WorldWideScience

Sample records for antineoplastic protocols

  1. A study protocol for the evaluation of occupational mutagenic/carcinogenic risks in subjects exposed to antineoplastic drugs: a multicentric project

    OpenAIRE

    Gelatti Umberto; Sabatini Laura; Dominici Luca; Appolloni Massimo; Buschini Annamaria; Carrieri Mariella; Ceretti Elisabetta; Barbieri Anna; Villarini Milena; Grollino Maria G; Mussi Francesca; Pavanello Sofia; Feretti Donatella; Bonfiglioli Roberta; Moretti Massimo

    2011-01-01

    Abstract Background Some industrial hygiene studies have assessed occupational exposure to antineoplastic drugs; other epidemiological investigations have detected various toxicological effects in exposure groups labeled with the job title. In no research has the same population been studied both environmentally and epidemiologically. The protocol of the epidemiological study presented here uses an integrated environmental and biological monitoring approach. The aim is to assess in hospital n...

  2. A study protocol for the evaluation of occupational mutagenic/carcinogenic risks in subjects exposed to antineoplastic drugs: a multicentric project

    Directory of Open Access Journals (Sweden)

    Gelatti Umberto

    2011-03-01

    Full Text Available Abstract Background Some industrial hygiene studies have assessed occupational exposure to antineoplastic drugs; other epidemiological investigations have detected various toxicological effects in exposure groups labeled with the job title. In no research has the same population been studied both environmentally and epidemiologically. The protocol of the epidemiological study presented here uses an integrated environmental and biological monitoring approach. The aim is to assess in hospital nurses preparing and/or administering therapy to cancer patients the current level of occupational exposure to antineoplastic drugs, DNA and chromosome damage as cancer predictive effects, and the association between the two. Methods/Design About 80 healthy non-smoking female nurses, who job it is to prepare or handle antineoplastic drugs, and a reference group of about 80 healthy non-smoking female nurses not occupationally exposed to chemicals will be examined simultaneously in a cross-sectional study. All the workers will be recruited from five hospitals in northern and central Italy after their informed consent has been obtained. Evaluation of surface contamination and dermal exposure to antineoplastic drugs will be assessed by determining cyclophosphamide on selected surfaces (wipes and on the exposed nurses' clothes (pads. The concentration of unmetabolized cyclophosphamide as a biomarker of internal dose will be measured in end-shift urine samples from exposed nurses. Biomarkers of effect and susceptibility will be assessed in exposed and unexposed nurses: urinary concentration of 8-hydroxy-2-deoxyguanosine; DNA damage detected using the single-cell microgel electrophoresis (comet assay in peripheral white blood cells; micronuclei and chromosome aberrations in peripheral blood lymphocytes. Genetic polymorphisms for enzymes involved in metabolic detoxification (i.e. glutathione S-transferases will also be analysed. Using standardized questionnaires

  3. Antineoplastic Drugs.

    Science.gov (United States)

    Morris, Sara; Michael, Nancy, Ed.

    This module on antineoplastic drugs is intended for use in inservice or continuing education programs for persons who administer medications in long-term care facilities. Instructor information, including teaching suggestions, and a listing of recommended audiovisual materials and their sources appear first. The module goal and objectives are then…

  4. Hospital surfaces contamination with antineoplastic drugs: influence of cleaning procedures

    OpenAIRE

    Oliveira, Ana Cebola; Pádua, Mário; Viegas, Susana

    2016-01-01

    Introduction: The raising frequency of cancer diseases is leading to a widespread application of antineoplastic drugs, thus increasing the probability of workplace surfaces contamination. Most of these drugs are classified by the International Agency for Research on Cancer as known or suspected human carcinogens. Skin absorption is the main route for antineoplastic drugs exposure in occupational settings, therefore cleaning protocols have paramount influence in surfaces contamination and, con...

  5. Comet assay as a human biomonitoring tool: application in occupational exposure to antineoplastic drugs

    Directory of Open Access Journals (Sweden)

    Carina Ladeira

    2015-05-01

    The study population consisted of 46 exposed subjects working as pharmacists, pharmacy technicians, and nurses that handle antineoplastic drugs of two hospital units, and 46 unexposed control subjects. Isolated lymphocytes were cryopreserved following the protocols of Duthie et a

  6. Antibacterial activities of antineoplastic agents.

    OpenAIRE

    Bodet, C A; Jorgensen, J H; Drutz, D J

    1985-01-01

    Fourteen antineoplastic agents were examined for in vitro antibacterial activity against 101 aerobic and anaerobic bacterial isolates representing indigenous human microflora and selected opportunistic pathogens. Only 5-fluorouracil, mitomycin, and etoposide demonstrated inhibitory effects at achievable plasma concentrations, while the remaining drugs lacked appreciable antibacterial activities.

  7. Handling of injectable antineoplastic agents.

    OpenAIRE

    Knowles, R S; Virden, J E

    1980-01-01

    Although the clinical toxicity of antineoplastic drugs has been well documented there is little or no information on the problems that may arise on the handling and mishandling of such agents. This paper attempts to highlight the importance of taking precautions to prevent adverse effects resulting from contact with cytotoxic drugs during handling and to suggest a practical guide for the handling of such agents.

  8. Hematological Changes in Nurses Handling Antineoplastic Drugs

    OpenAIRE

    Ansari-Lari, M; M.Saadat

    2002-01-01

    A cross-sectional study to determine whether occupational exposure to antineoplastic drugs can cause hematologic changes was performed. Blood samples were collected from a group of 24 hematology/oncology nurses who were exposed to antineoplastic drugs during a mean preiod of 5.5 years (standard error =1.1). The control group, matched by sex, and age, consisted of 18 nurses, worked on other sections. Within the normal range we found significant differences between the exposed and the control g...

  9. Hematological Changes in Nurses Handling Antineoplastic Drugs

    Directory of Open Access Journals (Sweden)

    M Ansari-Lari

    2002-08-01

    Full Text Available A cross-sectional study to determine whether occupational exposure to antineoplastic drugs can cause hematologic changes was performed. Blood samples were collected from a group of 24 hematology/oncology nurses who were exposed to antineoplastic drugs during a mean preiod of 5.5 years (standard error =1.1. The control group, matched by sex, and age, consisted of 18 nurses, worked on other sections. Within the normal range we found significant differences between the exposed and the control group in the absolute mean number of the total white blood cells (t=-2.50; df=40; P<0.05 and neutrophils (t=-1.72; df=40; P<0.05; one tailed test. The findings suggested, that the hematologic changes can serve as biological markers for medical surveillance and early detection of health problems due to handling antineoplastic drugs.

  10. Occupational rhinosinusitis due to etoposide, an antineoplastic agent

    DEFF Research Database (Denmark)

    Meyer, Harald W; Skov, Per Stahl

    2010-01-01

    This paper reports a rare case of an occupational hypersensitivity reaction to an antineoplastic agent.......This paper reports a rare case of an occupational hypersensitivity reaction to an antineoplastic agent....

  11. Antineoplastic drugs: Occupational exposure and health risks

    NARCIS (Netherlands)

    Fransman, W.

    2006-01-01

    Antineoplastic drugs are pharmaceuticals commonly used to treat cancer (and some non-neoplastic diseases), which are generally referred to as 'chemotherapy'. Oncology nurses are exposed to these drugs via the skin of hands during daily nursing activities, even when protective gloves are being used.

  12. Tumor targeting using liposomal antineoplastic drugs

    OpenAIRE

    Jörg Huwyler; Jürgen Drewe; Stephan Krähenbühl

    2008-01-01

    Jörg Huwyler1, Jürgen Drewe2, Stephan Krähenbühl21University of Applied Sciences Northwestern Switzerland, Institute of Pharma Technology, Muttenz, Switzerland; 2Department of Research and Division of Clinical Pharmacology, University Hospital Basel, Basel, SwitzerlandAbstract: During the last years, liposomes (microparticulate phospholipid vesicles) have beenused with growing success as pharmaceutical carriers for antineoplastic drugs. Fields of applicatio...

  13. Antineoplastic drugs: Occupational exposure and health risks

    OpenAIRE

    Fransman, W.

    2006-01-01

    Antineoplastic drugs are pharmaceuticals commonly used to treat cancer (and some non-neoplastic diseases), which are generally referred to as 'chemotherapy'. Oncology nurses are exposed to these drugs via the skin of hands during daily nursing activities, even when protective gloves are being used. Results of tests on bulk and surface contamination samples confirmed that patients intravenously treated with cyclophosphamide excrete the unmetabolized drug. The introduction of new guidelines and...

  14. Serine deprivation enhances antineoplastic activity of biguanides.

    Science.gov (United States)

    Gravel, Simon-Pierre; Hulea, Laura; Toban, Nader; Birman, Elena; Blouin, Marie-José; Zakikhani, Mahvash; Zhao, Yunhua; Topisirovic, Ivan; St-Pierre, Julie; Pollak, Michael

    2014-12-15

    Metformin, a biguanide widely used in the treatment of type II diabetes, clearly exhibits antineoplastic activity in experimental models and has been reported to reduce cancer incidence in diabetics. There are ongoing clinical trials to evaluate its antitumor properties, which may relate to its fundamental activity as an inhibitor of oxidative phosphorylation. Here, we show that serine withdrawal increases the antineoplastic effects of phenformin (a potent biguanide structurally related to metformin). Serine synthesis was not inhibited by biguanides. Instead, metabolic studies indicated a requirement for serine to allow cells to compensate for biguanide-induced decrease in oxidative phosphorylation by upregulating glycolysis. Furthermore, serine deprivation modified the impact of metformin on the relative abundance of metabolites within the citric acid cycle. In mice, a serine-deficient diet reduced serine levels in tumors and significantly enhanced the tumor growth-inhibitory actions of biguanide treatment. Our results define a dietary manipulation that can enhance the efficacy of biguanides as antineoplastic agents that target cancer cell energy metabolism. PMID:25377470

  15. Antineoplastic mechanisms of Iodine in cancers that take up Iodine

    Directory of Open Access Journals (Sweden)

    Carmen Aceves

    2015-12-01

    Full Text Available Purpose: In addition to being a component of thyroid hormone (TH, iodine can be an antioxidant as well as an antiproliferative and differentiation agent that helps to maintain the integrity of several organs with the ability to take up iodine.Methods and Results: Studies from our laboratory shown that in preclinical (cell culture, induced animal cancer and xenographs and clinical studies (mammary cancer protocol, molecular iodine (I2 supplementation exerts suppressive effects on implantation, development, and progression of cancer neoplasias. These effects can be mediated by a variety of mechanisms and pathways, including direct actions, in which the oxidized iodine modulates the immune/tumor response and through iodolipid formation and the activation of peroxisome proliferator-activated receptors type gamma (PPARγ triggering apoptotic and/or differentiation pathways.Conclusion: The absence of side effects and the easy availability and handling of I2 have allowed the establishment of clinical protocols to utilize I2 supplementation as an adjuvant in therapies against cancers that take up iodine.-----------------------------------------Cite this article as:  Aceves C, Anguiano B. Antineoplastic mechanisms of Iodine in cancers that take up Iodine. Int J Cancer Ther Oncol 2015; 3(4:3401.[This abstract was presented at the BIT’s 8th Annual World Cancer Congress, which was held from May 15-17, 2015 in Beijing, China.

  16. Nurses with dermal exposure to antineoplastic drugs: reproductive outcomes.

    NARCIS (Netherlands)

    Fransman, W.; Roeleveld, N.; Peelen, S.J.M.; Kort, W. de; Kromhout, H.; Heederik, D.

    2007-01-01

    BACKGROUND: Nurses and other hospital workers are exposed to antineoplastic drugs during daily activities. Previous studies suggest that antineoplastic drugs at occupational exposure levels may be toxic to reproduction, but these studies are not consistent or conclusive. METHODS: Self-administered q

  17. Nurses with dermal exposure to antineoplastic drugs: Reproductive outcomes

    NARCIS (Netherlands)

    Fransman, W.; Roeleveld, N.; Peelen, S.; Kort, W.de; Kromhout, H.; Heederik, D.

    2007-01-01

    BACKGROUND: Nurses and other hospital workers are exposed to antineoplastic drugs during daily activities. Previous studies suggest that antineoplastic drugs at occupational exposure levels may be toxic to reproduction, but these studies are not consistent or conclusive. METHODS: Self-administered q

  18. Tumor targeting using liposomal antineoplastic drugs

    Directory of Open Access Journals (Sweden)

    Jörg Huwyler

    2008-03-01

    Full Text Available Jörg Huwyler1, Jürgen Drewe2, Stephan Krähenbühl21University of Applied Sciences Northwestern Switzerland, Institute of Pharma Technology, Muttenz, Switzerland; 2Department of Research and Division of Clinical Pharmacology, University Hospital Basel, Basel, SwitzerlandAbstract: During the last years, liposomes (microparticulate phospholipid vesicles have beenused with growing success as pharmaceutical carriers for antineoplastic drugs. Fields of application include lipid-based formulations to enhance the solubility of poorly soluble antitumordrugs, the use of pegylated liposomes for passive targeting of solid tumors as well as vector-conjugated liposomal carriers for active targeting of tumor tissue. Such formulation and drug targeting strategies enhance the effectiveness of anticancer chemotherapy and reduce at the same time the risk of toxic side-effects. The present article reviews the principles of different liposomal technologies and discusses current trends in this field of research.Keywords: tumor targeting, antineoplastic drugs, liposomes, pegylation, steric stabilization, immunoliposomes

  19. Liposomes as delivery systems for antineoplastic drugs

    Science.gov (United States)

    Medina, Luis Alberto

    2014-11-01

    Liposome drug formulations are defined as pharmaceutical products containing active drug substances encapsulated within the lipid bilayer or in the interior aqueous space of the liposomes. The main importance of this drug delivery system is based on its drastic reduction in systemic dose and concomitant systemic toxicity that in comparison with the free drug, results in an improvement of patient compliance and in a more effective treatment. There are several therapeutic drugs that are potential candidates to be encapsulated into liposomes; particular interest has been focused in therapeutic and antineoplastic drugs, which are characterized for its low therapeutic index and high systemic toxicity. The use of liposomes as drug carriers has been extensively justified and the importance of the development of different formulations or techniques to encapsulate therapeutic drugs has an enormous value in benefit of patients affected by neoplastic diseases.

  20. Antineoplastic Effects of Honey Bee Venom

    Directory of Open Access Journals (Sweden)

    Mohammad Nabiuni

    2013-08-01

    Full Text Available Background: Bee venom (BV, like many other complementary medicines, has been used for thousands of years for the treatment of a range of diseases. More recently, BV is also being considered as an effective composition for the treatment of cancer. Cancer is a major worldwide problem. It is obvious that the identification of compounds that can activate apoptosis could be effective on the treatment of cancer. BV is a very complicated mixture of active peptides, enzymes, and biologically active amines. The two main components of BV are melittin and phospholipase A2 (PLA2. Of these two components, melittin, the major active ingredient of BV, has been identified to induce apoptosis and to possess anti-tumor effects. We tried to review antineoplastic effects of BV in this study. Materials and Methods: The related articles were derived from different data bases such as PubMed, Elsevier Science, and Google Scholar using keywords including bee venom, cancer, and apoptosis.Results: According to the results of this study, BV can induce apoptosis and inhibit tumor cell growth and metastasis. Results of in vivo experiments show that the anti-tumor effect of the BV is highly dependent on the manner of injection as well as the distance between the area of injection and the tumor cells.Conclusion: The results obtained from the reported studies revealed that BV has anti-cancer effects and can be used as an effective chemotherapeutic agent against tumors in the future.

  1. Antineoplastic compounds in the environment-substances of special concern.

    Science.gov (United States)

    Kümmerer, Klaus; Haiß, Annette; Schuster, Armin; Hein, Arne; Ebert, Ina

    2016-08-01

    Antineoplastic drugs are important in the treatment of cancer. Some interact directly with the deoxyribonucleic acid (DNA) and are of utmost importance in terms of risk. As highly active compounds, antineoplastics and their metabolites are largely excreted into wastewater and are found in the aquatic environment up to the lower μg/L range. Their predicted environmental concentrations are often below the action limit set in the European Medicines Agency (EMA) guideline. An in-depth risk assessment regarding their presence and effects in the aquatic environment is often not performed, and there is a lack of knowledge. This study considered whether there is an underestimation of possible risks associated with the presence of antineoplastic drugs with regard to trigger value stated in the EMA and FDA guidelines. In a balance, we identified a total of 102 active pharmaceutical ingredients of the ATC-group L01 (antineoplastic agents), which are environmentally relevant. In Germany, 20.7 t of antineoplastic agents was consumed in 2012. The share of drugs with DNA-damaging properties increased within the last 6 years from 24 up to 67 %. Solely, capecitabine and 5-fluorouracil amount together 8 t-which corresponds to 39 % of the total antineoplastic consumption. Around 80 % of the total mass consumed could be attributed to prescriptions issued by office-based practitioners and is mostly excreted at home. Based on the different mode of actions, a case-by-case evaluation of the risk connected to their presence in the environment is recommended. DNA-damaging drugs should be assessed independently as no action limit can be assumed.

  2. Approval of antineoplastic agents in India: comparison with the US and EU regions

    OpenAIRE

    Bhaven C. Kataria; Dimple S. Mehta; Sunita B Chhaiya

    2012-01-01

    Background: The antineoplastic drugs are prescribed for the treatment of cancer, which is an important cause of mortality in India; therefore, a drug lag in the availability of antineoplastic drugs is a direct threat to life. The present study was undertaken to assess the drug lag for new antineoplastic agents in India compared with that in the United States (US) or European Union (EU). Methods: The new antineoplastic agents approved in the United States, European Union and India between 1999...

  3. 77 FR 38297 - Revised Document Posted: NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare...

    Science.gov (United States)

    2012-06-27

    ... Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2012 AGENCY: National Institute for Occupational... Prevention (CDC) announces the publication of the following document entitled ``NIOSH List of Antineoplastic... Preventing Occupational Exposures to Antineoplastic and Other Hazardous Drugs in Health Care Settings...

  4. Genotoxic assessment in different exposure groups working with antineoplastic agents

    OpenAIRE

    Ladeira, Carina; Viegas, Susana; Pádua, Mário; Carolino, Elisabete; Gomes, Manuel C.; Brito, Miguel

    2015-01-01

    Antioneoplastic drugs are widely used in treatment of cancer, and several studies suggest acute and long-term effects associated to antineoplastic drug exposures, namely associating workplace exposure with health effects. Cytokinesis blocked micronucleus (CBMN) assay is one promising short-term genotoxicity assays for human risk assessment and their combination is recommended to monitor populations chronically exposed to genotoxic agents. The aim of this investigation is the genotoxicity asse...

  5. The Effect of Genetic Polymorphism upon Antineoplastic Sensitivity

    Institute of Scientific and Technical Information of China (English)

    Jun Liang

    2006-01-01

    In clinical practice, patients undergoing chemotherapy display prominent individual differences, adverse reactions and sensitivity to antineoplastic therapy. Those differences are caused by individual genetic polymorphism of related genes. Genetic variation can induce distinct alterations of drug-metabolizing enzymes, drug transporters, drug targets and DNA repair enzymes and thereby influence the ability of the drugs to reach their target sites. This article reviews in detail the potential interactions mentioned above.

  6. Experimental study on anti-neoplastic activity of epigallocatechin-3-gallate to digestive tract carcinomas

    Institute of Scientific and Technical Information of China (English)

    RAN Zhi-hua; ZOU Jian; XIAO Shu-dong

    2005-01-01

    Background Epigallocatechin-3-gallate (EGCG) has been demonstrated to have anti-neoplastic activity, but the effective concentration of EGCG and its possible mechanisms are uncertain. The study on the killing effects of EGCG on different digestive tract cancer cell lines can find target sites of its anti-neoplastic effect and provide a theoretical basis for its clinical application in the treatment of cancers. Methods Methyl thiazolyl tetrazolium (MTT) analysis was made to detect the differential sensitivities of eight digestive tract cancer cell lines to EGCG. The effect of EGCG on cell cycle distribution of sensitive cancer cell line was measured by flow cytometry. By polymerase chain reaction (PCR)-enzyme linked immunosorbent assay (ELISA) protocol, the influence of EGCG on telomerase activity of sensitive cancer cell line was also investigated. RT-PCR method was employed to detect the influence of EGCG on the expressions of hTERT, c-myc, p53 and mad1 genes in sensitive cancer cell line. Results EGCG exhibited dose-dependent killing effects on all eight disgestive tract cancer cell lines. The 50% inhibitory concentration (IC50) of SW1116, MKN45, BGC823, SGC7901, AGS, MKN28, HGC27 and LoVo cells were 51.7 μmol/L, 55.9 μmol/L, 68.5 μmol/L, 79.1 μmol/L, 83.8 μmol/L, 119.8 μmol/L, 183.2 μmol/L and 194.6 μmol/L, respectively. There were no apparent changes in cell cycle distribution of sensitive cancer cell line MKN45 48 hours after incubating with three different concentrations of EGCG compared with the controls. It was found that EGCG could suppress the telomerase activity of MKN45 cells, and the effects were dose- and time-dependent. After EGCG administration, the expression of hTERT and c-myc genes in MKN45 cells was decreased, that of the mad1 gene increased, and that of the p53 gene unchanged. Conclusions EGCG has dose-dependent killing effects on different digestive tract cancer cell lines. Administration of EGCG has no obvious effect on cell cycle

  7. Oral Antineoplastic Agents: Assessing the Delay in Care

    Directory of Open Access Journals (Sweden)

    Brandi Anders

    2015-01-01

    Full Text Available The study was undertaken to determine the length of time between when a prescription for an oral antineoplastic agent is written by the provider and when the medication is received by the patient and to identify risk factors that significantly increase time to medication receipt. First-time fill prescriptions for oral antineoplastic agents were identified. The date the prescription was written and received by the patient was determined. A retrospective review was completed to gather additional information, including prescribed medication, indication, insurance coverage, patient assistance program use, dispensing pharmacy, and prior authorization requirements. The data was analyzed through multivariate statistical analysis and used to identify risk factors that may significantly increase the time to medication receipt. A total of 58 patients were included in the study. A median of 8 days elapsed between when the medication was prescribed and when it was received by the patient. Medication prescribed, absence of a Risk Evaluation Mitigation Strategies (REMS program, and insurance type are factors that increased time to medication receipt. An understanding of the median time involved, as well as factors affecting the time to delivery of prescriptions, will help healthcare providers better plan and prepare for the use of oral antineoplastic agents.

