the data held by another distant party in the presence of finite shared randomness and limited classical communication. We also show how the bias of classical bits can be used to avoid wrong answers in order to achieve the optimal classical protocol and how the advantage of quantum protocols is linked to quantum discord. (paper)

  2. Protocol Interoperability Between DDN and ISO (Defense Data Network and International Organization for Standardization) Protocols

    Science.gov (United States)

    1988-08-01

    services and protocols above the transport layer are usually implemented as user- callable utilities on the host computers, it is desirable to offer them...Networks, Prentice-hall, New Jersey, 1987 [ BOND 87] Bond , John, "Parallel-Processing Concepts Finally Come together in Real Systems", Computer Design

  3. Kyoto protocol: at last the agreement has been reached; Protocole de Kyoto: un accord enfin conclu

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    After more than 3 years of negotiations, 180 countries agreed at Bonn on the application of the Kyoto protocol to fight the climatic warming. The main aspects of this agreement are discussed: the carbon wells, the tools of the pollution control for the developed countries and the financial help to the developing countries. (A.L.B.)

  4. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    International Nuclear Information System (INIS)

    Soares, M. R.; Maia, A. F.; Batista, W. O. G.; Lara, P. A.

    2014-08-01

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  5. Effective dose comparison between protocols stitched and usual protocols in dental cone beam CT for complete arcade

    Energy Technology Data Exchange (ETDEWEB)

    Soares, M. R.; Maia, A. F. [Universidade Federal de Sergipe, Departamento de Fisica, Cidade Universitaria Prof. Jose Aloisio de Campos, Marechal Rondon s/n, Jardim Rosa Elze, 49-100000 Sao Cristovao, Sergipe (Brazil); Batista, W. O. G. [Instituto Federal da Bahia, Rua Emidio dos Santos s/n, Barbalho, Salvador, 40301015 Bahia (Brazil); Lara, P. A., E-mail: wilsonottobatista@gmail.com [Instituto de Pesquisas Energeticas e Nucleares / CNEN, Av. Lineu Prestes 2242, Cidade Universitaria, 05508-000 Sao Paulo (Brazil)

    2014-08-15

    To visualization a complete dental radiology dental lives together with two separate proposals: [1] protocols diameter encompassing the entire arch (single) or [2] protocol with multiple fields of view (Fov) which together encompass the entire arch (stitched Fov s). The objective of this study is to evaluate effective dose values in examination protocols for all dental arcade available in different outfits with these two options. For this, a female anthropomorphic phantom manufactured by Radiology Support Devices twenty six thermoluminescent dosimeters inserted in relevant bodies and positions was used. Irradiate the simulator in the clinical conditions. The protocols were averaged and compared: [a] 14.0 cm x 8.5 cm and [b] 8.5 cm x 8.5 cm (Gendex Tomography GXCB 500), [c] protocol stitched for jaw combination of three volumes of 5.0 cm x 3.7 cm (Kodak 9000 3D scanner) [d] protocol stitched Fov s 5.0 cm x 8.0 cm (Planmeca Pro Max 3D) and [e] single technical Fov 14 cm x 8 cm (i-CAT Classical). Our results for the effective dose were: a range between 43.1 and 111.1 micro Sv for technical single Fov and 44.5 and 236.2 for technical stitched Fov s. The protocol presented the highest estimated effective dose was [d] and showed that lowest index was registered [a]. These results demonstrate that the protocol stitched Fov generated in Kodak 9000 3D machine applied the upper dental arch has practically equal value effective dose obtained by protocol extended diameter of, [a], which evaluates in a single image upper and lower arcade. It also demonstrates that the protocol [d] gives an estimate of five times higher than the protocol [a]. Thus, we conclude that in practical terms the protocol [c] stitched Fov s, not presents dosimetric advantages over other protocols. (Author)

  6. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  7. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain...... two Autonomous System disjoint paths and use them efficiently under failure conditions. Three main applications for the protocol extension are illustrated: reducing traffic loss on existing connections by xploiting pre-selected backup paths derived with our proposal, applying multi-domain restoration...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...