  8. Monitoring method for surface contamination caused by selected antineoplastic agents.

    Science.gov (United States)

    Larson, R R; Khazaeli, M B; Dillon, H Kenneth

    2002-02-01

    A method of evaluating surface contamination caused by selected antineoplastic agents was studied. The antineoplastic agents tested were cyclophosphamide, ifosfamide, doxorubicin hydrochloride, fluorouracil, and paclitaxel. Each agent was reconstituted and prepared as a stock solution. A 0.1-mL portion of each solution was spread evenly over a 600-cm2 area of a stainless steel surface, a resin countertop surface, and a vinyl flooring surface. After drying, the surfaces were wiped with each of two types of commercially available wiping materials (What-man no. 42 filters and Kimberly-Clark Kimwipes). A blend of methanol, acetonitrile, and buffered water was used both as the wetting agent for wiping the surfaces and as a desorbing solution. The desorbate was analyzed for drug concentration by reverse-phase high-performance liquid chromatography (HPLC). Mean +/- S.D. percent total recovery ranged from 72.4% +/- 17.6% to 95.3% +/- 2.9% for the vinyl surface wiped with filters, 91.5% +/- 5.4% to 104.7% +/- 0.8% for the resin surface wiped with filters, 73.9% +/- 2.3% to 95.3% +/- 1.7% for the stainless steel surface wiped with filters, and 18.2% +/- 1.4% to 372.8% +/- 8.0% for the stainless steel surface wiped with Kimwipes. Results were best for ifosfamide and cyclophosphamide. Kimwipes were deemed ineffective for this monitoring method because an ingredient interfered with the quantitative analytical tests. A wipe-sampling, desorption, and HPLC method for monitoring surface contamination by selected antineoplastic agents was sufficiently accurate and sensitive to evaluate surfaces typically found in both the pharmacy and drug administration areas of oncology treatment facilities. PMID:11862639

  9. A pooled analysis to study trends in exposure to antineoplastic drugs among nurses.

    NARCIS (Netherlands)

    Fransman, W.; Peelen, S.J.M.; Hilhorst, S.; Roeleveld, N.; Heederik, D.; Kromhout, H.

    2007-01-01

    OBJECTIVES: Several studies have shown that exposure to antineoplastic drugs can cause toxic effects on reproductive health as well as carcinogenic effects. Numerous studies have corroborated that hospital workers are exposed to these drugs. This study focused on trends in exposure to antineoplastic

  10. 78 FR 33097 - NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2014: Proposed...

    Science.gov (United States)

    2013-06-03

    ... HUMAN SERVICES Centers for Disease Control and Prevention NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2014: Proposed Additions and Deletions to the NIOSH Hazardous Drug... following draft document for public comment entitled ``NIOSH List of Antineoplastic and Other...

  11. 76 FR 46299 - NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2012: Proposed...

    Science.gov (United States)

    2011-08-02

    ... HUMAN SERVICES Centers for Disease Control and Prevention NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2012: Proposed Additions and Deletions to the NIOSH Hazardous Drug... following draft document for public comment entitled ``NIOSH List of Antineoplastic and Other...

  12. Approval of antineoplastic agents in India: comparison with the US and EU regions

    Directory of Open Access Journals (Sweden)

    Bhaven C. Kataria

    2012-02-01

    Full Text Available Background: The antineoplastic drugs are prescribed for the treatment of cancer, which is an important cause of mortality in India; therefore, a drug lag in the availability of antineoplastic drugs is a direct threat to life. The present study was undertaken to assess the drug lag for new antineoplastic agents in India compared with that in the United States (US or European Union (EU. Methods: The new antineoplastic agents approved in the United States, European Union and India between 1999 and 2011 were identified and information was gathered primarily from the websites of regulatory agencies of the three regions. We assessed absolute and relative drug lag for new antineoplastic agents approved in the three regions. Results: Of the 70 new antineoplastic agents, 64 (91.42% were approved in the United States, 54 (77.14% in the European Union and 44 (62.85% in India. The US was the first to approve 59 (84.28% out of the 70 new antineoplastic agents, the EU was the first to approve 9 (12.85% and India was the first to approve 2 (2.85%. The median approval lag for India (26.35 months was higher as compared to the United States (0 month and European Union (7.3 months. Conclusions: This study confirms that India's drug lag in the case of new antineoplastic agents is higher as compared to the US and EU. Further detailed analyses are necessary to find the reasons and impacts of drug lag for antineoplastic agents in India. [Int J Basic Clin Pharmacol 2012; 1(1.000: 13-21

  13. Autophagy process is associated with anti-neoplastic function

    Institute of Scientific and Technical Information of China (English)

    Chong Wang; Yachen Wang; Michael A. McNutt; Wei-Guo Zhu

    2011-01-01

    Autophagy is a highly conserved process of cellular degradation, which is present in yeast, plants, and mammals.Under normal physiological conditions, autophagy acts to maintain cellular homeostasis and regulate the turnover of organelles.In response to cellular stresses, autophagy prevents the accumulation of impaired proteins and organelles, which serves to inhibit carcinogenesis.On this basis,it is widely accepted that most tumor suppressors, such as beclin 1 associated proteins, forkhead box class O (FoxO)family proteins, multiple mammalian target of Rapamycin (mTOR) inactivators, and nuclear p53 play a role in indu cing autophagy.Here, we focus on how the process of autophagy is associated with anti-neoplastic function.

  14. Stereocomplex micelle from nonlinear enantiomeric copolymers efficiently transports antineoplastic drug

    Science.gov (United States)

    Wang, Jixue; Shen, Kexin; Xu, Weiguo; Ding, Jianxun; Wang, Xiaoqing; Liu, Tongjun; Wang, Chunxi; Chen, Xuesi

    2015-05-01

    Nanoscale polymeric micelles have attracted more and more attention as a promising nanocarrier for controlled delivery of antineoplastic drugs. Herein, the doxorubicin (DOX)-loaded poly(D-lactide)-based micelle (PDM/DOX), poly(L-lactide)-based micelle (PLM/DOX), and stereocomplex micelle (SCM/DOX) from the equimolar mixture of the enantiomeric four-armed poly(ethylene glycol)-polylactide (PEG-PLA) copolymers were successfully fabricated. In phosphate-buffered saline (PBS) at pH 7.4, SCM/DOX exhibited the smallest hydrodynamic diameter ( D h) of 90 ± 4.2 nm and the slowest DOX release compared with PDM/DOX and PLM/DOX. Moreover, PDM/DOX, PLM/DOX, and SCM/DOX exhibited almost stable D hs of around 115, 105, and 90 nm at above normal physiological condition, respectively, which endowed them with great potential in controlled drug delivery. The intracellular DOX fluorescence intensity after the incubation with the laden micelles was different degrees weaker than that incubated with free DOX · HCl within 12 h, probably due to the slow DOX release from micelles. As the incubation time reached to 24 h, all the cells incubated with the laden micelles, especially SCM/DOX, demonstrated a stronger intracellular DOX fluorescence intensity than free DOX · HCl-cultured ones. More importantly, all the DOX-loaded micelles, especially SCM/DOX, exhibited potent antineoplastic efficacy in vitro, excellent serum albumin-tolerance stability, and satisfactory hemocompatibility. These encouraging data indicated that the loading micelles from nonlinear enantiomeric copolymers, especially SCM/DOX, might be promising in clinical systemic chemotherapy through intravenous injection.

  15. "Sister Chromatid Exchanges and Micronuclei in Lymphocyte of Nurses Handling Antineoplastic Drugs"

    Directory of Open Access Journals (Sweden)

    M Ansari-Lari

    2001-07-01

    Full Text Available Individuals handling antineoplastic drugs or their wastes may absorb these potent genotoxic agents. The effects of handling antineoplastic drugs were examined in a group of 24 nurses working in the hematology and oncology departments of two different university hospitals in Shiraz (Iran and in a group of 18 unexposed nurses as control group. The cytogenetic repercussions of exposure were assessed by examining sister chromatid exchanges (SCEs and micronuclei (Mn in circulating lymphocytes. A significant increased frequencies of SCE and Mn is observed in circulating lymphocytes. A significant increased frequencies of SCE and Mn is observed in nurses in daily contact with antineoplastic drugs as compared to control group.

  16. 77 FR 41190 - Revised Document Posted: NIOSH List of Antineoplastic and Other Hazardous Drugs in Healthcare...

    Science.gov (United States)

    2012-07-12

    ... in the Federal Register June 27, 2012, (77 FR 38297). This notice is corrected as follows: On page... Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2012, Correction AGENCY: National Institute...

  17. List of Antineoplastic and Other Hazardous Drugs in Healthcare Settings 2012

    Science.gov (United States)

    ... 68:16.04 Estrogens Not in AHFS (nonsteroidal synthetic estrogen) 76:00 Oxytocics 10:00 Antineoplastic agents ... Raltitrexed Ribavirin Streptozocin Tacrolimus Tamoxifen Temozolomide Teniposide Testolactone Testosterone Thalidomide Thioguanine Thiotepa Topotecan Toremifene citrate Tositumomab Tretinoin ...

  18. The Drug Sensitivity of Cyclosporine A Combined with Antineoplastic Drugs in Retinoblastoma in Vitro

    Institute of Scientific and Technical Information of China (English)

    Wanli Liu; Zhongyao Wu

    2005-01-01

    Purpose: To study cyclosporine A inhibition on the fresh retinoblastoma cells in vitro and increasing the drug sensitivity after combined with different antineoplastic drugs.Methods: To study the growth curve of cyclosporine A on 27 samples of primary retinoblastoma cells by MTT assay and to study the change of the drug sensitivity by cyclosporine A combined with seven antineoplastic drugs.Results: The average IC50 of cyclosporine A on the 27 retinoblastoma cells is 67.81μg/ml and the average inhibitive rate of these samples is 26.1% when cyclosporine A is in the concentration of 2μg/ml. The inhibitive rates all got improved after the seven antineoplastic drugs combined with cyclosporine A and the increasing average inhibitive rate is more than 5.Conclusion: Cyclosporine A can inhibit retinoblastoma cells in vitro and its inhibitive effect is dose dependent. Moreover it can enhance the inhibition of multiple antineoplastic drugs on retinoblastoma cells.

  19. 392 Lung Toxicity Induced by Novel Antineoplastic Therapies in Cancer Patients

    OpenAIRE

    Syrigos, Kostas N.; Vassos, Dimitrios; Makrilia, Nektaria; Tsimpoukis, Sotirios; Politi, Ekaterini; Dannos, Ioannis; Syrigou, Ekaterini

    2012-01-01

    Background Pulmonary toxicity and respiratory failure are major adverse events complicating the use of novel antineoplastic agents in the treatment of lung cancer. We aim to investigate the risk and characteristics of cytostatic-induced pulmonary toxicity caused by agents currently used to treat lung cancer. Methods A literature search was performed in PubMed to identify relative studies published until June 2011. Results Almost all categories of antineoplastic agents have been associated wit...

  20. Berberine and Coptidis Rhizoma as novel antineoplastic agents: A review of traditional use and biomedical investigations

    OpenAIRE

    Feng, Y.; Tsao, S; Tang, J; Wang, N.; Curtain, R; Wang, Y.

    2009-01-01

    Ethnopharmacological relevance: Coptidis Rhizoma (Huanglian) and its major component, berberine, have drawn extensive attention toward their antineoplastic effects in the recent years. The antineoplastic effects are related to the Chinese Medicine (CM) properties of Huangliang in treating diseases by removing damp-heat and purging fire and counteracting toxicity. Aim of the review: To trace the long history of the traditional use of Huanglian from folk medicines, especially from Chinese medic...

  1. Interactive effects of antifungal and antineoplastic agents on yeasts commonly prevalent in cancer patients.

    OpenAIRE

    Ghannoum, M. A.; Motawy, M S; Abu Hatab, M A; Abu Elteen, K H; Criddle, R. S.

    1989-01-01

    The effects of combinations of antifungal and antineoplastic drugs on inhibition of the growth of yeasts which commonly infect cancer patients have been analyzed. It was shown that (i) inhibitory drug combinations could be selected in which all drugs were at levels far below their individual MICs; (ii) interactive effects among antineoplastic and antifungal drugs may be very large; (iii) optimum combinations of drugs for inhibition of yeast growth depended upon both the relative and absolute ...

  2. "Sister Chromatid Exchanges and Micronuclei in Lymphocyte of Nurses Handling Antineoplastic Drugs"

    OpenAIRE

    Ansari-Lari, M; M.Saadat; Shahryari, M.; DD Farhud

    2001-01-01

    Individuals handling antineoplastic drugs or their wastes may absorb these potent genotoxic agents. The effects of handling antineoplastic drugs were examined in a group of 24 nurses working in the hematology and oncology departments of two different university hospitals in Shiraz (Iran) and in a group of 18 unexposed nurses as control group. The cytogenetic repercussions of exposure were assessed by examining sister chromatid exchanges (SCEs) and micronuclei (Mn) in circulating lymphocytes. ...

  3. Redox-directed cancer therapeutics: Taurolidine and Piperlongumine as broadly effective antineoplastic agents (Review)

    OpenAIRE

    MÖHLER, HANS; PFIRMAN, ROLF W.; Frei, Karl

    2014-01-01

    Targeting the oxygen stress response pathway is considered a promising strategy to exert antineoplastic activity in a broad spectrum of tumor types. Supporting this view, we summarize the mechanism of action of Taurolidine and Piperlongumine, two antineoplastic agents with strikingly broad tumor selectivity. Taurolidine enhances the oxidative stress (ROS) selectively in tumor cells. Its cytotoxicity for various tumor cells in vitro and in vivo, which includes tumor stem cells, is based on the...

  4. Unexploited Antineoplastic Effects of Commercially Available Anti-Diabetic Drugs

    Science.gov (United States)

    Papanagnou, Panagiota; Stivarou, Theodora; Tsironi, Maria

    2016-01-01

    The development of efficacious antitumor compounds with minimal toxicity is a hot research topic. Numerous cancer cell targeted agents are evaluated daily in laboratories for their antitumorigenicity at the pre-clinical level, but the process of their introduction into the market is costly and time-consuming. More importantly, even if these new antitumor agents manage to gain approval, clinicians have no former experience with them. Accruing evidence supports the idea that several medications already used to treat pathologies other than cancer display pleiotropic effects, exhibiting multi-level anti-cancer activity and chemosensitizing properties. This review aims to present the anticancer properties of marketed drugs (i.e., metformin and pioglitazone) used for the management of diabetes mellitus (DM) type II. Mode of action, pre-clinical in vitro and in vivo or clinical data as well as clinical applicability are discussed here. Given the precious multi-year clinical experience with these non-antineoplastic drugs their repurposing in oncology is a challenging alternative that would aid towards the development of therapeutic schemes with less toxicity than those of conventional chemotherapeutic agents. More importantly, harnessing the antitumor function of these agents would save precious time from bench to bedside to aid the fight in the arena of cancer. PMID:27164115

  5. Dental anomalies in children submitted to antineoplastic therapy

    Directory of Open Access Journals (Sweden)

    Camila Merida Carrillo

    2014-06-01

    Full Text Available Cancer is the third most frequent cause of death in children in Brazil. Early diagnosis and medical advances have significantly improved treatment outcomes, which has resulted in higher survival rates and the management of late side effects has become increasingly important in caring for these patients. Dental abnormalities are commonly observed as late effects of antineoplastic therapy in the oral cavity. The incidence and severity of the dental abnormalities depend on the child's age at diagnosis and the type of chemotherapeutic agent used, as well as the irradiation dose and area. The treatment duration and aggressivity should also be considered. Disturbances in dental development are characterized by changes in shape, number and root development. Enamel anomalies, such as discoloration, opacities and hypoplasia are also observed in these patients. When severe, these abnormalities can cause functional and esthetic sequelae that have an impact on the children's and adolescents' quality of life. General dentists and pediatric dentists should understand these dental abnormalities and how to identify them aiming for early diagnosis and appropriate treatment.

  6. Antineoplastic Effect of Decoy Oligonucleotide Derived from MGMT Enhancer

    Science.gov (United States)

    Refael, Miri; Zrihan, Daniel; Siegal, Tali; Lavon, Iris

    2014-01-01

    Silencing of O(6)-methylguanine-DNA-methyltransferase (MGMT) in tumors, mainly through promoter methylation, correlates with a better therapeutic response and with increased survival. Therefore, it is conceivable to consider MGMT as a potential therapeutic target for the treatment of cancers. Our previous results demonstrated the pivotal role of NF-kappaB in MGMT expression, mediated mainly through p65/NF-kappaB homodimers. Here we show that the non-canonical NF-KappaB motif (MGMT-kappaB1) within MGMT enhancer is probably the major inducer of MGMT expression following NF-kappaB activation. Thus, in an attempt to attenuate the transcription activity of MGMT in tumors we designed locked nucleic acids (LNA) modified decoy oligonucleotides corresponding to the specific sequence of MGMT-kappaB1 (MGMT-kB1-LODN). Following confirmation of the ability of MGMT-kB1-LODN to interfere with the binding of p65/NF-kappaB to the NF-KappaB motif within MGMT enhancer, the efficacy of the decoy was studied in-vitro and in-vivo. The results of these experiments show that the decoy MGMT-kB1-LODN have a substantial antineoplastic effect when used either in combination with temozolomide or as monotherapy. Our results suggest that MGMT-kB1-LODN may provide a novel strategy for cancer therapy. PMID:25460932

  7. Antineoplastic effects of mammalian target of rapamycine inhibitors.

    Science.gov (United States)

    Salvadori, Maurizio

    2012-10-24

    Cancer after transplantation is the third cause of death and one of the more relevant comorbidities. Aim of this review is to verify the role of different pathogenetic mechanisms in cancer development in transplant patients and in general population as well. In particular has been outlined the different role exerted by two different families of drug as calcineurin inhibitor and mammalian target of rapamycin (mTOR) inhibitor. The role of mTOR pathways in cell homeostasis is complex but enough clear. As a consequence the mTOR pathway deregulation is involved in the genesis of several cancers. Hence the relevant role of mTOR inhibitors. The authors review the complex mechanism of action of mTOR inhibitors, not only for what concerns the immune system but also other cells as endothelial, smooth muscle and epithelial cells. The mechanism of action is still now not completely defined and understood. It implies the inhibition of mTOR pathway at different levels, but mainly at level of the phosphorylation of several intracellular kinases that contribute to activate mTOR complex. Many prospective and retrospective studies in transplant patients document the antineoplastic role of mTOR inhibition. More recently mTOR inhibitors proven to be effective in the treatment of some cancers also in general population. Kidney cancers, neuroendocrine tumors and liver cancers seem to be the most sensitive to these drugs. Best results are obtained with a combination treatment, targeting the mTOR pathway at different levels. PMID:24175199

  8. Unexploited Antineoplastic Effects of Commercially Available Anti-Diabetic Drugs

    Directory of Open Access Journals (Sweden)

    Panagiota Papanagnou

    2016-05-01

    Full Text Available The development of efficacious antitumor compounds with minimal toxicity is a hot research topic. Numerous cancer cell targeted agents are evaluated daily in laboratories for their antitumorigenicity at the pre-clinical level, but the process of their introduction into the market is costly and time-consuming. More importantly, even if these new antitumor agents manage to gain approval, clinicians have no former experience with them. Accruing evidence supports the idea that several medications already used to treat pathologies other than cancer display pleiotropic effects, exhibiting multi-level anti-cancer activity and chemosensitizing properties. This review aims to present the anticancer properties of marketed drugs (i.e., metformin and pioglitazone used for the management of diabetes mellitus (DM type II. Mode of action, pre-clinical in vitro and in vivo or clinical data as well as clinical applicability are discussed here. Given the precious multi-year clinical experience with these non-antineoplastic drugs their repurposing in oncology is a challenging alternative that would aid towards the development of therapeutic schemes with less toxicity than those of conventional chemotherapeutic agents. More importantly, harnessing the antitumor function of these agents would save precious time from bench to bedside to aid the fight in the arena of cancer.

  9. Antineoplastic effect of decoy oligonucleotide derived from MGMT enhancer.

    Directory of Open Access Journals (Sweden)

    Tamar Canello

    Full Text Available Silencing of O(6-methylguanine-DNA-methyltransferase (MGMT in tumors, mainly through promoter methylation, correlates with a better therapeutic response and with increased survival. Therefore, it is conceivable to consider MGMT as a potential therapeutic target for the treatment of cancers. Our previous results demonstrated the pivotal role of NF-kappaB in MGMT expression, mediated mainly through p65/NF-kappaB homodimers. Here we show that the non-canonical NF-KappaB motif (MGMT-kappaB1 within MGMT enhancer is probably the major inducer of MGMT expression following NF-kappaB activation. Thus, in an attempt to attenuate the transcription activity of MGMT in tumors we designed locked nucleic acids (LNA modified decoy oligonucleotides corresponding to the specific sequence of MGMT-kappaB1 (MGMT-kB1-LODN. Following confirmation of the ability of MGMT-kB1-LODN to interfere with the binding of p65/NF-kappaB to the NF-KappaB motif within MGMT enhancer, the efficacy of the decoy was studied in-vitro and in-vivo. The results of these experiments show that the decoy MGMT-kB1-LODN have a substantial antineoplastic effect when used either in combination with temozolomide or as monotherapy. Our results suggest that MGMT-kB1-LODN may provide a novel strategy for cancer therapy.

  10. Cancer cell spheroids as a model to evaluate chemotherapy protocols

    OpenAIRE

    Perche, Federico; Torchilin, Vladimir P.

    2012-01-01

    To determine whether the spheroid culture can be used to evaluate drug efficacy, we have evaluated the toxicity of free or carrier-associated doxorubicin as a single drug or in combination with other antineoplastic agents using the spheroid cultures of drug-resistant cancer cells. Paclitaxel, cisplatin, dexamethasone, mitoxantrone, sclareol or methotrexate were used in combination with doxorubicin. The effect of the treatment protocols on free, micellar and liposomal doxorubicin accumulation ...

  11. [Blending powdered antineoplastic medicine in disposable ointment container].

    Science.gov (United States)

    Miyazaki, Yasunori; Uchino, Tomonobu; Kagawa, Yoshiyuki

    2014-01-01

    On dispensing powdered antineoplastic medicines, it is important to prevent cross-contamination and environmental exposure. Recently, we developed a method for blending powdered medicine in a disposable ointment container using a planetary centrifugal mixer. The disposable container prevents cross-contamination. In addition, environmental exposure associated with washing the apparatus does not arise because no blending blade is used. In this study, we aimed to confirm the uniformity of the mixture and weight loss of medicine in the blending procedure. We blended colored lactose powder with Leukerin(®) or Mablin(®) powders using the new method and the ordinary pestle and mortar method. Then, the blending state was monitored using image analysis. Blending variables, such as the blending ratio (1:9-9:1), container size (35-125 mL), and charging rate (20-50%) in the container were also investigated under the operational conditions of 500 rpm and 50 s. At a 20% charging rate in a 35 mL container, the blending precision of the mixtures was not influenced by the blending ratio, and was less than 6.08%, indicating homogeneity. With an increase in the charging rate, however, the blending precision decreased. The possible amount of both mixtures rose to about 17 g with a 20% charging rate in a 125 mL container. Furthermore, weight loss of medicines with this method was smaller than that with the pestle and mortar method, suggesting that this method is safer for pharmacists. In conclusion, we have established a precise and safe method for blending powdered medicines in pharmacies.

  12. [Blending powdered antineoplastic medicine in disposable ointment container].

    Science.gov (United States)

    Miyazaki, Yasunori; Uchino, Tomonobu; Kagawa, Yoshiyuki

    2014-01-01

    On dispensing powdered antineoplastic medicines, it is important to prevent cross-contamination and environmental exposure. Recently, we developed a method for blending powdered medicine in a disposable ointment container using a planetary centrifugal mixer. The disposable container prevents cross-contamination. In addition, environmental exposure associated with washing the apparatus does not arise because no blending blade is used. In this study, we aimed to confirm the uniformity of the mixture and weight loss of medicine in the blending procedure. We blended colored lactose powder with Leukerin(®) or Mablin(®) powders using the new method and the ordinary pestle and mortar method. Then, the blending state was monitored using image analysis. Blending variables, such as the blending ratio (1:9-9:1), container size (35-125 mL), and charging rate (20-50%) in the container were also investigated under the operational conditions of 500 rpm and 50 s. At a 20% charging rate in a 35 mL container, the blending precision of the mixtures was not influenced by the blending ratio, and was less than 6.08%, indicating homogeneity. With an increase in the charging rate, however, the blending precision decreased. The possible amount of both mixtures rose to about 17 g with a 20% charging rate in a 125 mL container. Furthermore, weight loss of medicines with this method was smaller than that with the pestle and mortar method, suggesting that this method is safer for pharmacists. In conclusion, we have established a precise and safe method for blending powdered medicines in pharmacies. PMID:24790050

  13. Anticancer activity of streptochlorin, a novel antineoplastic agent, in cholangiocarcinoma

    Directory of Open Access Journals (Sweden)

    Kwak TW

    2015-04-01

    Full Text Available Tae Won Kwak,1,* Hee Jae Shin,2,* Young-Il Jeong,1 Myoung-Eun Han,3 Sae-Ock Oh,3 Hyun-Jung Kim,4 Do Hyung Kim,5 Dae Hwan Kang1 1Biomedical Research Institute, Pusan National University Hospital, Busan, 2Marine Natural Products Chemistry Laboratory, Korea Institute of Ocean Science and Technology, Ansan, 3Department of Anatomy, School of Medicine, Pusan National University, Gyeongnam, 4Genewel Co Ltd. Gyeonggi-do, 5School of Medicine, Pusan National University, Yangsan, Gyeongnam, Republic of Korea *These authors contributed equally to this work Background: The aim of this study is to investigate the anticancer activity of streptochlorin, a novel antineoplastic agent, in cholangiocarcinoma. Methods: The anticancer activity of streptochlorin was evaluated in vitro in various cholangiocarcinoma cell lines for apoptosis, proliferation, invasiveness, and expression of various protein levels. A liver metastasis model was prepared by splenic injection of HuCC-T1 cholangiocarcinoma cells using a BALB/c nude mouse model to study the systemic antimetastatic efficacy of streptochlorin 5 mg/kg at 8 weeks. The antitumor efficacy of subcutaneously injected streptochlorin was also assessed using a solid tumor xenograft model of SNU478 cells for 22 days in the BALB/c nude mouse. Results: Streptochlorin inhibited growth and secretion of vascular endothelial growth factor by cholangiocarcinoma cells in a dose-dependent manner and induced apoptosis in vitro. In addition, streptochlorin effectively inhibited invasion and migration of cholangiocarcinoma cells. Secretion of vascular endothelial growth factor and activity of matrix metalloproteinase-9 in cholangiocarcinoma cells were also suppressed by treatment with streptochlorin. Streptochlorin effectively regulated metastasis of HuCC-T1 cells in a mouse model of liver metastasis. In a tumor xenograft study using SNU478 cells, streptochlorin significantly inhibited tumor growth without changes in body weight

  14. Taurolidine: cytotoxic and mechanistic evaluation of a novel antineoplastic agent.

    Science.gov (United States)

    Calabresi, P; Goulette, F A; Darnowski, J W

    2001-09-15

    Bis-(1,1-dioxoperhydro-1,2,4-thiadiazinyl-4)methane (taurolidine) is a synthetic broad-spectrum antibiotic that reacts with bacterial cell membrane components to prevent adhesion to epithelial cell surfaces. Reflecting the key role of adhesion in the growth and development of human solid tumors, studies were initiated to assess the antiproliferative activity of this agent in selected human and murine tumor cell lines. A 3-day exposure to Taurolidine inhibited the growth of all of the cell lines evaluated with IC(50)s ranging from 9.6-34.2 microM. Studies to identify the mechanism responsible for this effect were conducted in NIH-3T3 murine fibroblasts and the PA-1 and SKOV-3 human ovarian tumor cells. These studies revealed that a 48-h exposure to taurolidine had little effect on cell cycle distribution in PA-1 and SKOV-3 cells but significantly increased the appearance of DNA debris in the sub-G(0)/G(1) region, an effect consistent with an induction of apoptosis. In contrast, in NIH-3T3 cells, taurolidine exposure did not increase DNA debris in the sub-G(0)/G(1) region. Additional studies assessed phosphotidylserine externalization after a 24-h exposure to taurolidine using annexin-V binding as a cell surface marker. These studies revealed that taurolidine increased the percentage of annexin-V-positive cells by 4-fold and 3-fold in PA-1 and SKOV-3 cells, respectively. In NIH-3T3 cells, taurolidine exposure slightly increased ( approximately 5%) annexin-V binding. Parallel studies revealed that exposure to taurolidine also resulted in poly(ADP-ribose) polymerase cleavage in both ovarian tumor cell lines but not in NIH-3T3 cells. Finally, murine-based studies were conducted to assess the antineoplastic activity of three consecutive daily i.p. bolus injections of taurolidine at doses ranging from 5-mg injection/mouse to 30-mg injection/mouse. The 20-mg injection dose produced approximately 10% mortality and was identified as the maximally tolerated dose in this model

  15. Off-Label and Off-NCCN Guidelines Uses of Antineoplastic Drugs in China

    OpenAIRE

    Weilan Wang; Man Zhu; Daihong Guo; Chao Chen; Dongxiao Wang; Fei Pei; Liang Ma

    2013-01-01

    Background To evaluate off-label and off-NCCN guidelines uses of antineoplastic drugs in a major Chinese hospital. Methods: Totally 1122 patients were selected from July to December 2011. Then, the off-label and off-NCCN guidelines uses of antineoplastic drugs were analyzed. Results: In 798 of 1122 patients (71.12%), drugs were used for off-label. In 317 of 1122 patients (28.25%), the drugs were prescribed for off-label and off-NCCN guidelines. 2591 medical orders for 1122 patients, 1051/2591...

  16. Infiltrative Lung Diseases: Complications of Novel Antineoplastic Agents in Patients with Hematological Malignancies

    Directory of Open Access Journals (Sweden)

    Bobbak Vahid

    2008-01-01

    Full Text Available Infiltrative lung disease is a well-known complication of antineoplastic agents in patients with hematological malignancies. Novel agents are constantly being added to available treatments. The present review discusses different pulmonary syndromes, pathogenesis and management of these novel agents.

  17. Anti-neoplastic efficacy of Haimiding on gastric carcinoma and its mechanisms

    Institute of Scientific and Technical Information of China (English)

    Yu-Bin Ji; Shi-Yong Gao; Hong-Rui Ji; Qi Kong; Xiu-Juan Zhang; Bao-Feng Yang

    2004-01-01

    AIM: To study the anti-neoplastic effect of Haimiding and its mechanisms of action.METHODS: Experiments using MTT and colony formation were carried out to study thein vitro anti-neoplastic action of Haimiding, its in vivo anti-neoplastic action was studied by observing its effect on the weight of tumors in FC mice and S180, H22 tumor bearing mice, as well as their life spans.The effect of Haimiding on cell apoptosis and different stages of cell cycles in human gastric carcinoma cells were studied by flow cytometry. Its effect on [Ca2+]i of human gastric carcinoma cells and the source of Ca2+ during the change of [Ca2+]i were observed by confocal laser scanning technique.RESULTS: Haimiding showed a definite cytotoxicity to 8 human tumor cell lines, which was most prominent against BGC-823, Eca-109 and HCT-8 tumor cells. It also exhibited an obvious inhibition on colony formation of the above tumor cell lines, which was most prominent in Eca-109 tumor cells. It showed obvious inhibition on the growth of tumor in FC mice and S180 bearing mice as well as prolonged the life span of H22 bearing mice. It was able to induce apoptosis and elevate intracellular [Ca2+]i concentration of tumor cells.The source of Ca2+ came from both extracellular Ca2+ influx and intracellular Ca2+ release.CONCLUSION: Haimiding is composed of a TCM preparation and 5-flurouracil. Its anti-neoplastic potency is highly enhanced by synergism as compared with either one of its components. Its mechanisms of anti-neoplastic action can be attributed to its action to initiate apoptosis of tumor cells by opening the membrane calcium channel and inducing intracellular Ca2+ release to elevate [Ca2+]i of the tumor cells.

  18. Gastrointestinal and liver infections in children undergoing antineoplastic chemotherapy in the years 2000

    Science.gov (United States)

    Castagnola, Elio; Ruberto, Eliana; Guarino, Alfredo

    2016-01-01

    AIM: To review gastrointestinal and liver infections in children undergoing antineoplastic chemotherapy. To look at gut microflora features in oncology children. METHODS: We selected studies published after year 2000, excluding trials on transplanted pediatric patients. We searched English language publications in MEDLINE using the keywords: “gastrointestinal infection AND antineoplastic chemotherapy AND children”, “gastrointestinal infection AND oncology AND children”, “liver infection AND antineoplastic chemotherapy AND children”, “liver abscess AND chemotherapy AND child”, “neutropenic enterocolitis AND chemotherapy AND children”, “thyphlitis AND chemotherapy AND children”, “infectious diarrhea AND children AND oncology”, “abdominal pain AND infection AND children AND oncology”, “perianal sepsis AND children AND oncology”, “colonic pseudo-obstruction AND oncology AND child AND chemotherapy”, “microflora AND children AND malignancy”, “microbiota AND children AND malignancy”, “fungal flora AND children AND malignancy”. We also analysed evidence from several articles and book references. RESULTS: Gastrointestinal and liver infections represent a major cause of morbidity and mortality in children undergoing antineoplastic chemotherapy. Antineoplastic drugs cause immunosuppression in addition to direct toxicity, predisposing to infections, although the specific risk is variable according to disease and host features. Common pathogens potentially induce severe diseases whereas opportunistic microorganisms may attack vulnerable hosts. Clinical manifestations can be subtle and not specific. In addition, several conditions are rare and diagnostic process and treatments are not standardized. Diagnosis may be challenging, however early diagnosis is needed for quick and appropriate interventions. Interestingly, the source of infection in those children can be exogenous or endogenous. Indeed, mucosal damage may allow the

  19. Drug lag for antineoplastic and immunomodulating agent approvals in India compared with the US and EU approvals

    Directory of Open Access Journals (Sweden)

    Bhaven C. Kataria

    2016-04-01

    Conclusions: This study confirms that India lag behind the US and EU regions in terms of total number of new drug approvals for antineoplastic and immunomodulating agents. There is a substantial approval delay in India compared to the US and EU regions. Further detailed analyses are necessary to find the reasons and impacts of drug lag for new antineoplastic and immunomodulating agents in India. [Int J Basic Clin Pharmacol 2016; 5(2.000: 335-340

  20. Antineoplastic effects of the DNA methylation inhibitor hydralazine and the histone deacetylase inhibitor valproic acid in cancer cell lines

    OpenAIRE

    Chavez-Blanco, Alma; Perez-Plasencia, Carlos; Perez-Cardenas, Enrique; Carrasco-Legleu, Claudia; Rangel-Lopez, Edgar; Segura-Pacheco, Blanca; Taja-Chayeb, Lucia; Trejo-Becerril, Catalina; Gonzalez-Fierro, Aurora; Candelaria, Myrna; Cabrera, Gustavo; Duenas-Gonzalez, Alfonso

    2006-01-01

    Background Among the epigenetic alterations occurring in cancer, DNA hypermethylation and histone hypoacetylation are the focus of intense research because their pharmacological inhibition has shown to produce antineoplastic activity in a variety of experimental models. The objective of this study was to evaluate the combined antineoplastic effect of the DNA methylation inhibitor hydralazine and the histone deacetylase inhibitor valproic acid in a panel of cancer cell lines. Results Hydralazi...

  1. Antineoplastic effects of the DNA methylation inhibitor hydralazine and the histone deacetylase inhibitor valproic acid in cancer cell lines

    OpenAIRE

    Candelaria Myrna; Gonzalez-Fierro Aurora; Trejo-Becerril Catalina; Taja-Chayeb Lucia; Segura-Pacheco Blanca; Rangel-Lopez Edgar; Carrasco-Legleu Claudia; Perez-Cardenas Enrique; Perez-Plasencia Carlos; Chavez-Blanco Alma; Cabrera Gustavo; Duenas-Gonzalez Alfonso

    2006-01-01

    Abstract Background Among the epigenetic alterations occurring in cancer, DNA hypermethylation and histone hypoacetylation are the focus of intense research because their pharmacological inhibition has shown to produce antineoplastic activity in a variety of experimental models. The objective of this study was to evaluate the combined antineoplastic effect of the DNA methylation inhibitor hydralazine and the histone deacetylase inhibitor valproic acid in a panel of cancer cell lines. Results ...

  2. Comet assay as a human biomonitoring tool: application in occupational exposure to antineoplastic drugs

    OpenAIRE

    Carina Ladeira; Susana Viegas; Gomes, Manuel C.

    2015-01-01

    Antineoplastic drugs are a heterogeneous group of chemicals used in the treatment of cancer, and have been proved by IARC to be mutagens, carcinogens and teratogens agents (Fucic et al., 1998; Burgaz et al., 1999; Sessink & Bos, 1999; Bouraoui et al., 2011; Gulten et al., 2011; Buschini et al., 2013). In general, chemicals that interact directly with DNA by biding covalently or by intercalating, or indirectly by interfering with DNA synthesis, were among the first chemotherapeutics developed ...

  3. Adherence to Safe Handling Guidelines by Health Care Workers Who Administer Antineoplastic Drugs

    OpenAIRE

    Boiano, James M; Steege, Andrea L.; Sweeney, Marie H.

    2014-01-01

    The toxicity of antineoplastic drugs is well documented. Many are known or suspected human carcinogens where no safe exposure level exists. Authoritative guidelines developed by professional practice organizations and federal agencies for the safe handling of these hazardous drugs have been available for nearly three decades. As a means of evaluating the extent of use of primary prevention practices such as engineering, administrative and work practice controls, personal protective equipment ...

  4. Can occupational exposure to antineoplastic drugs increase levels of an inflammatory trigger?

    OpenAIRE

    T. Kamalasundar; Padmaja Udaykumar; Prabin Shah

    2015-01-01

    Background: Antineoplastic drugs (AND) are known to cause collateral damage to normal cells by oxidative stress. This study was conducted to check for oxidative stress in occupational exposure to these drugs using advanced oxidation protein products (AOPP). Methods: Cross-sectional comparison of serum AOPP levels of 33 nurses occupationally exposed and serum AOPP levels of 30 nurses not exposed using modified AOPP method. Results: Serum AOPP levels were significantly increased (p

  5. Anti-inflammatory drugs and uterine cervical cancer cells: Antineoplastic effect of meclofenamic acid

    OpenAIRE

    Soriano-Hernandez, Alejandro D; MADRIGAL-PÉREZ, DANIELA; GALVAN-SALAZAR, HECTOR R.; Martinez-Fierro, Margarita L; Laura L. Valdez-Velazquez; Espinoza-Gómez, Francisco; VAZQUEZ-VUELVAS, OSCAR F.; OLMEDO-BUENROSTRO, BERTHA A.; Guzman-Esquivel, Jose; Rodriguez-Sanchez, Iram P.; LARA-ESQUEDA, AGUSTIN; MONTES-GALINDO, DANIEL A.; Delgado-Enciso, Ivan

    2015-01-01

    Uterine cervical cancer (UCC) is one of the main causes of cancer-associated mortality in women. Inflammation has been identified as an important component of this neoplasia; in this context, anti-inflammatory drugs represent possible prophylactic and/or therapeutic alternatives that require further investigation. Anti-inflammatory drugs are common and each one may exhibit a different antineoplastic effect. As a result, the present study investigated different anti-inflammatory models of UCC ...

  6. Recent Advances on Pathophysiology, Diagnostic and Therapeutic Insights in Cardiac Dysfunction Induced by Antineoplastic Drugs

    OpenAIRE

    Marilisa Molinaro; Pietro Ameri; Giancarlo Marone; Mario Petretta; Pasquale Abete; Fabio Di Lisa; Sabino De Placido; Domenico Bonaduce; Tocchetti, Carlo G

    2015-01-01

    Along with the improvement of survival after cancer, cardiotoxicity due to antineoplastic treatments has emerged as a clinically relevant problem. Potential cardiovascular toxicities due to anticancer agents include QT prolongation and arrhythmias, myocardial ischemia and infarction, hypertension and/or thromboembolism, left ventricular (LV) dysfunction, and heart failure (HF). The latter is variable in severity, may be reversible or irreversible, and can occur soon after or as a delayed cons...

  7. Reversible posterior leukoencephalopathy syndrome and anti-neoplastic agents: a review

    OpenAIRE

    Farheen M. Shah-Khan; Prabodh Shah; Daryl Pinedo

    2011-01-01

    Reversible Posterior Leukoencephalopathy Syndrome (RPLS) is a well recognized entity with a variety of benign and malignant conditions. Recently it has been found to be associated with the use of anti-neoplastic agents including targeted therapies. RPLS occurs rapidly with the use of some drugs and more slowly with others. Combined therapies are associated with a more frequent and more rapid presentation. This review was based on a literature search for English Language articles concerning RP...

  8. Bioactive substances with anti-neoplastic efficacy from marine invertebrates: Porifera and Coelenterata

    OpenAIRE

    Sima, Peter; Vetvicka, Vaclav

    2011-01-01

    An ever increasing demand for new lead compounds in the pharmaceutical industry has led scientists to search for natural bioactive products. Based on this extensive research, marine invertebrates now represent a rich source of novel substances with significant anti-neoplastic activities. As the current approach of synthesizing new and chemically modifying old drugs seems to have slowed down, and the identification of new anticancer drugs is not too promising, a new approach is clearly needed....

  9. Monitoring of Oxidative Stress in Nurses Occupationally Exposed to Antineoplastic Drugs

    OpenAIRE

    Mahboob, M.; Rahman, M. F.; Rekhadevi, P. V.; Sailaja, N.; Balasubramanyam, A; Prabhakar, P. V.; Singh, Shailendra Pratap; Reddy, Utkarsh A.; Rao, G. Sankara; Grover, Paramjit

    2012-01-01

    Antineoplastic drugs (ANDs) have been in clinical usage for more than five decades. The nonselective mechanism of action of ANDs between cancerous and noncancerous cells had well documented side effects such as acute symptoms, reproductive health issues, and potential cancer development in healthcare workers as a result of occupational exposure. The anticancer mechanism of ANDs is the generation of reactive oxygen species (ROS) which are responsible for various side effects in patients underg...

  10. Occupational Exposure to Antineoplastic Drugs: Identification of Job Categories Potentially Exposed throughout the Hospital Medication System

    OpenAIRE

    Hon, Chun-Yip; Teschke, Kay; Chua, Prescillia; Venners, Scott; Nakashima, Lynne

    2011-01-01

    Objectives Studies examining healthcare workers' exposure to antineoplastic drugs have focused on the drug preparation or drug administration areas. However, such an approach has probably underestimated the overall exposure risk as the drugs need to be delivered to the facility, transported internally and then disposed. The objective of this study is to determine whether drug contamination occurs throughout a facility and, simultaneously, to identify those job categories that are potentially ...

  11. Peroxisome Proliferator-Activated Receptors (PPARs) as Potential Inducers of Antineoplastic Effects in CNS Tumors

    OpenAIRE

    Lars Tatenhorst; Eric Hahnen; Heneka, Michael T

    2008-01-01

    The peroxisome proliferator-activated receptors (PPARs) are ligand-inducible transcription factors which belong to the superfamily of nuclear hormone receptors. In recent years it turned out that natural as well as synthetic PPAR agonists exhibit profound antineoplastic as well as redifferentiation effects in tumors of the central nervous system (CNS). The molecular understanding of the underlying mechanisms is still emerging, with partially controverse findings reported by a number of studie...

  12. Cancer incidence and adverse pregnancy outcome in registered nurses potentially exposed to antineoplastic drugs

    OpenAIRE

    Le Nhu D; Teschke Kay; Chow Yat; Lorenzi Maria; Beking Kris; Spinelli John J; Ratner Pamela A; Gallagher Richard P; Dimich-Ward Helen

    2010-01-01

    Abstract Background To determine the relationships of potential occupational exposure to antineoplastic drugs with cancer incidence and adverse pregnancy outcomes in a historical prospective cohort study of female registered nurses (RNs) from British Columbia, Canada (BC). Methods Female RNs registered with a professional regulatory body for at least one year between 1974 and 2000 formed the cohort (n = 56,213). The identifier file was linked to Canadian cancer registries. An RN offspring coh...

  13. Low Concentration of Quercetin Antagonizes the Cytotoxic Effects of Anti-Neoplastic Drugs in Ovarian Cancer

    OpenAIRE

    Na Li; Chaoyang Sun; Bo Zhou; Hui Xing; Ding Ma; Gang Chen; Danhui Weng

    2014-01-01

    OBJECTIVE: The role of Quercetin in ovarian cancer treatment remains controversial, and the mechanism is unknown. The aim of this study was to investigate the therapeutic effects of Quercetin in combination with Cisplatin and other anti-neoplastic drugs in ovarian cancer cells both in vitro and in vivo, along with the molecular mechanism of action. METHODS: Quercetin treatment at various concentrations was examined in combination with Cisplatin, taxol, Pirarubicin and 5-Fu in human epithelial...

  14. Study on Chromosome Damage Among Nurses Occupationally Exposed to Antineoplastic Drugs in an Oncology Department

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    @@ INTRODUCTION Many antineoplastic agents have been shown to be mutagenic, teratogenic and carcinogenic in experimental animals and in vitro test systems. Epidemiological data on the association of secondary neoplasms with a specific chemotherapeutic treatment are available on some 30 agents. Several previous studies concerning hospital personnel have indicated that occupational exposure to cytostatic drugs may be detected by genotoxicological biomonitoring methods, e.g., comet assay, SCEs, chromosomal aberration and micronucleus test.

  15. Isolation and Characterization of Antineoplastic Alkaloids from Catharanthus Roseus L. Don. Cultivated in Egypt

    OpenAIRE

    Shams, Khaled A; Nazif, Naglaa M; Abdel Azim, Nahla S; Abdel Shafeek, Khaled A; El-Missiry, Mostafa M.; Ismail, Shams I; Seif El Nasr, Medhat M

    2009-01-01

    Vinblastine and vincristine (the antileukemic agents) were isolated, in a pure form, from Catharanthus roseus L. Don., cultivated in Egypt, by several chromatographic techniques. Five modified methods for the preparation of total alkaloids were carried out. All the isolated mixtures were evaluated by HPLC and HPTLC analyses. The antineoplastic alkaloids; vinblastine and vincristine, were isolated by the use of vacuum liquid chromatographic column on silica gel : aluminium oxide (1:1) mixed be...

  16. Redox-directed cancer therapeutics: Taurolidine and Piperlongumine as broadly effective antineoplastic agents (review).