  8. Multiprofissional electronic protocol in ophtalmology with enfasis in strabismus

    OpenAIRE

    RIBEIRO, CHRISTIE GRAF; MOREIRA, ANA TEREZA RAMOS; PINTO, JOSÉ SIMÃO DE PAULA; MALAFAIA, OSVALDO

    2016-01-01

    ABSTRACT Objective: to create and validate an electronic database in ophthalmology focused on strabismus, to computerize this database in the form of a systematic data collection software named Electronic Protocol, and to incorporate this protocol into the Integrated System of Electronic Protocols (SINPE(c)). Methods: this is a descriptive study, with the methodology divided into three phases: (1) development of a theoretical ophthalmologic database with emphasis on strabismus; (2) compute...

  9. The development of standard operating protocols for paediatric radiology

    International Nuclear Information System (INIS)

    Hardwick, J.; Mencik, C.; McLaren, C.; Young, C.; Scadden, S.; Mashford, P.; McHugh, K.; Beckett, M.; Calvert, M.; Marsden, P.J.

    2001-01-01

    This paper describes how the requirement for operating protocols for standard radiological practice was expanded to provide a comprehensive aide to the operator conducting a medical exposure. The protocols adopted now include justification criteria, patient preparation, radiographic technique, standard exposure charts, diagnostic reference levels and image quality criteria. In total, the protocols have been welcomed as a tool for ensuring that medical exposures are properly optimised. (author)

  10. Improving the capacity of the ping-pong protocol

    OpenAIRE

    Cai, Qing-yu; Li, Bai-wen

    2003-01-01

    We present a quantum communication protocol which keeps all the properties of the ping-pong protocol [Phys. Rev. Lett. 89, 187902 (2002)] but improves the capacity doubly as the ping-pong protocol. Alice and Bob can use the variable measurement basises in control mode to detect Eve's eavesdropping attack. In message mode, Alice can use one unitary operations to encode two bits information. Bob only needs to perform a Bell type measurement to decode Alice's information. A classical message aut...

  11. Protocol - RPD | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available switchLanguage; BLAST Search Image Search Home About Archive Update History Data ...e version) File URL: ftp://ftp.biosciencedbc.jp/archive/rpd/LATEST/rpd_protocol_jp.zip File size: 535 KB Fil...e name: rpd_protocol_en.zip (English version) File URL: ftp://ftp.biosciencedbc.jp/archiv...tabase Database Description Download License Update History of This Database Site Policy | Contact Us Protocol - RPD | LSDB Archive ...

  12. Blockchain Consensus Protocols in the Wild (Keynote Talk)

    OpenAIRE

    Cachin, Christian; Vukolic, Marko

    2017-01-01

    A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process o...

  13. Implementation of Siemens USS protocol into LabVIEW.

    Science.gov (United States)

    Hosek, P; Diblik, M

    2011-10-01

    This article gives basic overview of the USS protocol as a communication interface to drive Siemens frequency inverters. It presents our implementation of this protocol into LabVIEW, as there was permanent demand from the community of the users to have native LabVIEW implementation of the USS protocol. It also states encountered problems and their solutions. Copyright © 2011 Society for Laboratory Automation and Screening. Published by Elsevier Inc. All rights reserved.

  14. Biometrics based authentication scheme for session initiation protocol

    OpenAIRE

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when co...

  15. Advanced flooding-based routing protocols for underwater sensor networks

    OpenAIRE

    Isufi, E.; Dol, H.; Leus, G.J.T.

    2016-01-01

    Flooding-based protocols are a reliable solution to deliver packets in underwater sensor networks. However, these protocols potentially involve all the nodes in the forwarding process. Thus, the performance and energy efficiency are not optimal. In this work, we propose some advances of a flooding-based protocol with the goal to improve the performance and the energy efficiency. The first idea considers the node position information in order to reduce the number of relays that may apply flood...