    Science.gov (United States)

    Möhler, Hanns; Pfirrmann, Rolf W; Frei, Karl

    2014-10-01

    Targeting the oxygen stress response pathway is considered a promising strategy to exert antineoplastic activity in a broad spectrum of tumor types. Supporting this view, we summarize the mechanism of action of Taurolidine and Piperlongumine, two antineoplastic agents with strikingly broad tumor selectivity. Taurolidine enhances the oxidative stress (ROS) selectively in tumor cells. Its cytotoxicity for various tumor cells in vitro and in vivo, which includes tumor stem cells, is based on the induction of programmed cell death, largely via apoptosis but also necroptosis and autophagy. The redox-directed mechanism of action of Taurolidine is apparent from the finding that reducing agents e.g., N-acetylcysteine or glutathione impair its cytotoxicity, while its effectiveness is enhanced by agents which inhibit the cellular anti‑oxidant capacity. A similar redox-directed antineoplastic action is shown by Piperlongumine, a recently described experimental drug of plant origin. Taurolidine is particularly advantageous in surgical oncology as this taurine-derivative can be applied perioperatively or systemically with good tolerability as shown in initial clinical applications. PMID:25175943

  17. Antineoplastic effects of an Aurora B kinase inhibitor in breast cancer

    Directory of Open Access Journals (Sweden)

    Velazquez-Torres Guermarie

    2010-02-01

    Full Text Available Abstract Background Aurora B kinase is an important mitotic kinase involved in chromosome segregation and cytokinesis. It is overexpressed in many cancers and thus may be an important molecular target for chemotherapy. AZD1152 is the prodrug for AZD1152-HQPA, which is a selective inhibitor of Aurora B kinase activity. Preclinical antineoplastic activity of AZD1152 against acute myelogenous leukemia, multiple myeloma and colorectal cancer has been reported. However, this compound has not been evaluated in breast cancer, the second leading cause of cancer deaths among women. Results The antineoplastic activity of AZD1152-HQPA in six human breast cancer cell lines, three of which overexpress HER2, is demonstrated. AZD1152-HQPA specifically inhibited Aurora B kinase activity in breast cancer cells, thereby causing mitotic catastrophe, polyploidy and apoptosis, which in turn led to apoptotic death. AZD1152 administration efficiently suppressed the tumor growth in a breast cancer cell xenograft model. In addition, AZD1152 also inhibited pulmonary metastatic nodule formation in a metastatic breast cancer model. Notably, it was also found that the protein level of Aurora B kinase declined after inhibition of Aurora B kinase activity by AZD1152-HQPA in a time- and dose-dependent manner. Investigation of the underlying mechanism suggested that AZD1152-HQPA accelerated protein turnover of Aurora B via enhancing its ubiquitination. Conclusions It was shown that AZD1152 is an effective antineoplastic agent for breast cancer, and our results define a novel mechanism for posttranscriptional regulation of Aurora B after AZD1152 treatment and provide insight into dosing regimen design for this kinase inhibitor in metastatic breast cancer treatment.

  18. Low concentration of quercetin antagonizes the cytotoxic effects of anti-neoplastic drugs in ovarian cancer.

    Directory of Open Access Journals (Sweden)

    Na Li

    Full Text Available OBJECTIVE: The role of Quercetin in ovarian cancer treatment remains controversial, and the mechanism is unknown. The aim of this study was to investigate the therapeutic effects of Quercetin in combination with Cisplatin and other anti-neoplastic drugs in ovarian cancer cells both in vitro and in vivo, along with the molecular mechanism of action. METHODS: Quercetin treatment at various concentrations was examined in combination with Cisplatin, taxol, Pirarubicin and 5-Fu in human epithelial ovarian cancer C13* and SKOV3 cells. CCK8 assay and Annexin V assay were for cell viability and apoptosis analysis, immunofluorescence assay, DCFDA staining and realtime PCR were used for reactive oxygen species (ROS-induced injury detection and endogenous antioxidant enzymes expression. Athymic BALB/c-nu nude mice were injected with C13*cells to obtain a xenograft model for in vivo studies. Immunohistochemical analysis was carried out to evaluate the ROS-induced injury and SOD1 activity of xenograft tumors. RESULTS: Contrary to the pro-apoptotic effect of high concentration (40 µM-100 µM of Quercetin, low concentrations (5 µM-30 µM of Quercetin resulted in varying degrees of attenuation of cytotoxicity of Cisplatin treatment when combined with Cisplatin. Similar anti-apoptotic effects were observed when Quercetin was combined with other anti-neoplastic agents: Taxol, Pirarubicin and 5-Fluorouracil (5-Fu. Low concentrations of Quercetin were observed to suppress ROS-induced injury, reduce intracellular ROS level and increase the expression of endogenous antioxidant enzymes, suggesting a ROS-mediated mechanism of attenuating anti-neoplastic drugs. In xenogeneic model, Quercetin led to a substantial reduction of therapeutic efficacy of Cisplatin along with enhancing the endogenous antioxidant enzyme expression and reducing ROS-induced damage in xenograft tumor tissue. CONCLUSION: Taken together, these data suggest that Quercetin at low concentrations

  19. Can the clinical course of cancer be influenced by non-antineoplastic drugs?

    OpenAIRE

    Brandes, L. J.; Friesen, L A

    1995-01-01

    Laboratory and anecdotal clinical evidence suggests that some common non-antineoplastic drugs may affect the course of cancer. The authors present two cases that appear to be consistent with such a possibility: that of a 63-year-old woman in whom a high-grade angiosarcoma of the forehead improved after discontinuation of lithium therapy and then progressed rapidly when treatment with carbamazepine was started, and that of a 74-year-old woman with metastatic adenocarcinoma of the colon that re...

  20. Inhibitions of Several Antineoplastic Drugs on Serum Sialic Acid Levels in Mice Bearing Tumors

    OpenAIRE

    Lu, Da-Yong; Xu, Jing; Lu, Ting-Ren; Wu, Hong-Ying; Xu, Bin

    2012-01-01

    Six murine tumors, including ascetic tumors HepA, EC, P388 leukemia, S180 and solid tumor S180, and Lewis lung carcinoma, were employed in this work. The free sialic acid concentrations in both blood and ascites were measured in tumor-bearing mice. The results showed that the content of sialic acids in blood was increased in tumor growth and certain tumor types. Higher sialic acid content was observed in ascites than that present in blood. The influence of antineoplastic agents (vincristine, ...

  1. The Effect of Antineoplastic Drugs in a Male Spontaneous Mammary Tumor Model

    OpenAIRE

    Shishido, Stephanie N.; Faulkner, Emma B.; Beck, Amanda; Thu A. Nguyen

    2013-01-01

    Male breast cancer is a rare disease. The limited number of clinical cases has led to the primary treatments for men being derived from female breast cancer studies. Here the transgenic strain FVB/N-Tg(MMTV-PyVT)634Mul/J (also known as PyVT) was used as a model system for measuring tumor burden and drug sensitivity of the antineoplastic drugs tamoxifen, cisplatin, and paclitaxel on tumorigenesis at an early stage of mammary carcinoma development in a male mouse model. Cisplatin treatment sign...

  2. Applying ligands profiling using multiple extended electron distribution based field templates and feature trees similarity searching in the discovery of new generation of urea-based antineoplastic kinase inhibitors.

    Directory of Open Access Journals (Sweden)

    Eman M Dokla

    Full Text Available This study provides a comprehensive computational procedure for the discovery of novel urea-based antineoplastic kinase inhibitors while focusing on diversification of both chemotype and selectivity pattern. It presents a systematic structural analysis of the different binding motifs of urea-based kinase inhibitors and the corresponding configurations of the kinase enzymes. The computational model depends on simultaneous application of two protocols. The first protocol applies multiple consecutive validated virtual screening filters including SMARTS, support vector-machine model (ROC = 0.98, Bayesian model (ROC = 0.86 and structure-based pharmacophore filters based on urea-based kinase inhibitors complexes retrieved from literature. This is followed by hits profiling against different extended electron distribution (XED based field templates representing different kinase targets. The second protocol enables cancericidal activity verification by using the algorithm of feature trees (Ftrees similarity searching against NCI database. Being a proof-of-concept study, this combined procedure was experimentally validated by its utilization in developing a novel series of urea-based derivatives of strong anticancer activity. This new series is based on 3-benzylbenzo[d]thiazol-2(3H-one scaffold which has interesting chemical feasibility and wide diversification capability. Antineoplastic activity of this series was assayed in vitro against NCI 60 tumor-cell lines showing very strong inhibition of GI(50 as low as 0.9 uM. Additionally, its mechanism was unleashed using KINEX™ protein kinase microarray-based small molecule inhibitor profiling platform and cell cycle analysis showing a peculiar selectivity pattern against Zap70, c-src, Mink1, csk and MeKK2 kinases. Interestingly, it showed activity on syk kinase confirming the recent studies finding of the high activity of diphenyl urea containing compounds against this kinase. Allover, the new series

  3. Antineoplastic and apoptotic potential of traditional medicines thymoquinone and diosgenin in squamous cell carcinoma.

    Directory of Open Access Journals (Sweden)

    Subhasis Das

    Full Text Available Thymoquinone (TQ and diosgenin (DG, the active ingredients obtained from black cumin (Nigella sativa and fenugreek (Trigonella foenum graecum, respectively, exert potent bioactivity, including anticancer effects. This study investigated the antineoplastic activity of these agents against squamous cell carcinoma in vitro and sarcoma 180-induced tumors in vivo. TQ and DG inhibited cell proliferation and induced cytotoxicity in A431 and Hep2 cells. These agents induced apoptosis by increasing the sub-G(1 population, LIVE/DEAD cytotoxicity, chromatin condensation, DNA laddering and TUNEL-positive cells significantly (P<0.05. Increased Bax/Bcl-2 ratio, activation of caspases and cleavage of poly ADP ribose polymerase were observed in treated cells. These drugs inhibited Akt and JNK phosphorylations, thus inhibiting cell proliferation while inducing apoptosis. In combination, TQ and DG had synergistic effects, resulting in cell viability as low as 10%. In a mouse xenograft model, a combination of TQ and DG significantly (P<0.05 reduced tumor volume, mass and increased apoptosis. TQ and DG, alone and in combination, inhibit cell proliferation and induce apoptosis in squamous cell carcinoma. The combination of TQ and DG is a potential antineoplastic therapy in this common skin cancer.

  4. Effect of implementing a cancer chemotherapy order form on prescribing habits for parenteral antineoplastics.

    Science.gov (United States)

    Pastel, D A; Fay, P; Lee, D

    1993-12-01

    Effect of implementing a cancer chemotherapy order form on prescribing habits for parenteral antineoplastics. The purpose of this study was to determine whether the use of a cancer chemotherapy order form improved prescriber inclusion of necessary prescription information to minimize errors for parenteral antineoplastics when compared to orders written on standard treatment-order forms. Standard treatment order forms and the newly developed chemotherapy order forms were examined for differences in completeness of the following 13 prescription components: diagnosis, height, weight, body surface area, start date and time, dosage (e.g., mg/m2), dose (mg), solution diluent (drips only) and volume (drips only), infusion rate (drips only), route (i.e., IV push or IV drip), frequency of administration, and total number of scheduled doses. The results demonstrate a significant improvement in completeness of necessary prescription information when cancer chemotherapy was ordered by physicians using a chemotherapy order form compared to a standard treatment order form. Importantly, the availability of various prescription components such as height, weight, and dosage may be used by the pharmacist to verify physicians' calculations of body surface area and dose and thereby reduce the chance of serious medication dosage errors. An additional benefit of the new form is a reduction in the time pharmacists spend clarifying orders.

  5. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... framework. We call this framework VIFF, short for Virtual Ideal Functionality Framework. VIFF implements a UC functionality for general multiparty computation on asynchronous networks. We give a formal definition of the functionality in Chapter 3. There we also describe how we implemented the functionality...... no information is released. The communication complexity of this protocol is the same as that of a passively secure solution up to a constant factor. It is secure against an adaptive and active adversary corrupting less than n=3 players. Following the presentation of VIFF, we turn to a more theoretical subject...

  6. Rational Protocols

    Science.gov (United States)

    Cachin, Christian

    Security research continues to provide a plethora of new protocols and mechanisms; these solutions patch either existing vulnerabilities found in practical systems or solve hypothetical security problems in the sense that the problem is often conceived at the same time when the first solution is proposed. Yet only a very small fraction of this research is relevant to ordinary users in the sense that they are willing to actually deploy the technology.

  7. Computerized cyclic voltammetric detection after HPLC of the antineoplastic agents etoposide, teniposide, adriamycin and its metabolite adriamycinol in urine samples

    OpenAIRE

    Ploegmakers, H. H. J. L.; Moritz, P. A.; Toll, P. J. M. M.; Oort, W.J. van

    1989-01-01

    A computerized electrochemical detection system for application after HPLC, provided with a cyclic voltammetric oxidative and reductive module, is described for the on-line qualitative determination of electroactive antineoplastic agents and metabolites in urine samples, collected from cancer patients, following intravenous administration. The application of two cyclic voltammetric detection modes provides an insight into both oxidative and reductive electrode reactions of compounds, passing ...

  8. Off-Label and Off-NCCN Guidelines Uses of Antineoplastic Drugs in China

    Directory of Open Access Journals (Sweden)

    Weilan Wang

    2013-05-01

    Full Text Available Background: To evaluate off-label and off-NCCN guidelines uses of antineoplastic drugs in a major Chinese hospital.Methods: Totally 1122 patients were selected from July to December 2011. Then, the off-label and off-NCCN guidelines uses of antineoplastic drugs were analyzed.Results: In 798 of 1122 patients (71.12%, drugs were used for off-label. In 317 of 1122 patients (28.25%, the drugs were prescribed for off-label and off-NCCN guidelines. 2591 medical orders for 1122 patients, 1051/2591 (40.56% medical orders were off-label; 445/2591(17.17% medical orders were off-label and off-NCCN guidelines. In 445 off-label and off-NCCN medical orders, 399 (89.66% were unapproved indications, 38 (8.54% were unapproved drug concentration and 12 (2.70% were unapproved route of administration. Percentage of off-label and off-NCCN guidelines drug uses in male was higher than that in female (21.92% vs. 11.39%, P<0.01. Compared with other lines of treatment, percentage of off-label and off-NCCN guidelines drug uses in postoperative adjuvant was the smallest (P<0.01 and percentage in three or multi-line treatments was the highest (P<0.01. The pancreatic cancer possessed the highest percentage (38.74% of off-label and off-NCCN guidelines drug uses among all types of cancer (P<0.01.Conclusion: Off-label uses of antineoplastic drugs are generally common in China hospitals based on NCCN guidelines. The fact suggests that anti-tumor treatment was relatively standard in China. Off-label and off-NCCN guidelines drug uses were mainly for individual treatment. Doctors should fully consider the adverse drug reaction, contraindication, cautions and increase the drug security monitoring. Uncorrected drug concentration should be avoided for drug risk

  9. Histology protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Tim D. Hewitson & Ian A. Darby (Eds Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 611, 2010 Pages: 230; € 83.15 ISBN: 978-1-60327-344-2 Impressive as it can sounds in the era that Biology see a clear dominance of reductionism with the idea that complexity can be disentagled more and more thanks to the use of molecular tools, the reader will remain fascinated by this slim and agile volume devoted to bring together what apparently are two separeted words: molecular biology and histology. Simply remembering to the youngest scientists.....

  10. Surface wipe sampling for antineoplastic (chemotherapy) and other hazardous drug residue in healthcare settings: Methodology and recommendations.

    Science.gov (United States)

    Connor, Thomas H; Zock, Matthew D; Snow, Amy H

    2016-09-01

    Surface wipe sampling for various hazardous agents has been employed in many occupational settings over the years for various reasons such as evaluation of potential dermal exposure and health risk, source determination, quality or cleanliness, compliance, and others. Wipe sampling for surface residue of antineoplastic and other hazardous drugs in healthcare settings is currently the method of choice to determine surface contamination of the workplace with these drugs. The purpose of this article is to review published studies of wipe sampling for antineoplastic and other hazardous drugs, to summarize the methods in use by various organizations and researchers, and to provide some basic guidance for conducting surface wipe sampling for these drugs in healthcare settings.  Recommendations on wipe sampling methodology from several government agencies and organizations were reviewed. Published reports on wipe sampling for hazardous drugs in numerous studies were also examined. The critical elements of a wipe sampling program and related limitations were reviewed and summarized.  Recommendations and guidance are presented concerning the purposes of wipe sampling for antineoplastic and other hazardous drugs in the healthcare setting, technical factors and variables, sampling strategy, materials required, and limitations. The reporting and interpretation of wipe sample results is also discussed.  It is recommended that all healthcare settings where antineoplastic and other hazardous drugs are handled consider wipe sampling as part of a comprehensive hazardous drug "safe handling" program. Although no standards exist for acceptable or allowable surface concentrations for these drugs in the healthcare setting, wipe sampling may be used as a method to characterize potential occupational dermal exposure risk and to evaluate the effectiveness of implemented controls and the overall safety program. A comprehensive safe-handling program for antineoplastic drugs may

  11. Peroxisome Proliferator-Activated Receptors (PPARs as Potential Inducers of Antineoplastic Effects in CNS Tumors

    Directory of Open Access Journals (Sweden)

    Lars Tatenhorst

    2008-01-01

    Full Text Available The peroxisome proliferator-activated receptors (PPARs are ligand-inducible transcription factors which belong to the superfamily of nuclear hormone receptors. In recent years it turned out that natural as well as synthetic PPAR agonists exhibit profound antineoplastic as well as redifferentiation effects in tumors of the central nervous system (CNS. The molecular understanding of the underlying mechanisms is still emerging, with partially controverse findings reported by a number of studies dealing with the influence of PPARs on treatment of tumor cells in vitro. Remarkably, studies examining the effects of these drugs in vivo are just beginning to emerge. However, the agonists of PPARs, in particular the thiazolidinediones, seem to be promising candidates for new approaches in human CNS tumor therapy.

  12. Integrative review of factors related to the nursing diagnosis nausea during antineoplastic chemotherapy 1

    Science.gov (United States)

    Moysés, Aline Maria Bonini; Durant, Lais Corsino; de Almeida, Ana Maria; Gozzo, Thais de Oliveira

    2016-01-01

    ABSTRACT Objective: to identify factors related to the nursing diagnosis nausea among cancer patients undergoing chemotherapy. Method: integrative review conducted in four electronic databases (PUBMED, EMBASE, CINAHL and LILACS) using the key words: neoplasia, antineoplastic agents and nausea. Results: only 30 out of 1,258 papers identified met the inclusion criteria. The most frequent related factors were: being younger than 50 years old, motion sickness, being a woman, emetogenic potential of the chemotherapy, anxiety, conditioned stimulus, and expecting nausea after treatment. Conclusion: this review's findings, coupled with the incidence of nausea among cancer patients undergoing chemotherapy, reveal an important difference between evidence found and that used by NANDA International, Inc. Even though it provides an appropriate definition of related factors, it does not mention chemotherapy, despite the various studies addressing the topic using different designs and presenting various objectives and outcomes. PMID:27737380

  13. Recent Advances on Pathophysiology, Diagnostic and Therapeutic Insights in Cardiac Dysfunction Induced by Antineoplastic Drugs

    Directory of Open Access Journals (Sweden)

    Marilisa Molinaro

    2015-01-01

    Full Text Available Along with the improvement of survival after cancer, cardiotoxicity due to antineoplastic treatments has emerged as a clinically relevant problem. Potential cardiovascular toxicities due to anticancer agents include QT prolongation and arrhythmias, myocardial ischemia and infarction, hypertension and/or thromboembolism, left ventricular (LV dysfunction, and heart failure (HF. The latter is variable in severity, may be reversible or irreversible, and can occur soon after or as a delayed consequence of anticancer treatments. In the last decade recent advances have emerged in clinical and pathophysiological aspects of LV dysfunction induced by the most widely used anticancer drugs. In particular, early, sensitive markers of cardiac dysfunction that can predict this form of cardiomyopathy before ejection fraction (EF is reduced are becoming increasingly important, along with novel therapeutic and cardioprotective strategies, in the attempt of protecting cardiooncologic patients from the development of congestive heart failure.

  14. Drug lag for antineoplastic and immunomodulating agent approvals in India compared with the US and EU approvals

    OpenAIRE

    Bhaven C. Kataria; Ashna S. Pandya; Ashwin K. Panchasara; Pavan J. Panchal; Mitul R. Parmar

    2016-01-01

    Background: There is a tremendous amount of research being conducted on development of new drugs for cancer therapies. The drug development of cancer therapies has dramatically increased over the past few decades. The present study was undertaken to assess the drug lag for new antineoplastic and immunomodulating agents in India compared with that in the United States (US) or European Union (EU). Methods: The new drugs approved in the US, EU and India between 2011 and 2015 were identified a...

  15. Oxidative Stress Induced in Nurses by Exposure to Preparation and Handling of Antineoplastic Drugs in Mexican Hospitals: A Multicentric Study

    OpenAIRE

    Leobardo Manuel Gómez-Oliván; Gerardo Daniel Miranda-Mendoza; Paula Anel Cabrera-Galeana; Marcela Galar-Martínez; Hariz Islas-Flores; Nely SanJuan-Reyes; Nadia Neri-Cruz; Sandra García-Medina

    2014-01-01

    The impact of involuntary exposure to antineoplastic drugs (AD) was studied in a group of nurses in diverse hospitals in Mexico. The results were compared with a group of unexposed nurses. Anthropometric characteristics and the biochemical analysis were analyzed in both groups. Also, lipid peroxidation level (LPX), protein carbonyl content (PCC), and activity of the antioxidant enzymes superoxide dismutase (SOD), catalase (CAT), and glutathione peroxidase (GPx) were evaluated in blood of stud...

  16. Multifactorial analysis of effects of interactions among antifungal and antineoplastic drugs on inhibition of Candida albicans growth.

    OpenAIRE

    Ghannoum, M. A.; Motawy, M S; Abu Hatab, M A; Ibrahim, A.S.; Criddle, R. S.

    1989-01-01

    Interactions among antineoplastic and antifungal drugs affecting the inhibition of Candida albicans growth are complex functions of the nature of the drugs used in combination, their absolute concentrations, and also their relative concentrations. Studies of drug interactions involving the use of test drugs in fixed concentration ratios can lead to inaccurate conclusions about synergism or antagonism among the drugs. A multifactorial experimental design procedure in which the concentrations o...

  17. Identification of Knowledge Gaps Regarding Healthcare Workers' Exposure to Antineoplastic Drugs: Review of Literature, North America versus Europe

    OpenAIRE

    Hon, Chun-Yip; Barzan, Cris; Astrakianakis, George

    2014-01-01

    We have been examining the issue of healthcare workers' exposure to antineoplastic drugs for nearly a decade and have observed that there appears to be more publications on the subject matter originating from Europe than from North America. The concern is that findings from Europe may not be generalizable to North America because of differences in handling practices, regulatory requirements, and training. Our objective was to perform a literature review to confirm our observation and, in turn...

  18. Inhibition of basal and TGF beta-induced fibroblast collagen synthesis by antineoplastic agents. Implications for wound healing.

    OpenAIRE

    Hendricks, T.; Martens, M F; Huyben, C M; Wobbes, T.

    1993-01-01

    Antineoplastic drugs, given in the perioperative period, are thought to be a hazard to wound repair. Since fibroblast collagen synthesis is crucial to healing, we examined the effects of bleomycin, cisplatin and 5-fluorouracil on collagen synthesis in confluent cultures of fibroblasts from human colon and skin. The drugs were added in final concentrations between 0.1 and 50 microM. Bleomycin did not affect collagen synthesis in colon fibroblasts but inhibited synthesis in skin fibroblasts. Co...