  16. Quantum protocol for cheat-sensitive weak coin flipping.

    Science.gov (United States)

    Spekkens, R W; Rudolph, Terry

    2002-11-25

    We present a quantum protocol for the task of weak coin flipping. We find that, for one choice of parameters in the protocol, the maximum probability of a dishonest party winning the coin flip if the other party is honest is 1/sqrt[2]. We also show that if parties restrict themselves to strategies wherein they cannot be caught cheating, their maximum probability of winning can be even smaller. As such, the protocol offers additional security in the form of cheat sensitivity.

  17. Quantum secret sharing protocol using modulated doubly entangled photons

    International Nuclear Information System (INIS)

    Chuan, Wang; Yong, Zhang

    2009-01-01

    In this paper, we propose a quantum secret sharing protocol utilizing polarization modulated doubly entangled photon pairs. The measurement devices are constructed. By modulating the polarizations of entangled photons, the boss could encode secret information on the initial state and share the photons with different members to realize the secret sharing process. This protocol shows the security against intercept-resend attack and dishonest member cheating. The generalized quantum secret sharing protocol is also discussed. (general)

  18. Comparative Analysis of Different Protocols to Manage Large Scale Networks

    OpenAIRE

    Anil Rao Pimplapure; Dr Jayant Dubey; Prashant Sen

    2013-01-01

    In recent year the numbers, complexity and size is increased in Large Scale Network. The best example of Large Scale Network is Internet, and recently once are Data-centers in Cloud Environment. In this process, involvement of several management tasks such as traffic monitoring, security and performance optimization is big task for Network Administrator. This research reports study the different protocols i.e. conventional protocols like Simple Network Management Protocol and newly Gossip bas...

  19. Service Characteristics Based High Speed Multimedia Transport Protocol

    National Research Council Canada - National Science Library

    Chen, C

    1997-01-01

    .... This multimedia protocol will automatically extract service requirements from multimedia applications by selecting certain sets of parameters from user applications to optimally drive the lower level physical network...

  20. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    Science.gov (United States)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  1. Biometrics based authentication scheme for session initiation protocol.

    Science.gov (United States)

    Xie, Qi; Tang, Zhixiong

    2016-01-01

    Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.

  2. The case for a network protocol isolation layer

    KAUST Repository

    Il Choi, Jung

    2009-01-01

    Network protocols are typically designed and tested individually. In practice, however, applications use multiple protocols concurrently. This discrepancy can lead to failures from unanticipated interactions between protocols. In this paper, we argue that sensor network communication stacks should have an isolation layer, whose purpose is to make each protocol\\'s perception of the wireless channel independent of what other protocols are running. We identify two key mechanisms the isolation layer must provide: shared collision avoidance and fair channel allocation. We present an example design of an isolation layer that builds on the existing algorithms of grant-to-send and fair queueing. However, the complexities of wireless make these mechanisms insufficient by themselves. We therefore propose two new mechanisms that address these limitations: channel decay and fair cancellation. Incorporating these new mechanisms reduces the increase in end-to-end delivery cost associated with concurrently operating two protocols by more than 60%. The isolation layer improves median protocol fairness from 0.52 to 0.96 in Jain\\'s fairness index. Together, these results show that using an isolation layer makes protocols more efficient and robust. Copyright 2009 ACM.

  3. Genomics protocols [Methods in molecular biology, v. 175

    National Research Council Canada - National Science Library

    Starkey, Michael P; Elaswarapu, Ramnath

    2001-01-01

    .... Drawing on emerging technologies in the fields of bioinformatics and proteomics, these protocols cover not only those traditionally recognized as genomics, but also early therapeutich approaches...