  19. High mobility group A1 protein expression reduces the sensitivity of colon and thyroid cancer cells to antineoplastic drugs

    OpenAIRE

    D’Angelo, Daniela; Mussnich, Paula; De Rosa, Roberta; Bianco, Roberto; Tortora, Giampaolo; Fusco, Alfredo

    2014-01-01

    Background Development of resistance to conventional drugs and novel biological agents often impair long-term chemotherapy. HMGA gene overexpression is often associated with antineoplastic drug resistance and reduced survival. Inhibition of HMGA expression in thyroid cancer cells reduces levels of ATM protein, the main cellular sensor of DNA damage, and enhances cellular sensitivity to DNA-damaging agents. HMGA1 overexpression promotes chemoresistance to gemcitabine in pancreatic adenocarcino...

  20. Occupational exposure to antineoplastic agents induces a high level of chromosome damage. Lack of an effect of GST polymorphisms

    International Nuclear Information System (INIS)

    The aim of our study was to investigate whether occupational exposure to antineoplastic drugs (AND) resulted in genetic damage, possibly indicative of adverse health effects in the long term. We performed a chromosomal aberrations (CA) analysis in peripheral blood lymphocytes (PBL) of a group of 76 trained nurses occupationally exposed to AND. Furthermore, we analysed whether genetic polymorphisms in four metabolic genes of the glutathione S-transferase (GST) family involved in antineoplastic drugs detoxification (GSTM1, GSTT1, GSTP1, GSTA1) had any effect on the yield of chromosomal aberrations in nurses exposed to antineoplastic agents. The exposed group showed a very significant increase of genetic damage (p < 0.0001) potentially indicative of an increased risk of cancer. Unexpectedly, besides the elevated level of chromatid-type aberrations usually related to exposure to chemical agents, we found also severe chromosome damages such as chromosome deletions and dicentric chromosomes, usually related to radiation exposure. No significant association was detected between all GSTs genotypes and chromosome damage. In conclusion, our data show how the occupational exposure to AND is associated to a potential cancer risk, suggesting that current prevention methods do not completely eliminate opportunities for exposure and supporting the need to improve the actual safety practices

  1. Antineoplastic effects of the DNA methylation inhibitor hydralazine and the histone deacetylase inhibitor valproic acid in cancer cell lines

    Directory of Open Access Journals (Sweden)

    Candelaria Myrna

    2006-01-01

    Full Text Available Abstract Background Among the epigenetic alterations occurring in cancer, DNA hypermethylation and histone hypoacetylation are the focus of intense research because their pharmacological inhibition has shown to produce antineoplastic activity in a variety of experimental models. The objective of this study was to evaluate the combined antineoplastic effect of the DNA methylation inhibitor hydralazine and the histone deacetylase inhibitor valproic acid in a panel of cancer cell lines. Results Hydralazine showed no growth inhibitory effect on cervical, colon, breast, sarcoma, glioma, and head & neck cancer cell lines when used alone. On the contrary, valproic acid showed a strong growth inhibitory effect that is potentiated by hydralazine in some cell lines. Individually, hydralazine and valproic acid displayed distinctive effects upon global gene over-expression but the number of genes over-expressed increased when cells were treated with the combination. Treatment of HeLa cells with hydralazine and valproic acid lead to an increase in the cytotoxicity of gemcitabine, cisplatin and adriamycin. A higher antitumor effect of adriamycin was observed in mice xenografted with human fibrosarcoma cells when the animals were co-treated with hydralazine and valproic acid. Conclusion Hydralazine and valproic acid, two widely used drugs for cardiovascular and neurological conditions respectively have promising antineoplastic effects when used concurrently and may increase the antitumor efficacy of current cytotoxic agents.

  2. A Comparative Reverse Docking Strategy to Identify Potential Antineoplastic Targets of Tea Functional Components and Binding Mode

    Directory of Open Access Journals (Sweden)

    Rong Zheng

    2011-08-01

    Full Text Available The main functional components of green tea, such as epigallocatechin gallate (EGCG, epigallocatechin (EGC, epicatechin gallate (ECG and epicatechin (EC, are found to have a broad antineoplastic activity. The discovery of their targets plays an important role in revealing the antineoplastic mechanism. Therefore, to identify potential target proteins for tea polyphenols, we have taken a comparative virtual screening approach using two reverse docking systems, one based on Autodock software and the other on Tarfisdock. Two separate in silico workflows were implemented to derive a set of target proteins related to human diseases and ranked by the binding energy score. Several conventional clinically important proteins with anti-tumor effects are screened out from the PDTD protein database as the potential receptors by both procedures. To further analyze the validity of docking results, we study the binding mode of EGCG and the potential target protein Leukotriene A4 hydrolase in detail. We indicate that interactions mediated by electrostatic and hydrogen bond play a key role in ligand binding. EGCG binds to the enzyme with certain orientation and conformation that is suitable for nucleophilic attacks by several electrical residues inside the enzyme’s activity cavity. This study provides useful information for studying the antitumor mechanism of tea’s functional components. The comparative reverse docking strategy presented generates a tractable set of antineoplastic proteins for future experimental validation as drug targets against tumors.

  3. Cancer cell spheroids as a model to evaluate chemotherapy protocols.

    Science.gov (United States)

    Perche, Federico; Torchilin, Vladimir P

    2012-10-01

    To determine whether the spheroid culture can be used to evaluate drug efficacy, we have evaluated the toxicity of free or carrier-associated doxorubicin as a single drug or in combination with other antineoplastic agents using the spheroid cultures of drug-resistant cancer cells. Paclitaxel, cisplatin, dexamethasone, mitoxantrone, sclareol or methotrexate were used in combination with doxorubicin. The effect of the treatment protocols on free, micellar and liposomal doxorubicin accumulation in spheroids and on resulting toxicity was evaluated by fluorescence and lactate dehydrogenase release, respectively. Enhanced doxorubicin accumulation and toxicity were observed after spheroid pretreatment with mitoxantrone or paclitaxel. Effects of the drug combination with doxorubicin were sequence dependent, use of doxorubicin as the first drug being the least inducer of toxicity. Finally, spheroids were recognized by a cancer cell-specific antibody. Our results suggest the usefulness of spheroids to evaluate chemotherapy combinations. PMID:22892843

  4. The effect of antineoplastic drugs in a male spontaneous mammary tumor model.

    Directory of Open Access Journals (Sweden)

    Stephanie N Shishido

    Full Text Available Male breast cancer is a rare disease. The limited number of clinical cases has led to the primary treatments for men being derived from female breast cancer studies. Here the transgenic strain FVB/N-Tg(MMTV-PyVT634Mul/J (also known as PyVT was used as a model system for measuring tumor burden and drug sensitivity of the antineoplastic drugs tamoxifen, cisplatin, and paclitaxel on tumorigenesis at an early stage of mammary carcinoma development in a male mouse model. Cisplatin treatment significantly reduced tumor volume, while paclitaxel and tamoxifen did not attenuate tumor growth. Cisplatin treatment was shown to induce apoptosis, grossly observed by reduced tumor formation, through reduced Bcl-2 and survivin protein expression levels with an increase in caspase 3 expression compared to control tumors. Tamoxifen treatment significantly altered the hormone receptor expression levels of the tumor, while additionally upregulating Bcl-2 and Cyclin D1. This suggests an importance in hormonal signaling in male breast cancer pathogenesis. The results of this study provide valuable information toward the better understanding of male breast cancer and may help guide treatment decisions.

  5. A preliminary analysis of antineoplastic activity of parvovirus MVMp NS—1 proteins

    Institute of Scientific and Technical Information of China (English)

    SHENXIZHONG; HSIAOCHIENTSUNG; 等

    1997-01-01

    Human gastric cancer MKN-45 cells were transfected with pULB 3238,a plasmid carrying MVMp MS-1 gene with its original P4 promoter replaced by the glucocorticoid inducible promoter MMTV-LTR.After the integration and expression of NS-1 gene,some of the transfectants died,while others remained alive,but the growth features of survived cells were changed.For further study on the antineoplastic function of parvoviral NS-1 protein in vivo,transgenic mice carrying NS-1 genes were established by conventional method.Among 4 founders,one of them was found to be able to transmit the transgene to around 50% of their offsprings.RT-PCR was performed to indicate the expression of NS-1 gene in transgenic mice and its mRNA appeared in a variety of tissues.The expression of integrated NS-1 gene may correlate with the decreased incidence of tumor induced in vivo by chemical carcinogens.

  6. Antineoplastic effects of Rhodiola crenulata treatment on B16-F10 melanoma.

    Science.gov (United States)

    Dudek, Maxine C; Wong, Kaitlyn E; Bassa, Lotfi M; Mora, Maria Carmen; Ser-Dolansky, Jennifer; Henneberry, Jean M; Crisi, Giovanna M; Arenas, Richard B; Schneider, Sallie S

    2015-12-01

    Melanoma is an aggressive form of skin cancer with limited treatment options for advanced stage disease. Early detection and wide surgical excision remain the initial mode of treatment for primary tumors thus preventing metastases and leading to improved prognosis. Through this work, we have evaluated the antineoplastic effects of Rhodiola crenulata (R. crenulata) root extracts on the B16-F10 melanoma cell line, both in vitro and in vivo. We observed that R. crenulata treatment resulted in increased cell death as well as a reduction in tumor cell proliferation and migration in vitro. Additionally, we observed that R. crenulata decreased the expression of integrin β1 and vimentin and increased the expression of E-cadherin. Further, in mice treated with a topical R. crenulata-based cream therapy, tumors were more likely to have a radial growth pattern, a reduction in mitotic activity, and an increase in tumor necrosis. We also observed that mice drinking water supplemented with R. crenulata displayed a reduction of metastatic foci in disseminated models of melanoma. Collectively, these findings suggest that R. crenulata exhibits striking antitumorigenic and antimetastatic properties and that this extract may harbor potential novel adjuvant therapy for the treatment of melanoma. PMID:26159852

  7. Characterizing interspecies uncertainty using data from studies of anti-neoplastic agents in animals and humans

    International Nuclear Information System (INIS)

    For most chemicals, the Reference Dose (RfD) is based on data from animal testing. The uncertainty introduced by the use of animal models has been termed interspecies uncertainty. The magnitude of the differences between the toxicity of a chemical in humans and test animals and its uncertainty can be investigated by evaluating the inter-chemical variation in the ratios of the doses associated with similar toxicological endpoints in test animals and humans. This study performs such an evaluation on a data set of 64 anti-neoplastic drugs. The data set provides matched responses in humans and four species of test animals: mice, rats, monkeys, and dogs. While the data have a number of limitations, the data show that when the drugs are evaluated on a body weight basis: 1) toxicity generally increases with a species' body weight; however, humans are not always more sensitive than test animals; 2) the animal to human dose ratios were less than 10 for most, but not all, drugs; 3) the current practice of using data from multiple species when setting RfDs lowers the probability of having a large value for the ratio. These findings provide insight into inter-chemical variation in animal to human extrapolations and suggest the need for additional collection and analysis of matched toxicity data in humans and test animals

  8. Relevance of the OCT1 transporter to the antineoplastic effect of biguanides

    Energy Technology Data Exchange (ETDEWEB)

    Segal, Eric D.; Yasmeen, Amber; Beauchamp, Marie-Claude; Rosenblatt, Joshua [Division of Gynecologic Oncology, Jewish General Hospital, McGill University, Montreal, Quebec (Canada); Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Pollak, Michael [Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Department of Oncology, McGill University, Montreal, Quebec (Canada); Gotlieb, Walter H., E-mail: walter.gotlieb@mcgill.ca [Division of Gynecologic Oncology, Jewish General Hospital, McGill University, Montreal, Quebec (Canada); Segal Cancer Center, Lady Davis Institute of Medical Research, McGill University, Montreal, Quebec (Canada); Department of Oncology, McGill University, Montreal, Quebec (Canada)

    2011-11-04

    Highlights: Black-Right-Pointing-Pointer siRNA knockdown of OCT1 reduced sensitivity of EOC cells to metformin, but not to another biguanide, phenformin. Black-Right-Pointing-Pointer Suppression of OCT1 also affects the activation of AMP kinase in response to metformin, but not to phenformin. Black-Right-Pointing-Pointer Direct actions of metformin may be limited by low OCT1 expression in EOC tumors. Black-Right-Pointing-Pointer Phenformin could be used as an alternative biguanide. -- Abstract: Epidemiologic and laboratory data suggesting that metformin has antineoplastic activity have led to ongoing clinical trials. However, pharmacokinetic issues that may influence metformin activity have not been studied in detail. The organic cation transporter 1 (OCT1) is known to play an important role in cellular uptake of metformin in the liver. We show that siRNA knockdown of OCT1 reduced sensitivity of epithelial ovarian cancer cells to metformin, but interestingly not to another biguanide, phenformin, with respect to both activation of AMP kinase and inhibition of proliferation. We observed that there is heterogeneity between primary human tumors with respect to OCT1 expression. These results suggest that there may be settings where drug uptake limits direct action of metformin on neoplastic cells, raising the possibility that metformin may not be the optimal biguanide for clinical investigation.

  9. Reversible posterior leukoencephalopathy syndrome and anti-neoplastic agents: a review

    Directory of Open Access Journals (Sweden)

    Farheen M. Shah-Khan

    2011-12-01

    Full Text Available Reversible Posterior Leukoencephalopathy Syndrome (RPLS is a well recognized entity with a variety of benign and malignant conditions. Recently it has been found to be associated with the use of anti-neoplastic agents including targeted therapies. RPLS occurs rapidly with the use of some drugs and more slowly with others. Combined therapies are associated with a more frequent and more rapid presentation. This review was based on a literature search for English Language articles concerning RPLS and chemotherapeutic agents published from June 1996 to March 2007. We used the PubMed database with keywords: “RPLS”, “Posterior reversible encephalopathy syndrome”, “(PRES”, “Chemotherapy” and “MRI”. This syndrome has classical Clinical-Radiologic features that are easy to recognize. Early recognition and withdrawal of the offending agent is all that is needed in most cases. This review highlights the features of the syndrome. It draws our attention to an entity which is being more frequently recognized and whose exact pathologic mechanisms need to be further studied. This syndrome is associated with the use of neurotoxic as well as non-neurotoxic agents and usually runs a benign course if there is an early diagnosis and management.

  10. Amido analogs of mitoxantrone: physico-chemical properties, molecular modeling, cellular effects and antineoplastic potential.

    Science.gov (United States)

    Zagotto, G; Moro, S; Uriarte, E; Ferrazzi, E; Palù, G; Palumbo, M

    1997-03-01

    To assess the effects of amido substitution in the side-chains of the anticancer drug mitoxantrone (MX) two analogs were synthesized, having hydroxyethylaminoacetyl- and hydroxyethylaminopropionyl- substituents at the nitrogens located at positions 1, 4 of the anthracenedione ring system. The novel derivatives exhibit DNA-affinity and redox properties similar to the parent drug. However, unlike MX, they are not able to stimulate DNA cleavage, as shown by alkaline elution experiments. Molecular modeling studies using ab initio quantum mechanical methods show that, while the stereochemistry of the drug molecule is not appreciably affected when an amide group replaces the aromatic amino function, the reverse is true for the electrostatic properties. Indeed, overlapping of electron density of MX with its analogs is very poor. Moreover, a reversal in the direction of MX dipole moment occurs in the amido congeners. This may explain the lack of recognition of the cleavable topoisomerase II-DNA complex and loss of cleavage stimulation. However, the new derivatives exhibit pharmacological activity comparable to that found for MX, as they are remarkably cytotoxic and are active in vivo against P388 murine leukemia. Hence, amido substitution may lead to a different mechanism of cytotoxicity, not related to classical protein or free radical-mediated DNA damage, which points to a novel type of antineoplastic pharmacophore. PMID:9113065

  11. Mobile internet protocol analysis

    OpenAIRE

    Brachfeld, Lawrence J.

    1999-01-01

    Mobile Internet Protocol (IP) is a proposed standard that builds on the current Internet Protocol by making the fact that a user is mobile transparent to applications and higher level protocols such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet while maintaining any current conne...

  12. Coded Splitting Tree Protocols

    DEFF Research Database (Denmark)

    Sørensen, Jesper Hemming; Stefanovic, Cedomir; Popovski, Petar

    2013-01-01

    This paper presents a novel approach to multiple access control called coded splitting tree protocol. The approach builds on the known tree splitting protocols, code structure and successive interference cancellation (SIC). Several instances of the tree splitting protocol are initiated, each...... as possible. Evaluations show that the proposed protocol provides considerable gains over the standard tree splitting protocol applying SIC. The improvement comes at the expense of an increased feedback and receiver complexity....

  13. The husk fiber of Cocos nucifera L. (Palmae is a source of anti-neoplastic activity

    Directory of Open Access Journals (Sweden)

    P.R. Koschek

    2007-10-01

    Full Text Available In the present study, we investigated the in vitro anti-tumoral activities of fractions from aqueous extracts of the husk fiber of the typical A and common varieties of Cocos nucifera (Palmae. Cytotoxicity against leukemia cells was determined by the 3-[4,5-dimethylthiazol-2-yl]-2,5-diphenyltetrazolium bromide (MTT assay. Cells (2 x 104/well were incubated with 0, 5, 50 or 500 µg/mL high- or low-molecular weight fractions for 48 h, treated with MTT and absorbance was measured with an ELISA reader. The results showed that both varieties have almost similar antitumoral activity against the leukemia cell line K562 (60.1 ± 8.5 and 47.5 ± 11.9% for the typical A and common varieties, respectively. Separation of the crude extracts with Amicon membranes yielded fractions with molecular weights ranging in size from 1-3 kDa (fraction A to 3-10 kDa (fraction B and to more than 10 kDa (fraction C. Cells were treated with 500 µg/mL of these fractions and cytotoxicity was evaluated by MTT. Fractions ranging in molecular weight from 1-10 kDa had higher cytotoxicity. Interestingly, C. nucifera extracts were also active against Lucena 1, a multidrug-resistant leukemia cell line. Their cytotoxicity against this cell line was about 50% (51.9 ± 3.2 and 56.3 ± 2.9 for varieties typical A and common, respectively. Since the common C. nucifera variety is extensively cultured in Brazil and the husk fiber is its industrial by-product, the results obtained in the present study suggest that it might be a very inexpensive source of new antineoplastic and anti-multidrug resistant drugs that warrants further investigation.

  14. Chemomodulation of human dendritic cell function by antineoplastic agents in low noncytotoxic concentrations

    Directory of Open Access Journals (Sweden)

    Tourkova Irina L

    2009-07-01

    Full Text Available Abstract The dose-delivery schedule of conventional chemotherapy, which determines its efficacy and toxicity, is based on the maximum tolerated dose. This strategy has lead to cure and disease control in a significant number of patients but is associated with significant short-term and long-term toxicity. Recent data demonstrate that moderately low-dose chemotherapy may be efficiently combined with immunotherapy, particularly with dendritic cell (DC vaccines, to improve the overall therapeutic efficacy. However, the direct effects of low and ultra-low concentrations on DCs are still unknown. Here we characterized the effects of low noncytotoxic concentrations of different classes of chemotherapeutic agents on human DCs in vitro. DCs treated with antimicrotubule agents vincristine, vinblastine, and paclitaxel or with antimetabolites 5-aza-2-deoxycytidine and methotrexate, showed increased expression of CD83 and CD40 molecules. Expression of CD80 on DCs was also stimulated by vinblastine, paclitaxel, azacytidine, methotrexate, and mitomycin C used in low nontoxic concentrations. Furthermore, 5-aza-2-deoxycytidine, methotrexate, and mitomycin C increased the ability of human DCs to stimulate proliferation of allogeneic T lymphocytes. Thus, our data demonstrate for the first time that in low noncytotoxic concentrations chemotherapeutic agents do not induce apoptosis of DCs, but directly enhance DC maturation and function. This suggests that modulation of human DCs by noncytotoxic concentrations of antineoplastic drugs, i.e. chemomodulation, might represent a novel approach for up-regulation of functional activity of resident DCs in the tumor microenvironment or improving the efficacy of DCs prepared ex vivo for subsequent vaccinations.

  15. An evaluation of the anti-neoplastic activity of curcumin in prostate cancer cell lines

    Directory of Open Access Journals (Sweden)

    Camila B. Piantino

    2009-06-01

    Full Text Available OBJECTIVE: The aim of our study is to investigate the anti-neoplastic effect of curcumin in prostate cancer cell lines. Specifically, we are using the LNCaP cell line and another prostate cell line developed in our laboratory, PcBra1. The PcBra1 cells were derived from a localized, obstructive prostate cancer with a Gleason score of 9 (4+5. MATERIAL AND METHODS: A prostate cancer cell line was isolated from a localized, obstructive prostate cancer with a Gleason score of 9 (4+5, and it was characterized using immunohistochemistry. After six passages, the new cell line was treated with varying doses of curcumin: 10 µM, 25 µM or 50 µM. Apoptosis was detected by flow cytometry using Annexin V FITC. For comparison, the same experiment was performed using the well-established metastatic prostate cancer cell line, LNCaP. RESULTS: Increasing concentrations of curcumin promoted more apoptosis in the PcBra1 cells. Exposure to 10 and 25 µM curcumin induced apoptosis in 31.9% and 52.2% of cells, respectively. Late apoptosis was induced in 37% of cells after treatment with 10 µM curcumin and 35% of cells with a 25 µM treatment. Necrosis accounted for less than 10% of the death in these cells at those two concentrations. When curcumin was used at 50 µM, apoptosis was observed in 64.3% of the cells. Including late apoptosis and necrosis, 98.6% of the cells died in response to 50 µM curcumin. Results with the LNCaP cells were similar although late apoptosis was the main phenomenon at 25 µM. CONCLUSION: We have shown that curcumin acts on localized prostate cancer to induce apoptosis and may therefore be an option as a future therapeutic agent.

  16. Somatostatin Enhances the Antineoplastic Effects of Tamoxifen on Breast Carcinoma in Vitro

    Institute of Scientific and Technical Information of China (English)

    ZENGXizhi; YAOZhenxiang

    2002-01-01

    Objective:To study the antineoplastic effects of tamoxifen(TAM) in combination with a somatostain analogue(octreotide,OCT) on breast cancer.Methods:Estrogen receptor(ER)-positive(MCF-7) and ER-negative(MDA-MB-435S)human breast carcinoma cell lines were treated with TAM or OCT,or combination of both agents in vitro.Cell proliferation was evaluated by MTT assay,distribu-tion of cell cycle and rate of apoptosis were detemined by flow cytometry.Results:The inhibitory effect of OCT or TAM on proliferation of MCF-7 cells was associated with cell arrest in G0/G1 phase and induction of apoptosis.The inhibitory effect on proliferation of MCF-7 cells enhanced when treatment of TAM combined with OCT.The increased rate of apoptosis induced by combination of TAM and OCT was much higher than use of either TAM or OCT alone.TAM or OCT also had weak inhibitory effect on MDA-MB435S cell.The cells were arrested at S phase by TAM and at G0/G1 phase by OCT, but the induction of apoptosis was not identified.However,the rate of apoptosis was 22.7% if combined treatment of TAM and OCT applied.Conclusion:TAM and OCT can synergistically inhibit proliferation and induce apoptosis of ER-positive and ER-negative breast cancer cells.The synergism of TAM and OCT may be of interest in the clinical treatment of breast carcinoma.

  17. Antineoplastic effects of octreotide on human gallbladder cancer cells in vitro

    Institute of Scientific and Technical Information of China (English)

    Jing-Hua Wang; Quan-Tai Xing; Meng-Biao Yuan

    2004-01-01

    AIM: To investigate whether octreotide can inhibit the growth of human gallbladder cancer cells in vitro and to elucidate the antineoplastic mechanism of octreotide in gallbladder cancer.METHODS: A human gallbladder cancer cell line, GBC-SD,was cultured in vitro. The antiproliferative effects of octreotide were examined by means of an MTT assay and a colony forming ability assay. Morphological variation was investigated under scanning electron microscopy and transmission electron microscopy. Cell cycle analysis and apoptosis rate was evaluated by flow cytometry (FCM) after staining by propidium iodide. DNA fragmentation was assayed by agarose gel electrophoresis. Tmmunohistochemical staining was performed to evaluate the expressions of mutant-type p53 and bcl-2.RESULTS: The growth curve and colony forming ability assay showed significant inhibition of octreotide to the proliferation of GBC-SD cells in culture in a time- and dosedependent manner. After exposure to octreotide, GBC-SD cells showed typically apoptotic characteristics, including morphological changes of chromatin condensation, vacuolar degeneration, nucleus fragmentation and apoptotic body formation. In FCM profile apoptotic cells showed increased sub-G1 peaks in the octreotide group, significantly higher than the control group (P=0.013). There was also an augmentation in the cell proportion of G0/G1 phase (P=0.015), while the proportion of S phase and G2/M phase remained unchanged (P=0.057 and P=0.280, respectively).DNA agarose gel electrophoresis displayed a ladder after exposure to 1 000 nmol/L octreotide. After being treated with octreotide, the expressions of both mutant-type p53 and bcl-2 decreased considering the percentage of positive cells (P<0.05).CONCLUSION: Octreotide has a negative action to the proliferation of GBC-SD cells, and the mechanism may be related to cytostatic and cytotoxic effects. The reduction of mutant-type p53 and bcl-2 expressions may be associated with the apoptosis

  18. Radiobiological studies on the importance of tumor oxygenation for anti-neoplastic therapy

    International Nuclear Information System (INIS)

    The aim of the twelve studies included in the present thesis was to determine the importance of hypoxia for various anti-neoplastic treatment modalities, and to evaluate possible ways of overcoming the hypoxia problem by combined modality therapy. The murine tumor systems were the C3H mammary carcinoma with 5-12% hypoxic cells, and the SCCVII squamous cell carcinoma with 2% hypoxic cells. The radiation response was significantly improved by the use of hypoxic cell radiosensitizers such as nimorazole or misonidazole, or by allowing the mice to breathe oxygen or carbogen during irradiation. In contrast, the radiation response was significantly impaired by carbon monoxide breathing at a level comparable to what has been observed in heavy smokers. The clamped TCD50 assay was used to classify cancer chemotherapeutic drugs according to their preferential cytotoxicity towards the different tumor subpopulations. Methotrexate had no effect on hypoxic cells and was only borderline toxic towards aerobic cells. Three drugs had significant effect against oxic cells only (5-fluorouracil, bleomycin and cisplatin). Similarly, three drugs were toxic towards hypoxic cells only (etoposide, carmustine, and mitomycin c). Three drugs were effective towards both cell types (vincristine, adriamycin, cyclophosphamide). Hypoxic cells in areas with insufficient blood supply, poor nutrition and increased acidity is known to be highly sensitive to hyperthermia. In a study where cisplatin, heat and x-rays were given together, the local tumor control was not improved when compared to radiation + heat, apparently due to a lack of enhancement in the killing of hypoxic cells. These studies have demonstrated the influence of tumor oxygenation on tumor response to treatment with drugs, hyperthermia and irradiation. New strategies targeted also against perfusion-limited hypoxia is needed. One of the most important conclusions from the present thesis can be implemented without expensive trials or

  19. Synthesis and in vitro antineoplastic evaluation of silver nanoparticles mediated by Agrimoniae herba extract

    Directory of Open Access Journals (Sweden)

    Qu D

    2014-04-01

    Full Text Available Ding Qu,1,* Wenjie Sun,1,2,* Yan Chen,1,2 Jing Zhou,1 Congyan Liu11Key Laboratory of New Drug Delivery System of Chinese Materia Medica, Jiangsu Provincial Academy of Chinese Medicine, 2Department of Pharmaceutics, School of Pharmacy, Nanjing University of Chinese Medicine, Nanjing, People's Republic of China*These authors contributed equally to this workAbstract: A rapid synthesis of silver nanoparticles (AgNPs using Agrimoniae herba extract as reducing agent and stabilizer (A. herba-conjugated AgNPs [AH-AgNPs] were designed, characterized, and evaluated for antitumor therapy feasibility. In this study, critical factors in the preparation of silver nanoparticles, including extraction time, reaction temperature, the concentration of AgNO3, and A. herba extract amount, were investigated using ultraviolet-visible spectroscopy. AH-AgNPs with well-defined spherical shape, homogeneous distributional small size (30.34 nm, narrow polydispersity index (0.142, and high negative zeta potential (−36.8 mV were observed by transmission electron microscopy and dynamic light scattering. Furthermore, the results of X-ray diffraction and Fourier-transform infrared spectroscopy further indicated successful preparation of AH-AgNPs. Acceptable long-term storage stability of AH-AgNPs was also confirmed. More importantly, AH-AgNPs displayed significantly higher antiproliferative effect against a human lung carcinoma cell line (A549 cells compared with A. herba extract and bare AgNPs prepared by sodium citrate. The half-maximal inhibitory concentrations of AH-AgNPs, bare AgNPs, and A. herba extract were 38.13 µg · mL-1, 184.87 µg · mL-1, and 1.147 × 104 µg · mL-1, respectively. It is suggested that AH-AgNPs exhibit a strong antineoplastic effect on A549 cells, pointing to feasibility of antitumor treatment in the future.Keywords: rapid synthesis, Agrimoniae herba extract, silver nanoparticles, A549 cells, antitumor

  20. Research on Protocol Migration

    Institute of Scientific and Technical Information of China (English)

    汪芸; 顾冠群; 等

    1996-01-01

    This paper elaborates the concept and model of protocol migration in network interconnection.Migration strategies and principles are discussed and several cases are studied in detail which show the basic procedure and techniques used in protocol migration.

  1. Protocol Implementation Generator

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.

    2010-01-01

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and all...

  2. Adaptation of TURN protocol to SIP protocol

    CERN Document Server

    Guezouri, Mustapha; Keche, Mokhtar

    2010-01-01

    Today, SIP is a protocol par Excellence in the field of communication over Internet. But, the fact that it belongs to the application layer constitutes a weakness vis-a-vis the NAT traversal. This weakness is due to the way in which the server replies to the requests of clients on the one hand. On the other, it is caused by the dynamic allocation of UDP ports for emission and reception of packets RTP/RTCP. The TURN Protocol may face this weakness. However, its use requires a certain number of exchanges between the clients and a TURN server before establishing the multimedia sessions and this increase the latent time. In this article, we propose to adapt TURN protocol for applications based on SIP protocol such as telephony over Internet, conference video, etc. This adaptation optimises the establishment of multimedia sessions by integrating a manager of TCP connections and multimedia flow controller into SIP Proxy server.

  3. Blind Collective Signature Protocol

    Directory of Open Access Journals (Sweden)

    Nikolay A. Moldovyan

    2011-06-01

    Full Text Available Using the digital signature (DS scheme specified by Belarusian DS standard there are designed the collective and blind collective DS protocols. Signature formation is performed simultaneously by all of the assigned signers, therefore the proposed protocols can be used also as protocols for simultaneous signing a contract. The proposed blind collective DS protocol represents a particular implementation of the blind multisignature schemes that is a novel type of the signature schemes. The proposed protocols are the first implementations of the multisignature schemes based on Belarusian signature standard.

  4. Postulating a dermal pathway for exposure to anti-neoplastic drugs among hospital workers. Applying a conceptual model to the results of three workplace surveys

    NARCIS (Netherlands)

    Kromhout, H.; Hoek, F.; Uitterhoeve, R.; Huijbers, R.; Overmars, R.F.; Anzion, R.; Vermeulen, R.

    2000-01-01

    Dermal exposure to anti-neoplastic drugs has been suggested as a potentially important route of exposure of hospital workers. Three small-scale workplace surveys were carried out in several hospitals focusing on contamination by leakage from IV infusion systems; contamination by spilled urine of pat

  5. The Hepatoprotection Provided by Taurine and Glycine against Antineoplastic Drugs Induced Liver Injury in an Ex Vivo Model of Normothermic Recirculating Isolated Perfused Rat Liver

    Directory of Open Access Journals (Sweden)

    Reza Heidari

    2016-03-01

    Full Text Available Taurine (2-aminoethane sulfonic acid is a non-protein amino acid found in high concentration in different tissues. Glycine (Amino acetic acid is the simplest amino acid incorporated in the structure of proteins. Several investigations indicate the hepatoprotective properties of these amino acids. On the other hand, antineoplastic agents-induced serum transaminase elevation and liver injury is a clinical complication. The current investigation was designed to screen the possible hepatoprotective properties of taurine and glycine against antineoplastic drugs-induced hepatic injury in an ex vivo model of isolated perfused rat liver. Rat liver was perfused with different concentration (10 μM, 100 μM and 1000 μM of antineoplastic drugs (Mitoxantrone, Cyclophosphamide, Cisplatin, 5 Fluorouracil, Doxorubicin and Dacarbazine via portal vein. Taurine and glycine were administered to drug-treated livers and liver perfusate samples were collected for biochemical measurements (ALT, LDH, AST, and K+. Markers of oxidative stress (reactive oxygen species formation, lipid peroxidation, total antioxidant capacity and glutathione were also assessed in liver tissue. Antineoplastic drugs caused significant pathological changes in perfusate biochemistry. Furthermore, markers of oxidative stress were significantly elevated in drug treated livers. It was found that taurine (5 and 10 mM and glycine (5 and 10 mM administration significantly mitigated the biomarkers of liver injury and attenuated drug induced oxidative stress. Our data indicate that taurine and glycine supplementation might help as potential therapeutic options to encounter anticancer drugs-induced liver injury.

  6. Simultaneous detection of three antineoplastic drugs on gloves by liquid chromatography with diode array detector

    Directory of Open Access Journals (Sweden)

    Adélia Maria Pimenta de Pádua Alcântara

    2010-12-01

    Full Text Available The aim of this study was to develop a method for simultaneous detection of antineoplastic drugs on gloves since, in occupational exposure, the main contamination route is through dermal contact, which may occur via prolonged contact with contaminated surfaces or materials. The assay was performed by liquid chromatography using the following conditions for the detection of 5-fluorouracil (5-FU, methotrexate (MTX and paclitaxel (TAX: diode array detection and UV quantification at 195 nm for TAX, at 265 nm for 5-FU and at 302 nm for MTX; ODS column (250 x 4 mm, 5 μm with a similar guard column; mobile phase consisted of water (pH 4-methanol-acetonitrile (35:15:50, v/v/v with a flow rate of 1 mL min-1. The method presented a linear range from 0.25 to 20 μg mL-1 with r² higher than 0.99. Repeatability was 0.25 μg mL-1 in samples, although detection was possible in samples that presented values of around 0.1 μg mL-1. The results obtained suggest that the method developed can be applied for the simultaneous determination of the drugs studied and can be considered useful in exposure assessment for health care workers.O objetivo deste estudo foi desenvolver um método para a detecção simultânea de antineoplásicos em luvas, uma vez que, em exposições ocupacionais, a principal via de introdução é a dérmica, por meio de contato prolongado com superfícies e/ou materiais contaminados com tais fármacos. A tecnica de detecção utilizada foi a cromatografia líquida de alta eficiência, com detector de aranjo de diodos, nas seguintes condições: para a detecção de 5-fluorouracila (5-FU, metotrexato (MTX e paclitaxel (TAX: detecção e quantificação de TAX a 195 nm, de 5-FU a 265 nm e de MTX a 302 nm; coluna ODS (250 x 4 mm, 5 μm, com pré-coluna similar; fase móvel constituída de água (pH 4-metanol-acetonitrila (35:15:50, v/v/v, na vazão de 1 mL min-1. O método apresentou uma faixa linear de 0,25-20 mg mL-1, com r² > 0,99. O desvio

  7. Block Advertisement Protocol

    OpenAIRE

    Nemirovsky, Danil

    2015-01-01

    Bitcoin, a decentralized cryptocurrency, has attracted a lot of attention from academia, financial service industry and enthusiasts. The trade-off between transaction confirmation throughput and centralization of hash power do not allow Bitcoin to perform at the same level as modern payment systems. Block Advertisement Protocol is proposed as a step to resolve this issue. The protocol allows block mining and block relaying to happen in parallel. The protocol dictates a miner to advertise the ...

  8. An Experience with Managing Cancer Patients Reportedly Previously Informed of the Absence of Additional Available Antineoplastic Therapeutic Options

    Directory of Open Access Journals (Sweden)

    George River

    2014-09-01

    Full Text Available Over the past 5 years, a small group of cancer patients who stated their physicians had determined there were no additional available antineoplastic therapeutic options (including potential investigational strategies were seen for a ‘second opinion' in a cancer hospital-based oncology program and subsequently experienced what can reasonably be characterized as having achieved meaningful ‘clinical benefit' (functioning at a fairly high level for a minimum 1 year in the work, home, and/or family environments following the further delivery of a variety of treatment approaches. While recognized to be limited (or even simply ‘anecdotal', this experience emphasizes several clinically relevant conclusions, including the overall utility of a ‘second-opinion' strategy and the potential that the reported statement of an individual practitioner or cancer program that all rational options have been attempted may be inaccurate.

  9. Regulatory and logistical issues influencing access to antineoplastic and supportive care medications for children with cancer in developing countries.

    Science.gov (United States)

    Wiernikowski, John T; MacLeod, Stuart

    2014-08-01

    Globally there are numerous impediments, both logistical, regulatory and more recently global drug shortages, hindering pediatric access to therapeutic drugs of all types. Efforts to reduce barriers are ongoing and are especially important in low and middle income countries and for children requiring treatment of conditions such as those encountered in pediatric oncology characterized by the risk of life threatening treatment failures. Progress has been made through the efforts of the World Health Organization and regulators in the US and Europe to encourage the development of therapeutic agents for use in pediatrics and measures taken have fostered the availability of stronger pediatric data to guide therapeutic decisions. Nonetheless, pharmaceuticals remain a global commodity, subject to regulation by the World Trade Organization and this has often had detrimental effects in low and middle income countries. This article emphasizes the need for closer international collaboration to address the barriers currently impeding access to antineoplastic and supportive care medicines for children.

  10. Relation between DNA damage measured by comet assay and OGG1 Ser326Cys polymorphism in antineoplastic drugs biomonitoring

    Directory of Open Access Journals (Sweden)

    Carina Ladeira

    2015-09-01

    Full Text Available Antineoplastic drugs are hazardous chemical agents used mostly in the treatment of patients with cancer, however health professionals that handle and administer these drugs can become exposed and develop DNA damage. Comet assay is a standard method for assessing DNA damage in human biomonitoring and, combined with formamidopyrimidine DNA glycosylase (FPG enzyme, it specifically detects DNA oxidative damage. The aim of this study was to investigate genotoxic effects in workers occupationally exposed to cytostatics (n = 46, as compared to a control group with no exposure (n = 46 at two Portuguese hospitals, by means of the alkaline comet assay. The potential of the OGG1 Ser326Cys polymorphism as a susceptibility biomarker was also investigated. Exposure was evaluated by investigating the contamination of surfaces and genotoxic assessment was done by alkaline comet assay in peripheral blood lymphocytes. OGG1 Ser326Cys (rs1052133 polymorphism was studied by Real Time PCR. As for exposure assessment, there were 121 (37% positive samples out of a total of 327 samples analysed from both hospitals. No statistically significant differences (Mann-Whitney test, p > 0.05 were found between subjects with and without exposure, regarding DNA damage and oxidative DNA damage, nevertheless the exposed group exhibited higher values. Moreover, there was no consistent trend regarding the variation of both biomarkers as assessed by comet assay with OGG1 polymorphism. Our study was not statistically significant regarding occupational exposure to antineoplastic drugs and genetic damage assessed by comet assay. However, health professionals should be monitored for risk behaviour, in order to ensure that safety measures are applied and protection devices are used correctly.

  11. Relation between DNA damage measured by comet assay and OGG1 Ser326Cys polymorphism in antineoplastic drugs biomonitoring

    Directory of Open Access Journals (Sweden)

    Carina Ladeira

    2015-09-01

    Full Text Available Antineoplastic drugs are hazardous chemical agents used mostly in the treatment of patients with cancer, however health professionals that handle and administer these drugs can become exposed and develop DNA damage. Comet assay is a standard method for assessing DNA damage in human biomonitoring and, combined with formamidopyrimidine DNA glycosylase (FPG enzyme, it specifically detects DNA oxidative damage.The aim of this study was to investigate genotoxic effects in workers occupationally exposed to cytostatics (n = 46, as compared to a control group with no exposure (n = 46 at two Portuguese hospitals, by means of the alkaline comet assay. The potential of the OGG1 Ser326Cys polymorphism as a susceptibility biomarker was also investigated. Exposure was evaluated by investigating the contamination of surfaces and genotoxic assessment was done by alkaline comet assay in peripheral blood lymphocytes. OGG1 Ser326Cys (rs1052133 polymorphism was studied by Real Time PCR.As for exposure assessment, there were 121 (37% positive samples out of a total of 327 samples analysed from both hospitals. No statistically significant differences (Mann-Whitney test, p > 0.05 were found between subjects with and without exposure, regarding DNA damage and oxidative DNA damage, nevertheless the exposed group exhibited higher values. Moreover, there was no consistent trend regarding the variation of both biomarkers as assessed by comet assay with OGG1 polymorphism.Our study was not statistically significant regarding occupational exposure to antineoplastic drugs and genetic damage assessed by comet assay. However, health professionals should be monitored for risk behaviour, in order to ensure that safety measures are applied and protection devices are used correctly.

  12. Antineoplastic Effect of Calcium Channel Blocker-Verapamil and 5-Fluorouracil Intraperitoneal Chemotherapy on Hepatocarcinoma-Bearing Rats

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Objective To study the antineoplastic effect of the calcium channel blocker verapamil and 5-fluorouracil intraperitoneal chemotherapy on hepatocarcinoma-bearing rats,and examine the action between calcium channel blockers and cytotoxic drugs. Methods We adopted the method of subcapsular implantation of carcinoma tissues of walker-256 in the left liver lobe as a model of liver carcinoma-bearing rats.All experimental animals were divided into four groups.On the sixth day post implantation,in group A (control group) 6ml of saline was injected intraperitoneally once a day for 3 days.In group B(single chemotherapy group) 6ml of 5-Fu 75 mg/kg was injected intraperitoneally once a day for 3 days.In group C(combination of treatment group)both 5-Fu(75mg/kg) and verapamil (25mg/kg) were administered simultaneously as in A and B.In group D(simple verapamil group)only 6ml of verapamil(25mg/kg)was administered as above. Results Compared with groups A, B and D,The volume of cancer and the contents of liver cancer DNA and protein were significantly reduced.The rates of inhibiting cancer(89.9% in group C and 35.4% in group B)were significantly increased in groupC. Group C had significantly long survival time compared to groups A, B and D(P<0.05).By light microscopy, a number of focal necroses were found in cancer tissue in group C.Conclusion Calcium channel blockers can enhance the antineoplastic effect of 5-Fu intraperitonea chemotherapy to liver cancer;The use of verapamil can not increase the toxicity of 5-Fu.

  13. Transport Protocol Throughput Fairness

    Directory of Open Access Journals (Sweden)

    Saleem Bhatti

    2009-11-01

    Full Text Available Interest continues to grow in alternative transport protocols to the Transmission Control Protocol (TCP. These alternatives include protocols designed to give greater efficiency in high-speed, high-delay environments (so-called high-speed TCP variants, and protocols that provide congestion control without reliability. For the former category, along with the deployed base of ‘vanilla’ TCP – TCP NewReno – the TCP variants BIC and CUBIC are widely used within Linux: for the latter category, the Datagram Congestion Control Protocol (DCCP is currently on the IETF Standards Track. It is clear that future traffic patterns will consist of a mix of flows from these protocols (and others. So, it is important for users and network operators to be aware of the impact that these protocols may have on users. We show the measurement of fairness in throughput performance of DCCP Congestion Control ID 2 (CCID2 relative to TCP NewReno, and variants Binary Increase Congestion control (BIC, CUBIC and Compound, all in “out-of-the box” configurations. We use a testbed and endto- end measurements to assess overall throughput, and also to assess fairness – how well these protocols might respond to each other when operating over the same end-to-end network path. We find that, in our testbed, DCCP CCID2 shows good fairness with NewReno, while BIC, CUBIC and Compound show unfairness above round-trip times of 25ms.

  14. Linear Logical Voting Protocols

    DEFF Research Database (Denmark)

    DeYoung, Henry; Schürmann, Carsten

    2012-01-01

    . In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the single-winner first-past-the-post (SW- FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise...

  15. IPv6 Protocol Analyzer

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    With the emerging of next generation Intemet protocol (IPv6), it is expected to replace the current version of Internet protocol (IPv4) that will be exhausted in the near future. Besides providing adequate address space, some other new features are included into the new 128 bits of IP such as IP auto configuration, quality of service, simple routing capability, security, mobility and multicasting. The current protocol analyzer will not be able to handle IPv6 packets. This paper will focus on developing protocol analyzer that decodes IPv6 packet. IPv6 protocol analyzer is an application module,which is able to decode the IPv6 packet and provide detail breakdown of the construction of the packet. It has to understand the detail construction of the IPv6, and provide a high level abstraction of bits and bytes of the IPv6 packet.Thus it increases network administrators' understanding of a network protocol,helps he/she in solving protocol related problem in a IPv6 network environment.

  16. Playing With Population Protocols

    Directory of Open Access Journals (Sweden)

    Xavier Koegler

    2009-06-01

    Full Text Available Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.

  17. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  18. 1996 : Track Count Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The goal of St. Vincent National Wildlife Refuge's Track Count Protocol is to provide an index to the population size of game animals inhabiting St. Vincent Island.

  19. USA-USSR protocol

    CERN Multimedia

    1970-01-01

    On 30 November the USA Atomic Energy Commission and the USSR State Committee for the Utilization of Atomic Energy signed, in Washington, a protocol 'on carrying out of joint projects in the field of high energy physics at the accelerators of the National Accelerator Laboratory (Batavia) and the Institute for High Energy Physics (Serpukhov)'. The protocol will be in force for five years and can be extended by mutual agreement.

  20. Frequencies of 23 Functionally Significant Variant Alleles Related with Metabolism of Antineoplastic Drugs in the Chilean Population: Comparison with Caucasian and Asian Populations

    OpenAIRE

    Roco, Ángela; Quiñones, Luis; Agúndez, José A. G.; García-Martín, Elena; Squicciarini, Valentina; Miranda, Carla; Garay, Joselyn; Farfán, Nancy; SAAVEDRA, IVÁN; Cáceres, Dante; Ibarra, Carol; Varela, Nelson

    2012-01-01

    Cancer is a leading cause of death worldwide. The cancer incidence rate in Chile is 133.7/100,000 inhabitants and it is the second cause of death, after cardiovascular diseases. Most of the antineoplastic drugs are metabolized to be detoxified, and some of them to be activated. Genetic polymorphisms of drug-metabolizing enzymes can induce deep changes in enzyme activity, leading to individual variability in drug efficacy and/or toxicity. The present research describes the presence of genetic ...