  4. The Protocol of Choice for Treatment of Snake Bite

    Directory of Open Access Journals (Sweden)

    Afshin Mohammad Alizadeh

    2016-01-01

    Full Text Available The aim of the current study is to compare three different methods of treatment of snake bite to determine the most efficient one. To unify the protocol of snake bite treatment in our center, we retrospectively reviewed files of the snake-bitten patients who had been referred to us between 2010 and 2014. They were contacted for follow-up using phone calls. Demographic and on-arrival characteristics, protocol used for treatment (WHO/Haddad/GF, and outcome/complications were evaluated. Patients were entered into one of the protocol groups and compared. Of a total of 63 patients, 56 (89% were males. Five, 19, and 28 patients were managed by Haddad, WHO, or GF protocols, respectively. Eleven patients had fallen into both GF and WHO protocols and were excluded. Serum sickness was significantly more common when WHO protocol was used while 100% of the compartment syndromes and 71% of deformities had been reported after GF protocol. The most important complications were considered to be deformity, compartment syndrome, and amputation and were more frequent after the use of WHO and GF protocols (23.1% versus 76.9%; none in Haddad; P = NS. Haddad protocol seems to be the best for treatment of snake-bitten patients in our region. However, this cannot be strictly concluded because of the limited sample size and nonsignificant P values.

  5. Bidirectional Quantum Secure Direct Communication Network Protocol with Hyperentanglement

    International Nuclear Information System (INIS)

    Gu Bin; Chen Yulin; Huang Yugai; Fang Xia

    2011-01-01

    We propose a bidirectional quantum secure direct communication (QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. Compared with other QSDC network protocols, our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information. Also, we discuss the security of our QSDC network protocol and its feasibility with current techniques. (general)

  6. Analysis of limiting information characteristics of quantum-cryptography protocols

    International Nuclear Information System (INIS)

    Sych, D V; Grishanin, Boris A; Zadkov, Viktor N

    2005-01-01

    The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

  7. Interactive verification of Markov chains: Two distributed protocol case studies

    Directory of Open Access Journals (Sweden)

    Johannes Hölzl

    2012-12-01

    Full Text Available Probabilistic model checkers like PRISM only check probabilistic systems of a fixed size. To guarantee the desired properties for an arbitrary size, mathematical analysis is necessary. We show for two case studies how this can be done in the interactive proof assistant Isabelle/HOL. The first case study is a detailed description of how we verified properties of the ZeroConf protocol, a decentral address allocation protocol. The second case study shows the more involved verification of anonymity properties of the Crowds protocol, an anonymizing protocol.

  8. Protocols for second-generation business satellites systems

    Science.gov (United States)

    Evans, B. G.; Coakley, F. P.; El Amin, M. H. M.

    The paper discusses the nature and mix of traffic in business satellite systems and describes the limitations on the protocol imposed by the differing impairments of speech, video, and data. A simple TDMA system protocol is presented which meets the requirements of mixed-service operation. The efficiency of the protocol together with implications for allocation, scheduling and synchronisation are discussed. Future-generation satellites will probably use on-board processing. Some initial work on protocols that make use of on-board processing and the implications for satellite and earth-station equipment are presented.

  9. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Weijia Wang

    2014-06-01

    Full Text Available Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an effcient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable effciency features of PairHand, but enjoys the provable security in the random oracle model.

  10. Variability in donation after cardiac death protocols: a national survey.

    Science.gov (United States)

    Fugate, Jennifer E; Stadtler, Maria; Rabinstein, Alejandro A; Wijdicks, Eelco F M

    2011-02-27

    As donation after cardiac death practices expand, the number of institutional policies is increasing. We contacted organ procurement organizations throughout the United States and requested protocols in hospitals in their donor service areas. Sixty-four protocols were obtained with representation from 16 different states. The terminology and recommended practices varied substantially. The methods for death determination were not specified in 28 (44%) protocols. Most adhered to a 2- to 5-min observation time between circulatory arrest and organ procurement, but 10 (16%) provided no information. This variability reveals a need to define a uniform standard in donation after cardiac death protocols and death determination practices.