  1. Frequencies of 23 functionally significant variant alleles related with metabolism of antineoplastic drugs in the Chilean population: comparison with Caucasian and Asian populations

    OpenAIRE

    Angela Margarita Roco; Luis Abel Quiñones; Agúndez, José A. G.; Elena eGarcía-Martín; Valentina eSquicciarini; Carla Estefania Miranda; Joselyn eGaray; Nancy eFarfán; Iván Nicolás Saavedra; Dante Daniel Caceres; Carol eIbarra; Nelson Miguel Varela

    2012-01-01

    Cancer is a leading cause of death worldwide. The cancer incidence rate in Chile is 133.7/100,000 inhabitants and it is the second cause of death, after cardiovascular diseases. Most of the antineoplastic drugs are metabolized to be detoxified, and some of them to be activated. Genetic polymorphisms of drug-metabolizing enzymes can induce deep changes in enzyme activity, leading to individual variability in drug efficacy and/or toxicity. The present research describes the presence of genetic ...

  2. Relation between DNA damage measured by comet assay and OGG1 Ser326Cys polymorphism in antineoplastic drugs biomonitoring

    OpenAIRE

    Carina Ladeira; Susana Viegas; Mário Pádua; Elisabete Carolino; Gomes, Manuel C.; Miguel Brito

    2015-01-01

    Antineoplastic drugs are hazardous chemical agents used mostly in the treatment of patients with cancer, however health professionals that handle and administer these drugs can become exposed and develop DNA damage. Comet assay is a standard method for assessing DNA damage in human biomonitoring and, combined with formamidopyrimidine DNA glycosylase (FPG) enzyme, it specifically detects DNA oxidative damage.The aim of this study was to investigate genotoxic effects in workers occupationally e...

  3. Chemosensitivity assay in mice prostate tumor: Preliminary report of flow cytometry, DNA fragmentation, ion ratiometric methods of anti-neoplastic drug monitoring

    OpenAIRE

    Kline Richard; Sharma Rakesh

    2004-01-01

    Abstract Flow cytometry, DNA fragmentation, ion ratiomateric analysis and NMR peaks characterized drug chemosensitivity of antineoplastic drugs. Hypotheses were: 1. The chemosensitive effect of different cancer cell lines is characteristic; 2. DNA fragmentation, ion ratiometric analysis suggest apoptosis status of tumor cells. Methods PC-3 cell lines were compared with DU-145, LNCaP cell lines in culture for the [Na]i and [Ca]i ion sensing dyes, cell death, NMR peaks and apoptosis staining fo...

  4. Quantitative Analysis of the Anti-Proliferative Activity of Combinations of Selected Iron-Chelating Agents and Clinically Used Anti-Neoplastic Drugs

    OpenAIRE

    Eliska Potuckova; Hana Jansova; Miloslav Machacek; Anna Vavrova; Pavlina Haskova; Lucie Tichotova; Vera Richardson; Kalinowski, Danuta S.; Richardson, Des R.; Tomas Simunek

    2014-01-01

    Recent studies have demonstrated that several chelators possess marked potential as potent anti-neoplastic drugs and as agents that can ameliorate some of the adverse effects associated with standard chemotherapy. Anti-cancer treatment employs combinations of several drugs that have different mechanisms of action. However, data regarding the potential interactions between iron chelators and established chemotherapeutics are lacking. Using estrogen receptor-positive MCF-7 breast cancer cells, ...

  5. The Hepatoprotection Provided by Taurine and Glycine against Antineoplastic Drugs Induced Liver Injury in an Ex Vivo Model of Normothermic Recirculating Isolated Perfused Rat Liver

    OpenAIRE

    Reza Heidari; Akram Jamshidzadeh; Hossein Niknahad; Farshad Safari; Hamdollah Azizi; Narges Abdoli; Mohammad Mehdi Ommati; Forouzan Khodaei; Arastoo Saeedi; Asma Najibi

    2016-01-01

    Taurine (2-aminoethane sulfonic acid) is a non-protein amino acid found in high concentration in different tissues. Glycine (Amino acetic acid) is the simplest amino acid incorporated in the structure of proteins. Several investigations indicate the hepatoprotective properties of these amino acids. On the other hand, antineoplastic agents-induced serum transaminase elevation and liver injury is a clinical complication. The current investigation was designed to screen the possible hepatoprotec...

  6. Efficacy, safety, and lack of interactions with the use of raltegravir in HIV-infected patients undergoing antineoplastic chemotherapy

    Directory of Open Access Journals (Sweden)

    Sara Bañón

    2014-11-01

    Full Text Available Introduction: Concomitant use of combination antiretroviral regimen (cART and cancer chemotherapy is difficult due to complex interactions and increased toxicity. Raltegravir could be an adequate option through its favourable drug-drug interaction profile. Methods: Prospective longitudinal study of HIV patients with cancer, AIDS related or not, undergoing chemotherapy. Patients without resistance or previous failure were switched or initiated raltegravir plus two nucleoside analogues. Plasma trough levels of raltegravir were measured. Results: Overall, 28 patients receiving a raltegravir-based regimen (4 naive with tenofovir-emtricitabine (18 cases or abacavir-lamivudine (10 cases were included. Mean age was 46.2 years (IQR, 39–52.7, and 79% were male. Median time of HIV was 201.7 months, CD4+ nadir was 268 cells/mm3, and 75% had previous AIDS. At the diagnosis of neoplasia, 17 were on protease inhibitors and 4 with efavirenz. Ten patients had a non-HIV-related cancer (three breast, two pancreatic, one Ewing sarcoma, one myeloblastic leukemia, one melanoma, one parotid adenocarcinoma, one lung, and 18 had an HIV-related cancer (nine non-Hodgkin lymphoma, seven Hodgkin disease, two anal. Overall, 43% of patients received more than one line of chemotherapy, including antimetabolites in 12 patients (5-FU, capecitabine, methotrexate, gemcitabine, alkylating agents in 12 cases (ciclophosphamide, iphosphamide, vinca alkaloids in 20 patients (vincristine, vinblastine, vindesine, antitumor antibiotics in 16 cases (adriamycin, cisplatin o carboplatin in six and monoclonal antibodies in six patients (rituximab, trastuzumab, cetuximab. Six patients modified the doses of antineoplastic agents due to toxicity (four neutropenia, not related to raltegravir. During a median follow up of 12.7 patients-year in concomitant therapy, there was only 1 case of virological failure and no patient discontinued raltegravir. Plasma concentrations of raltegravir in eight

  7. Accelerator mass spectrometry analysis of 14C-oxaliplatin concentrations in biological samples and 14C contents in biological samples and antineoplastic agents

    Science.gov (United States)

    Toyoguchi, Teiko; Kobayashi, Takeshi; Konno, Noboru; Shiraishi, Tadashi; Kato, Kazuhiro; Tokanai, Fuyuki

    2015-10-01

    Accelerator mass spectrometry (AMS) is expected to play an important role in microdose trials. In this study, we measured the 14C concentration in 14C-oxaliplatin-spiked serum, urine and supernatant of fecal homogenate samples in our Yamagata University (YU) - AMS system. The calibration curves of 14C concentration in serum, urine and supernatant of fecal homogenate were linear (the correlation coefficients were ⩾0.9893), and the precision and accuracy was within the acceptance criteria. To examine a 14C content of water in three vacuum blood collection tubes and a syringe were measured. 14C was not detected from water in these devices. The mean 14C content in urine samples of 6 healthy Japanese volunteers was 0.144 dpm/mL, and the intra-day fluctuation of 14C content in urine from a volunteer was little. The antineoplastic agents are administered to the patients in combination. Then, 14C contents of the antineoplastic agents were quantitated. 14C contents were different among 10 antineoplastic agents; 14C contents of paclitaxel injection and docetaxel hydrate injection were higher than those of the other injections. These results indicate that our quantitation method using YU-AMS system is suited for microdosing studies and that measurement of baseline and co-administered drugs might be necessary for the studies in low concentrations.

  8. Oxidative Stress Induced in Nurses by Exposure to Preparation and Handling of Antineoplastic Drugs in Mexican Hospitals: A Multicentric Study

    Directory of Open Access Journals (Sweden)

    Leobardo Manuel Gómez-Oliván

    2014-01-01

    Full Text Available The impact of involuntary exposure to antineoplastic drugs (AD was studied in a group of nurses in diverse hospitals in Mexico. The results were compared with a group of unexposed nurses. Anthropometric characteristics and the biochemical analysis were analyzed in both groups. Also, lipid peroxidation level (LPX, protein carbonyl content (PCC, and activity of the antioxidant enzymes superoxide dismutase (SOD, catalase (CAT, and glutathione peroxidase (GPx were evaluated in blood of study participants as oxidative stress (OS biomarkers. The group of occupationally exposed (OE nurses consisted of 30 individuals ranging in age from 25 to 35 years. The control group included 30 nurses who were not occupationally exposed to the preparation and handling of AD and whose anthropometric and biochemical characteristics were similar to those of the OE group. All biomarkers evaluated were significantly increased (P<0.5 in OE nurses compared to the control group. Results show that the assessment of OS biomarkers is advisable in order to evaluate exposure to AD in nurses.

  9. The antineoplastic drug flavopiridol reverses memory impairment induced by Amyloid-ß1-42 oligomers in mice.

    Science.gov (United States)

    Leggio, Gian Marco; Catania, Maria Vincenza; Puzzo, Daniela; Spatuzza, Michela; Pellitteri, Rosalia; Gulisano, Walter; Torrisi, Sebastiano Alfio; Giurdanella, Giovanni; Piazza, Cateno; Impellizzeri, Agata Rita; Gozzo, Lucia; Navarria, Andrea; Bucolo, Claudio; Nicoletti, Ferdinando; Palmeri, Agostino; Salomone, Salvatore; Copani, Agata; Caraci, Filippo; Drago, Filippo

    2016-04-01

    The ectopic re-activation of cell cycle in neurons is an early event in the pathogenesis of Alzheimer's disease (AD), which could lead to synaptic failure and ensuing cognitive deficits before frank neuronal death. Cytostatic drugs that act as cyclin-dependent kinase (CDK) inhibitors have been poorly investigated in animal models of AD. In the present study, we examined the effects of flavopiridol, an inhibitor of CDKs currently used as antineoplastic drug, against cell cycle reactivation and memory loss induced by intracerebroventricular injection of Aß1-42 oligomers in CD1 mice. Cycling neurons, scored as NeuN-positive cells expressing cyclin A, were found both in the frontal cortex and in the hippocampus of Aβ-injected mice, paralleling memory deficits. Starting from three days after Aβ injection, flavopiridol (0.5, 1 and 3mg/kg) was intraperitoneally injected daily, for eleven days. Here we show that a treatment with flavopiridol (0.5 and 1mg/kg) was able to rescue the loss of memory induced by Aβ1-42, and to prevent the occurrence of ectopic cell-cycle events in the mouse frontal cortex and hippocampus. This is the first evidence that a cytostatic drug can prevent cognitive deficits in a non-transgenic animal model of AD. PMID:26875816

  10. Concanavalin A: A potential anti-neoplastic agent targeting apoptosis, autophagy and anti-angiogenesis for cancer therapeutics

    Energy Technology Data Exchange (ETDEWEB)

    Li, Wen-wen; Yu, Jia-ying; Xu, Huai-long [School of Life Sciences and State Key Laboratory of Oral Diseases, Sichuan University, Chengdu 610064 (China); Bao, Jin-ku, E-mail: jinkubao@yahoo.com [School of Life Sciences and State Key Laboratory of Oral Diseases, Sichuan University, Chengdu 610064 (China)

    2011-10-22

    Highlights: {yields} ConA induces cancer cell death targeting apoptosis and autophagy. {yields} ConA inhibits cancer cell angiogenesis. {yields} ConA is utilized in pre-clinical and clinical trials. -- Abstract: Concanavalin A (ConA), a Ca{sup 2+}/Mn{sup 2+}-dependent and mannose/glucose-binding legume lectin, has drawn a rising attention for its remarkable anti-proliferative and anti-tumor activities to a variety of cancer cells. ConA induces programmed cell death via mitochondria-mediated, P73-Foxo1a-Bim apoptosis and BNIP3-mediated mitochondrial autophagy. Through IKK-NF-{kappa}B-COX-2, SHP-2-MEK-1-ERK, and SHP-2-Ras-ERK anti-angiogenic pathways, ConA would inhibit cancer cell survival. In addition, ConA stimulates cell immunity and generates an immune memory, resisting to the same genotypic tumor. These biological findings shed light on new perspectives of ConA as a potential anti-neoplastic agent targeting apoptosis, autophagy and anti-angiogenesis in pre-clinical or clinical trials for cancer therapeutics.

  11. A Comprehensive Spectroscopic and Computational Investigation to Probe the Interaction of Antineoplastic Drug Nordihydroguaiaretic Acid with Serum Albumins.

    Science.gov (United States)

    Nusrat, Saima; Siddiqi, Mohammad Khursheed; Zaman, Masihuz; Zaidi, Nida; Ajmal, Mohammad Rehan; Alam, Parvez; Qadeer, Atiyatul; Abdelhameed, Ali Saber; Khan, Rizwan Hasan

    2016-01-01

    Exogenous drugs that are used as antidote against chemotheray, inflammation or viral infection, gets absorbed and interacts reversibly to the major serum transport protein i.e. albumins, upon entering the circulatory system. To have a structural guideline in the rational drug designing and in the synthesis of drugs with greater efficacy, the binding mechanism of an antineoplastic and anti-inflammatory drug Nordihydroguaiaretic acid (NDGA) with human and bovine serum albumins (HSA & BSA) were examined by spectroscopic and computational methods. NDGA binds to site II of HSA with binding constant (Kb) ~105 M-1 and free energy (ΔG) ~ -7.5 kcal.mol-1. It also binds at site II of BSA but with lesser binding affinity (Kb) ~105 M-1 and ΔG ~ -6.5 kcal.mol-1. The negative value of ΔG, ΔH and ΔS for both the albumins at three different temperatures confirmed that the complex formation process between albumins and NDGA is spontaneous and exothermic. Furthermore, hydrogen bonds and hydrophobic interactions are the main forces involved in complex formation of NDGA with both the albumins as evaluated from fluorescence and molecular docking results. Binding of NDGA to both the albumins alter the conformation and causes minor change in the secondary structure of proteins as indicated by the CD spectra. PMID:27391941

  12. Diet and tumor LKB1 expression interact to determine sensitivity to anti-neoplastic effects of metformin in vivo.

    Science.gov (United States)

    Algire, C; Amrein, L; Bazile, M; David, S; Zakikhani, M; Pollak, M

    2011-03-10

    Hypothesis-generating epidemiological research has suggested that cancer burden is reduced in diabetics treated with metformin and experimental work has raised questions regarding the role of direct adenosine monophosphate-activated protein kinase (AMPK)-mediated anti-neoplastic effects of metformin as compared with indirect effects attributable to reductions in circulating insulin levels in the host. We treated both tumor LKB1 expression and host diet as variables, and observed that metformin inhibited tumor growth and reduced insulin receptor activation in tumors of mice with diet-induced hyperinsulinemia, independent of tumor LKB1 expression. In the absence of hyperinsulinemia, metformin inhibited only the growth of tumors transfected with short hairpin RNA against LKB1, a finding attributable neither to an effect on host insulin level nor to activation of AMPK within the tumor. Further investigation in vitro showed that cells with reduced LKB1 expression are more sensitive to metformin-induced adenosine triphosphate depletion owing to impaired ability to activate LKB1-AMPK-dependent energy-conservation mechanisms. Thus, loss of function of LKB1 can accelerate proliferation in contexts where it functions as a tumor suppressor, but can also sensitize cells to metformin. These findings predict that any clinical utility of metformin or similar compounds in oncology will be restricted to subpopulations defined by host insulin levels and/or loss of function of LKB1. PMID:21102522

  13. Organotypic Culture of Breast Tumor Explants as a Multicellular System for the Screening of Natural Compounds with Antineoplastic Potential

    Science.gov (United States)

    Carranza-Torres, Irma Edith; Guzmán-Delgado, Nancy Elena; Coronado-Martínez, Consuelo; Bañuelos-García, José Inocente; Viveros-Valdez, Ezequiel; Morán-Martínez, Javier; Carranza-Rosales, Pilar

    2015-01-01

    Breast cancer is the leading cause of death in women worldwide. The search for novel compounds with antitumor activity, with less adverse effects and higher efficacy, and the development of methods to evaluate their toxicity is an area of intense research. In this study we implemented the preparation and culture of breast tumor explants, which were obtained from precision-cut breast tumor slices. In order to validate the model we are proposing to screen antineoplastic effect of natural compounds, we selected caffeic acid, ursolic acid, and rosmarinic acid. Using the Krumdieck tissue slicer, precision-cut tissue slices were prepared from breast cancer samples; from these slices, 4 mm explants were obtained and incubated with the selected compounds. Viability was assessed by Alamar Blue assay, LDH release, and histopathological criteria. Results showed that the viability of the explants cultured in the presence of paclitaxel (positive control) decreased significantly (P < 0.05); however, tumor samples responded differently to each compound. When the explants were coincubated with paclitaxel and compounds, a synergic effect was observed. This study shows that ex vivo culture of breast cancer explants offers a suitable alternative model for evaluating natural or synthetic compounds with antitumor properties within the complex microenvironment of the tumor. PMID:26075250

  14. Organotypic Culture of Breast Tumor Explants as a Multicellular System for the Screening of Natural Compounds with Antineoplastic Potential

    Directory of Open Access Journals (Sweden)

    Irma Edith Carranza-Torres

    2015-01-01

    Full Text Available Breast cancer is the leading cause of death in women worldwide. The search for novel compounds with antitumor activity, with less adverse effects and higher efficacy, and the development of methods to evaluate their toxicity is an area of ​​intense research. In this study we implemented the preparation and culture of breast tumor explants, which were obtained from precision-cut breast tumor slices. In order to validate the model we are proposing to screen antineoplastic effect of natural compounds, we selected caffeic acid, ursolic acid, and rosmarinic acid. Using the Krumdieck tissue slicer, precision-cut tissue slices were prepared from breast cancer samples; from these slices, 4 mm explants were obtained and incubated with the selected compounds. Viability was assessed by Alamar Blue assay, LDH release, and histopathological criteria. Results showed that the viability of the explants cultured in the presence of paclitaxel (positive control decreased significantly (P<0.05; however, tumor samples responded differently to each compound. When the explants were coincubated with paclitaxel and compounds, a synergic effect was observed. This study shows that ex vivo culture of breast cancer explants offers a suitable alternative model for evaluating natural or synthetic compounds with antitumor properties within the complex microenvironment of the tumor.

  15. A multicenter study of biological effects assessment of pharmacy workers occupationally exposed to antineoplastic drugs in Pharmacy Intravenous Admixture Services.

    Science.gov (United States)

    Zhang, Jingjing; Bao, Jianan; Wang, Renying; Geng, Zhou; Chen, Yao; Liu, Xinchun; Xie, Yongzhong; Jiang, Ling; Deng, Yufei; Liu, Gaolin; Xu, Rong; Miao, Liyan

    2016-09-01

    This multi-centered study was designed to evaluate the biological effects of exposure to antineoplastic drugs (ADs) at PIVAS (Pharmacy Intravenous Admixture Service) across ten Chinese hospitals. 8-hydroxy-2-deoxyguanosine (8-OHdG) was used as a biomarker of DNA oxidative damage and lymphocyte apoptosis assays using peripheral lymphocyte cells were used to detect primary DNA damage. The mutagenicity activity was estimated with the Ames fluctuation test. 158 exposed and 143 unexposed workers participated in this study. The urinary 8-OHdG/Cr concentrations of the exposed group was 22.05±17.89ng/mg Cr, which was significantly higher than controls of 17.36±13.50ng/mg Cr (P<0.05). The rate of early lymphocyte apoptosis was slightly increased in exposed group than that of the control group (P=0.087). The mutagenic activity was significantly higher in the exposed group relative to the control group (P<0.05). Moreover, while no statistically significant difference was observed, higher concentrations of 8-OHdG/Cr in urine and an early lymphocyte apoptosis rate were found in exposed group II as compared to exposed group I. In addition, a significant correlation between early lymphocyte apoptosis and exposure time to ADs was also observed (P<0.05). In conclusion, our study identified elevated biomarkers in PIVAS workers exposed to ADs. However whether these findings could lead to increased incidence of genotoxic responses remains to be further investigated. PMID:27179702

  16. Multicenter study of environmental contamination with antineoplastic drugs in 36 Canadian hospitals: a 2013 follow-up study.

    Science.gov (United States)

    Berruyer, M; Tanguay, C; Caron, N J; Lefebvre, M; Bussières, J F

    2015-01-01

    No occupational exposure limit exists for antineoplastic drugs. The main objective of this study was to describe environmental contamination with cyclophosphamide, ifosfamide, and methotrexate in pharmacy and patient care areas of Canadian hospitals in 2013. The secondary objective was to compare the 2013 environmental monitoring results with previous studies. Six standardized sites in the pharmacy and six sites on patient care areas were sampled in each participating center. Samples were analyzed for the presence of cyclophosphamide, ifosfamide, and methotrexate by UPLC-MSMS. The limit of detection (LOD) in pg/cm(2) was 1.8 for cyclophosphamide, 2.2 for ifosfamide, and 7.5 for methotrexate. The 75th percentile of cyclophosphamide concentration was compared between the 2013, 2008-2010, and 2012 studies. Thirty-six hospitals participated in the study and 422 samples were collected. Overall, 47% (198/422) of the samples were positive for cyclophosphamide, 18% (75/422) were positive for ifosfamide, and 3% (11/422) were positive for methotrexate. In 2013, the 75th percentile value of cyclophosphamide surface concentration was reduced to 8.4pg/cm(2) (n = 36), compared with 9.4pg/cm(2) in 2012 (n = 33) and 40pg/cm(2) (n = 25) in 2008-2010. The 75th percentile for ifosfamide and methotrexate concentration remained lower than the LOD. The 2013 study shows an improvement in the surface contamination level, and a plateau effect in the proportion of positive samples.

  17. 碱基切除修复与抗肿瘤药物耐药%Base excision repair and antineoplastic drug resistance

    Institute of Scientific and Technical Information of China (English)

    况里杉; 王宇亮; 周向东

    2013-01-01

    Chemotherapy is one of the main methods to treat malignant tumors in clinical practice. Resistance to antineoplastic agents is one of the important reasons for treatment failure. The antineoplastic mechanism of various chemotherapeutic agents is to cause DNA damage, then result in apoptosis of tumor cells. It is suggested that the function of DNA repair is directly associated with the efficacy of antineoplastic agents. Current studies suggest that there are four major DNA repair pathways including BER (base excision repair), NER (nucleotide excision repair), MMR (mismatch repair) and DSBR (double strand break repair). Of these four pathways, BER is one of the main mechanisms of DNA repair and its malfunction is closely related to the resistance to antineoplastic agents. Recently, many kinds of agents and strategies targeting BER have been developed to reverse chemoresistance. This review summarizes the progress in research in this area and discusses the mechanism of resistance to antineoplastic agents and the potential preventive and therapeutic strategies.%化疗是目前临床上治疗肿瘤的主要方法之一,抗肿瘤药物耐药则是导致肿瘤治疗失败的重要原因之一.多种化疗药物抗肿瘤的主要机制是引起DNA损伤,进而导致肿瘤细胞凋亡;因此,DNA修复功能状态与抗肿瘤药物疗效有着直接的关系.目前,已知有4种主要的DNA修复途径:碱基切除修复(base excision repair,BER)、核苷酸切除修复(nucleotide excision repair,NER)、错配修复(mismatch repair,MMR)和双键断裂修复(double strand break repair,DSBR).其中,BER是主要的DNA修复机制之一,其修复功能异常与抗肿瘤药物耐药有着密切的联系.近年来,以BER为靶点开发了多种逆转耐药的药物或方法.本文将简要综述相关的研究进展,深入探讨抗肿瘤药物耐药的发生机制及防治措施.