  11. Radio protocols for LTE and LTE-advanced

    CERN Document Server

    Yi, SeungJune; Lee, YoungDae; Park, SungJun; Jung, SungHoon

    2012-01-01

    Provides a unique focus on radio protocols for LTE and LTE-Advanced (LTE-A) Giving readers a valuable understanding of LTE radio protocols, this book covers LTE (Long-Term Evolution) Layer 2/3 radio protocols as well as new features including LTE-Advanced. It is divided into two sections to differentiate between the two technologies' characteristics. The authors systematically explain the design principles and functions of LTE radio protocols during the development of mobile handsets. The book also provides essential knowledge on the interaction between mobile networks a

  12. Quantitative methods for studying design protocols

    CERN Document Server

    Kan, Jeff WT

    2017-01-01

    This book is aimed at researchers and students who would like to engage in and deepen their understanding of design cognition research. The book presents new approaches for analyzing design thinking and proposes methods of measuring design processes. These methods seek to quantify design issues and design processes that are defined based on notions from the Function-Behavior-Structure (FBS) design ontology and from linkography. A linkograph is a network of linked design moves or segments. FBS ontology concepts have been used in both design theory and design thinking research and have yielded numerous results. Linkography is one of the most influential and elegant design cognition research methods. In this book Kan and Gero provide novel and state-of-the-art methods of analyzing design protocols that offer insights into design cognition by integrating segmentation with linkography by assigning FBS-based codes to design moves or segments and treating links as FBS transformation processes. They propose and test ...

  13. Zero-Knowledge Protocols and Multiparty Computation

    DEFF Research Database (Denmark)

    Pastro, Valerio

    majority, in which all players but one are controlled by the adversary. In Chapter 5 we present both the preprocessing and the online phase of [DKL+ 13], while in Chapter 2 we describe only the preprocessing phase of [DPSZ12] since the combination of this preprocessing phase with the online phase of [DKL...... on information-theoretic message authentication codes, requires only a linear amount of data from the preprocessing, and improves on the number of field multiplications needed to perform one secure multiplication (linear, instead of quadratic as in earlier work). The preprocessing phase in Chapter 5 comes...... in an actively secure flavour and in a covertly secure one, both of which compare favourably to previous work in terms of efficiency and provable security. Moreover, the covertly secure solution includes a key generation protocol that allows players to obtain a public key and shares of a corresponding secret key...

  14. Cryptographic Protocols Based on Root Extracting

    DEFF Research Database (Denmark)

    Koprowski, Maciej

    In this thesis we design new cryptographic protocols, whose security is based on the hardness of root extracting or more speci cally the RSA problem. First we study the problem of root extraction in nite Abelian groups, where the group order is unknown. This is a natural generalization of the...... complexity of root extraction, even if the algorithm can choose the "public exponent'' itself. In other words, both the standard and the strong RSA assumption are provably true w.r.t. generic algorithms. The results hold for arbitrary groups, so security w.r.t. generic attacks follows for any cryptographic...... groups. In all cases, security follows from a well de ned complexity assumption (the strong root assumption), without relying on random oracles. A smooth natural number has no big prime factors. The probability, that a random natural number not greater than x has all prime factors smaller than x1/u...

  15. Chest magnetic resonance imaging: a protocol suggestion

    Directory of Open Access Journals (Sweden)

    Bruno Hochhegger

    2015-12-01

    Full Text Available Abstract In the recent years, with the development of ultrafast sequences, magnetic resonance imaging (MRI has been established as a valuable diagnostic modality in body imaging. Because of improvements in speed and image quality, MRI is now ready for routine clinical use also in the study of pulmonary diseases. The main advantage of MRI of the lungs is its unique combination of morphological and functional assessment in a single imaging session. In this article, the authors review most technical aspects and suggest a protocol for performing chest MRI. The authors also describe the three major clinical indications for MRI of the lungs: staging of lung tumors; evaluation of pulmonary vascular diseases; and investigation of pulmonary abnormalities in patients who should not be exposed to radiation.

  16. The Kyoto Protocol Is Cost-effective

    Directory of Open Access Journals (Sweden)

    Marino Gatto

    2002-06-01

    Full Text Available Despite recent advances, there is a high degree of uncertainty concerning the climate change that would result from increasing atmospheric greenhouse gas concentrations. Also, opponents of the Kyoto Protocol raised the key objection that reducing emissions would impose an unacceptable economic burden on businesses and consumers. Based on an analysis of alternative scenarios for electricity generation in Italy, we show that if the costs in terms of damage to human health, material goods, agriculture, and the environment caused by greenhouse gas emissions are included in the balance, the economic argument against Kyoto is untenable. Most importantly, the argument holds true even if we exclude global external costs (those due to global warming, and account for local external costs only (such as those due to acidic precipitation and lung diseases resulting from air pollution.

  17. Data-sharing protocol: A prototype implementation

    International Nuclear Information System (INIS)

    Gibney, T.; Greenwood, D.

    1992-12-01

    This paper describes a client/server communication protocol which will allow physicists to access data from cooperating remote experiments. Special low-level ''client'' software within the user's ''home'' data-access library formulates a request for data from the remote experiment. This request is sent over a network to a server at the remote site. The server has specific knowledge about the location and format of the requested data. The server gets the data and sends it over the network to the requesting client, which reformats the data according to the local library's conventions. Our prototype is being developed to suppose remote access to data from ATF, PBX, and micro Vax data from Tore-Supra. We have attempted to create a flexible design which should accommodate data from other experiments as well

  18. Neonatal euthanasia: lessons from the Groningen Protocol.

    Science.gov (United States)

    Eduard Verhagen, A A

    2014-10-01

    Decisions about neonatal end-of-life care have been studied intensely over the last 20 years in The Netherlands. Nationwide surveys were done to quantify these decisions, provide details and monitor the effect of guidelines, new regulations and other interventions. One of those interventions was the Groningen Protocol for newborn euthanasia in severely ill newborns, published in 2005. Before publication, an estimated 20 cases of euthanasia per year were performed. After publication, only two cases in five years were reported. Studies suggested that this might be partly caused by the lack of consensus about the dividing line between euthanasia and palliative care. New recommendations about paralytic medication use in dying newborns were issued to increase transparency and to improve reporting of euthanasia. New surveys will be needed to measure the effects of these interventions. This cycle of interventions and measurements seems useful for continuous improvement of end-of-life care in newborns. Copyright © 2014 Elsevier Ltd. All rights reserved.

  19. Fault recovery in the reliable multicast protocol

    Science.gov (United States)

    Callahan, John R.; Montgomery, Todd L.; Whetten, Brian

    1995-01-01

    The Reliable Multicast Protocol (RMP) provides a unique, group-based model for distributed programs that need to handle reconfiguration events at the application layer. This model, called membership views, provides an abstraction in which events such as site failures, network partitions, and normal join-leave events are viewed as group reformations. RMP provides access to this model through an application programming interface (API) that notifies an application when a group is reformed as the result of a some event. RMP provides applications with reliable delivery of messages using an underlying IP Multicast (12, 5) media to other group members in a distributed environment even in the case of reformations. A distributed application can use various Quality of Service (QoS) levels provided by RMP to tolerate group reformations. This paper explores the implementation details of the mechanisms in RMP that provide distributed applications with membership view information and fault recovery capabilities.

  20. Protocols and plan of quantum cryptography

    Directory of Open Access Journals (Sweden)

    Milorad S. Markagić

    2012-01-01

    Full Text Available Along with the development of confidentiality of data and resources, there is a need to develop systems that would provide confidentiality. Currently, the most used systems are classical cryptographic systems and encryption public key systems. However, none of these systems provides a solution for the famous 'catch 22' of cryptography. Owing to the intensive development of quantum mechanics, in the last 30 years emerged an entirely new kind of cryptography-quantum cryptography. Its greatest contribution is a possibility to discover an intercepted communication channel from a third party. The question is: is this really true? The question arises: 'If the quantum cryptography is so good, why is not widely used?' The aim of this paper is, on the one hand, to define the basic mechanisms of quantum cryptography IP, and, on the other hand, to point to the shortcomings, as they related to the opportunities of today's devices and flaws in protocols.