  18. Cytoskeleton - Methods and Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-03-01

    Full Text Available Cytoskeleton - Methods and ProtocolsSecond edition, 2010; Ray H. Gavin (Ed; Springer Protocols methods in molecular biology, vol. 586 Humana press, Totowa, New Jersey (USA; Pages: 390; €95.44; ISBN: 978-1-60761-375-6Ray H. Gavin, from the Brooklyn College of The City University of New York, Brooklyn, NY, USA, wrote a few line as preface of this book. This is quite understandable: there is not a great need of words when there are facts that sustain and favour the dissemination of a cultural product. This is the case of the second edition of Cytoskeleton - Methods and Protocols, which appears just ten years after the first edition...

  19. DNA repair protocols

    DEFF Research Database (Denmark)

    Bjergbæk, Lotte

    In its 3rd edition, this Methods in Molecular Biology(TM) book covers the eukaryotic response to genomic insult including advanced protocols and standard techniques in the field of DNA repair. Offers expert guidance for DNA repair, recombination, and replication. Current knowledge of the mechanisms...... that regulate DNA repair has grown significantly over the past years with technology advances such as RNA interference, advanced proteomics and microscopy as well as high throughput screens. The third edition of DNA Repair Protocols covers various aspects of the eukaryotic response to genomic insult including...... recent advanced protocols as well as standard techniques used in the field of DNA repair. Both mammalian and non-mammalian model organisms are covered in the book, and many of the techniques can be applied with only minor modifications to other systems than the one described. Written in the highly...

  20. Apoptosis - Methods and Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-03-01

    Full Text Available Apoptosis - Methods and ProtocolsSecond edition, 2009; Peter Erhardt and Ambrus Toth (Eds; Springer Protocols - Methods in molecular biology, vol. 559; Humana press, Totowa, New Jersey (USA; Pages: 400; €88.35; ISBN: 978-1-60327-016-8The editors rightly begin the preface telling us that: “The ability to detect and quantify apoptosis, to understand its biochemistry and to identify its regulatory genes and proteins is crucial to biomedical research”. Nowadays this is a grounding concept of biology and medicine. What is particularly remarkable...

  1. Design and synthesis of highly Water-soluble Platinum antineoplastic drugs%高水溶性铂类抗肿瘤药物的设计与合成

    Institute of Scientific and Technical Information of China (English)

    张启飞; 鲁彦会; 刘朋兴; 王松青; 高清志

    2012-01-01

    目的 设计与合成具有高水溶性的铂类抗肿瘤药物.方法 通过在丙二酸铂结构中偶联糖分子设计出目标化合物并合成取得水溶性抗肿瘤药物.结果 得到了迄今水溶性最好的金属铂类抗肿瘤化合物,其动物模型抗肿瘤活性和安全性均优于顺铂和卡铂.结论 通过糖分子偶联设计取得的新型铂类抗肿瘤药物能够解决一般铂类药物的低水溶性问题.经初步动物模型抗肿瘤药效实验证明该类药物具有理想的抗肿瘤效果.%Objective To design and synthesize Platinum antineoplastic drugs with high water solubility. Methods Sugar molecular was coupled to the malonic acid Platinum structure to design and synthesize Platinum antineoplastic drugs with high water solubility. Results Metal Platinum antineoplastic compound with best water-solubility was produced, and its antineoplastic activity and safety were better than those of Cisplatin and Carboplatin on animal model. Conclusion Neotype Platinum antineoplastic drug, which is produced through the sugar molecule coupling design, can solve low water-solubility problem of general Platinum drugs. Preliminary antineoplastic efficacy experiment on animal model demonstrates that this kind of medicine has ideal antineoplastic effect.

  2. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  3. Business protocol in integrated Europe

    OpenAIRE

    Pavelová, Nina

    2009-01-01

    The first chapter devotes to definitions of basic terms such as protocol or business protocol, to differences between protocol and etiquette, and between social etiquette and business etiquette. The second chapter focuses on the factors influencing the European business protocol. The third chapter is devoted to the etiquette of business protocol in the European countries. It touches the topics such as punctuality and planning of business appointment, greeting, business cards, dress and appear...

  4. Security Protocol Design: A Case Study Using Key Distribution Protocols

    Directory of Open Access Journals (Sweden)

    Reiner Dojen

    2009-10-01

    Full Text Available Nowadays security protocols are a key component in providing security services for fixed and mobile networks. These services include data confidentiality, radio link encryption, message integrity, mobile subscriber authentication, electronic payment, certified e-mail, contract signing and nonrepudiation. This paper is concerned with design of effective security protocols. Security protocols are introduced and some common attacks against security protocols are discussed. The vulnerabilities that lead to theattacks are analyzed and guidelines for effective security protocol design are proposed. The presented guidelines are applied to the Andrew Secure RPC protocol and its adapted versions. It is demonstrated that compliance with the guidelines successfully avoidsfreshness and parallel session attacks.

  5. Model Additional Protocol

    International Nuclear Information System (INIS)

    Since the end of the cold war a series of events has changed the circumstances and requirements of the safeguards system. The discovery of a clandestine nuclear weapons program in Iraq, the continuing difficulty in verifying the initial report of Democratic People's Republic of Korea upon entry into force of their safeguards agreement, and the decision of the South African Government to give up its nuclear weapons program and join the Treaty on the Non-Proliferation of Nuclear Weapons have all played a role in an ambitious effort by IAEA Member States and the Secretariat to strengthen the safeguards system. A major milestone in this effort was reached in May 1997 when the IAEA Board of Governors approved a Model Protocol Additional to Safeguards Agreements. The Model Additional Protocol was negotiated over a period of less than a year by an open-ended committee of the Board involving some 70 Member States and two regional inspectorates. The IAEA is now in the process of negotiating additional protocols, State by State, and implementing them. These additional protocols will provide the IAEA with rights of access to information about all activities related to the use of nuclear material in States with comprehensive safeguards agreements and greatly expanded physical access for IAEA inspectors to confirm or verify this information. In conjunction with this, the IAEA is working on the integration of these measures with those provided for in comprehensive safeguards agreements, with a view to maximizing the effectiveness and efficiency, within available resources, the implementation of safeguards. Details concerning the Model Additional Protocol are given. (author)

  6. Parallel screening of FDA-approved antineoplastic drugs for identifying sensitizers of TRAIL-induced apoptosis in cancer cells

    Directory of Open Access Journals (Sweden)

    Taylor David J

    2011-11-01

    Full Text Available Abstract Background Tumor Necrosis Factor-α Related Apoptosis Inducing Ligand (TRAIL and agonistic antibodies to death receptor 4 and 5 are promising candidates for cancer therapy due to their ability to induce apoptosis selectively in a variety of human cancer cells, while demonstrating little cytotoxicity in normal cells. Although TRAIL and agonistic antibodies to DR4 and DR5 are considered safe and promising candidates in cancer therapy, many malignant cells are resistant to DR-mediated, TRAIL-induced apoptosis. In the current work, we screened a small library of fifty-five FDA and foreign-approved anti-neoplastic drugs in order to identify candidates that sensitized resistant prostate and pancreatic cancer cells to TRAIL-induced apoptosis. Methods FDA-approved drugs were screened for their ability to sensitize TRAIL resistant prostate cancer cells to TRAIL using an MTT assay for cell viability. Analysis of variance was used to identify drugs that exhibited synergy with TRAIL. Drugs demonstrating the highest synergy were selected as leads and tested in different prostate and pancreatic cancer cell lines, and one immortalized human pancreatic epithelial cell line. Sequential and simultaneous dosing modalities were investigated and the annexin V/propidium iodide assay, in concert with fluorescence microscopy, was employed to visualize cells undergoing apoptosis. Results Fourteen drugs were identified as having synergy with TRAIL, including those whose TRAIL sensitization activities were previously unknown in either prostate or pancreatic cancer cells or both. Five leads were tested in additional cancer cell lines of which, doxorubicin, mitoxantrone, and mithramycin demonstrated synergy in all lines. In particular, mitoxantrone and mithramycin demonstrated significant synergy with TRAIL and led to reduction of cancer cell viability at concentrations lower than 1 μM. At these low concentrations, mitoxantrone demonstrated selectivity toward

  7. Cell-based laboratory evaluation of coagulation activation by antineoplastic drugs for the treatment of lymphoid tumors

    Science.gov (United States)

    Tsunaka, Misae; Arai, Reina; Ohashi, Ayaka; Koyama, Takatoshi

    2016-01-01

    Objectives: Combining vorinostat, L-asparaginase, and doxorubicin (Dox) led to improved response rates in the treatment of lymphoid tumors. However, deep-vein thrombosis has been noted as one of the most serious side effects with these drugs, and how these regimens cause deep-vein thrombosis is unclear. Methods: We investigated the procoagulant effects of vorinostat, L-asparaginase, and doxorubicin in lymphoid tumors, focusing on tissue factor, phosphatidylserine, and antithrombin. The human vascular endothelial cell line EAhy926 as well as the lymphoid neoplastic cell lines HUT78 (cutaneous T-cell lymphoma), Molt4 (acute T-lymphoblastic leukemia), and Ramos (Burkitt lymphoma) were employed to investigate these procoagulant effects. Results: Vorinostat, L-asparaginase, and doxorubicin induced exposure of phosphatidylserine and procoagulant activity on the surface of lymphoid tumor cells. Vorinostat and doxorubicin also induced phosphatidylserine exposure and increased procoagulant activity on EAhy926 cells. Expression of tissue factor antigen was induced by doxorubicin on the surface of each type of cells, whereas expression of tissue factor mRNA was unchanged. Secretion of antithrombin from HepG2 cells was reduced only by L-asparaginase. Conclusion: These data suggest that vorinostat and doxorubicin may induce procoagulant activity in vessels through apoptosis of tumor cells and through phosphatidylserine exposure and/or tissue factor expression on vascular endothelial cells. L-asparaginase may induce a thrombophilic state by reducing the secretion of anticoagulant proteins such as antithrombin. The laboratory methods described here could be useful to evaluate the procoagulant effects of antineoplastic drugs. PMID:27504186

  8. A family of quantum protocols

    CERN Document Server

    Devetak, I; Winter, A

    2003-01-01

    We introduce two dual, purely quantum protocols: for entanglement distillation assisted by quantum communication (``mother'' protocol) and for entanglement assisted quantum communication (``father'' protocol). We show how a large class of ``children'' protocols (including many previously known ones) can be derived from the two by direct application of teleportation or super-dense coding. Furthermore, the parent may be recovered from most of the children protocols by making them ``coherent''. We also summarize the various resource trade-offs these protocols give rise to.

  9. MicroRNA-19a/b mediates grape seed procyanidin extract-induced anti-neoplastic effects against lung cancer.

    Science.gov (United States)

    Mao, Jenny T; Xue, Bingye; Smoake, Jane; Lu, Qing-Yi; Park, Heesung; Henning, Susanne M; Burns, Windie; Bernabei, Alvise; Elashoff, David; Serio, Kenneth J; Massie, Larry

    2016-08-01

    Oncomirs are microRNAs (miRNA) associated with carcinogenesis and malignant transformation. They have emerged as potential molecular targets for anti-cancer therapy. We hypothesize that grape seed procyanidin extract (GSE) exerts antineoplastic effects through modulations of oncomirs and their downstream targets. We found that GSE significantly down-regulated oncomirs miR-19a and -19b in a variety of lung neoplastic cells. GSE also increased mRNA and protein levels of insulin-like growth factor II receptor (IGF-2R) and phosphatase and tensin homolog (PTEN), both predicted targets of miR-19a and -19b. Furthermore, GSE significantly increased PTEN activity and decreased AKT phosphorylation in A549 cells. Transfection of miR-19a and -19b mimics reversed the up-regulations of IGF2R and PTEN gene expression and abrogated the GSE induced anti-proliferative response. Additionally, oral administration of leucoselect phytosome, comprised of standardized grape seed oligomeric procyanidins complexed with soy phospholipids, to athymic nude mice via gavage, significantly down-regulated miR-19a, -19b and the miR-17-92 cluster host gene (MIR17HG) expressions, increased IGF-2R, PTEN, decreased phosphorylated-AKT in A549 xenograft tumors, and markedly inhibited tumor growth. To confirm the absorption of orally administered GSE, plasma procyanidin B1 levels, between 60 and 90 min after gavage of leucoselect phytosome (400 mg/kg), were measured by LC/MS at week 2 and 8 of treatment; the estimated concentration that was associated with 50% growth inhibition (IC50) (1.3 μg/mL) in vitro was much higher than the IC50 (0.032-0.13 μg/ml) observed in vivo. Our findings reveal novel antineoplastic mechanisms by GSE and support the clinical translation of leucoselect phytosome as an anti-neoplastic and chemopreventive agent for lung cancer. PMID:27289489

  10. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  11. Phototherapy Modalities and Protocols

    Directory of Open Access Journals (Sweden)

    Ayten Ferahbaş

    2010-12-01

    Full Text Available Over the past few years, the development of irradiation devices with new emission spectra has led to an expanded role for phototherapy in the treatment of skin diseases. This development is best illustrated by the increasing frequency with which 311 nm UVB phototherapy is used for the treatment of psoriasis and vitiligo, especially. Another example is UVA1 340-400 nm. UVA1 was first used to treat patients with atopic dermatitis, but it has been found to be efficacious in several other skin diseases. This is overview of the protocols for phototherapy with UV in the treatment of skin diseases as currently used according to recent literature review. There are, of course, other protocols in use that are effective.

  12. Mitosis Methods & Protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-06-01

    Full Text Available Mitosis Methods & Protocols Andrew D. McAinsh (Edt Humana press, Totowa, New Jersey (USA Series: Springer Protocols Methods in Molecular Biology, Volume 545, 2009 ISBN: 978-1-60327-992-5   It is quite clear from the contents of this book that the remarkably fascinating phenomenon of mitosis (that captured, and still is capturing, the attention of entire generations of scientists is still open to research. This is mainly due to our lack of knowledge of so many multifaced events of this extraordinarly complex process. The reader giving a glace through the Contents and Contributors sections is speechless: All of the first-class models (i.e., budding yeast, Caenorabditis, Drosophila, Xenopus and Human are presented..... 

  13. Dysphonia risk screening protocol

    Directory of Open Access Journals (Sweden)

    Katia Nemr

    2016-03-01

    Full Text Available OBJECTIVE: To propose and test the applicability of a dysphonia risk screening protocol with score calculation in individuals with and without dysphonia. METHOD: This descriptive cross-sectional study included 365 individuals (41 children, 142 adult women, 91 adult men and 91 seniors divided into a dysphonic group and a non-dysphonic group. The protocol consisted of 18 questions and a score was calculated using a 10-cm visual analog scale. The measured value on the visual analog scale was added to the overall score, along with other partial scores. Speech samples allowed for analysis/assessment of the overall degree of vocal deviation and initial definition of the respective groups and after six months, the separation of the groups was confirmed using an acoustic analysis. RESULTS: The mean total scores were different between the groups in all samples. Values ranged between 37.0 and 57.85 in the dysphonic group and between 12.95 and 19.28 in the non-dysphonic group, with overall means of 46.09 and 15.55, respectively. High sensitivity and specificity were demonstrated when discriminating between the groups with the following cut-off points: 22.50 (children, 29.25 (adult women, 22.75 (adult men, and 27.10 (seniors. CONCLUSION: The protocol demonstrated high sensitivity and specificity in differentiating groups of individuals with and without dysphonia in different sample groups and is thus an effective instrument for use in voice clinics.

  14. Automatic Validation of Protocol Narration

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, Pierpablo;

    2003-01-01

    We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we...... demonstrate that these techniques suffice for identifying a number of authentication flaws in symmetric key protocols such as Needham-Schroeder, Otway-Rees, Yahalom and Andrew Secure RPC....

  15. An automatic protocol composition checker

    OpenAIRE

    Kojovic, Ivana

    2012-01-01

    Formal analysis is widely used to prove security properties of the protocols. There are tools to check protocols in isolation, but in fact we use many protocols in parallel or even vertically stacked, e.g. running an application protocol (like login) over a secure channel (like TLS) and in general it is unclear if that is safe. There are several works that give sufficient conditions for parallel and vertical composition, but there exists no program to check whether these conditions are actual...

  16. Static Validation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Degano, P.;

    2005-01-01

    We methodically expand protocol narrations into terms of a process algebra in order to specify some of the checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques...

  17. ET-09DECOY OLIGONUCLEOTIDE DERIVED FROM MGMT ENHANCER HAS AN ANTINEOPLASTIC ACTIVITY IN-VITRO AND IN-VIVO

    Science.gov (United States)

    Canello, Tamar; Ovadia, Haim; Refael, Miri; Zrihan, Daniel; Siegal, Tali; Lavon, Iris

    2014-01-01

    INTRODUCTION: Silencing of O(6)-methylguanine-DNA-methyltransferase (MGMT) in tumors, correlates with a better therapeutic response and with increased survival. Our previous results demonstrated the pivotal role of NF-kappaB in MGMT expression, mediated mainly through binding of p65/NF-kappaB homodimers to the non-canonical NF-KappaB motif (MGMT-kappaB1) within MGMT enhancer. METHODS AND RESULTS: In an attempt to attenuate the transcription activity of MGMT in tumors we designed locked nucleic acids (LNA) modified decoy oligonucleotides corresponding to the specific sequence of MGMT-kappaB1 (MGMT-kB1-LODN). Following confirmation of the ability of MGMT-kB1-LODN to interfere with the binding of p65/NF-kappaB to MGMT enhancer, the potential of the MGMT-kB1-LODN to enhance cell killing was studied in vitro in two glioma cell lines (T98G and U87) and a melanoma cell line (A375P). All three cell lines manifested a significant enhanced cell killing effect following exposure to temozolomide (TMZ) when first transfected with MGMT-kb1-LODN, and also induced a significant cell killing when administered as monotherapy. These results were confirmed also in-vivo on A375P Melanoma xenografts. Intratumoral (Intralesional - IL) injection of MGMT-kB1-LODN with or without IP injection of TMZ induced significant tumor growth inhibition either as a monotherapy or in combination with TMZ. The long-term effect of MGMT-kB1-LODN monotherapy was evaluated using a repetitive IL injection every 4 to 5 days for 55 days with either MGMT-κB1 LODN or control ODN or vehicle. A significant difference (p < 0.01) in tumor volume was obtained by MGMT-κB1-LODN compared to both control groups. Moreover, two out of the seven mice treated with MGMT-κB1-LODN demonstrated tumor regression by day 55 and no tumor recurrence was observed five months later. CONCLUSION: The results of these experiments show that the MGMT-kB1-LODN has a substantial antineoplastic effect when used either in combination with

  18. Transfusion protocol in trauma

    Directory of Open Access Journals (Sweden)

    Kaur Paramjit

    2011-01-01

    Full Text Available Blood and blood components are considered drugs because they are used in the treatment of diseases. As with any drug, adverse effects may occur, necessitating careful consideration of therapy. Like any other therapeutic decision, the need for transfusion should be considered on the basis of risks and benefits and alternative treatments available to avoid over- and under-transfusion. This review is focused on the blood transfusion protocol in trauma patients with hemorrhagic shock. Besides, issues related to emergency and massive transfusion have also been elaborated. We conducted a comprehensive MEDLINE search and reviewed the relevant literature, with particular reference to emergency medical care in trauma.

  19. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division des Ressources Humaines; Human Resources Division; Tel. 74683-79494

    2000-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.2000, are requested to return these cards and those of family members, for extension to: Bureau des cartes, Bât 33.1-009/1-015 Should the three spaces for authentication on the back of the card be full, please enclose two passport photographs for a new card. In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.

  20. FRENCH PROTOCOL CARDS

    CERN Multimedia

    Division du Personnel

    1999-01-01

    Senior officials, holders of FRENCH PROTOCOL cards (blue cards) due to expire on 31.12.1999, are requested to return these cards and those of family members, for extension to:Bureau des cartes, bâtiment 33.1-025Should the 3 spaces for authentication on the back of the card be full, please enclose 2 passport photographs for a new card.In the case of children aged 14 and over, an attestation of dependency and a school certificate should be returned with the card.Personnel DivisionTel. 79494/74683

  1. Provenance Query Protocol

    OpenAIRE

    Miles, S.; Moreau, L; Groth, P; Tan, V.; Munroe, S; Jiang, Sheng

    2006-01-01

    A related document defines schemas to be used for documentation about the execution of a process. It also defines the provenance of a data item as the process that led to that item. A provenance query is a query for the provenance of a data item and the results of such a query is documentation of the process that led to the item. In this document, we specify a protocol by which a querying actor and provenance store can communicate in performing a provenance query. This primarily takes the for...

  2. Antineoplastic effect of iodine and iodide in dimethylbenz[a]anthracene-induced mammary tumors: association between lactoperoxidase and estrogen-adduct production.

    Science.gov (United States)

    Soriano, Ofelia; Delgado, Guadalupe; Anguiano, Brenda; Petrosyan, Pavel; Molina-Servín, Edith D; Gonsebatt, Maria E; Aceves, Carmen

    2011-08-01

    Several groups, including ours, have reported that iodine exhibited antiproliferative and apoptotic effects in various cancer cells only if this element is supplemented as molecular iodine, or as iodide, to cells that are able to oxidize it with the enzyme thyroperoxidase. In this study, we analyzed the effect of various concentrations of iodine and/or iodide in the dimethylbenz[a]anthracene (DMBA) mammary cancer model in rats. The results show that 0.1% iodine or iodide increases the expression of peroxisome proliferator-activated receptor type γ (PPARγ), triggering caspase-mediated apoptosis pathways in damaged mammary tissue (DMBA-treated mammary gland) as well as in frank mammary tumors, but not in normal mammary gland. DMBA treatment induces the expression of lactoperoxidase, which participates in the antineoplastic effect of iodide and could be involved in the pro-neoplastic effect of estrogens, increasing the formation of DNA adducts. In conclusion, our results show that a supplement of 0.1% molecular iodine/potassium iodide (0.05/0.05%) exert antineoplastic effects, preventing estrogen-induced DNA adducts and inducing apoptosis through PPARγ/caspases in pre-cancer and cancerous cells. Since this iodine concentration does not modify the cytology (histology, apoptosis rate) or physiology (triiodothyronine and thyrotropin) of the thyroid gland, we propose that it be considered as an adjuvant treatment for premenopausal mammary cancer.

  3. Stream Control Transmission Protocol Steganography

    CERN Document Server

    Fraczek, Wojciech; Szczypiorski, Krzysztof

    2010-01-01

    Stream Control Transmission Protocol (SCTP) is a new transport layer protocol that is due to replace TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) protocols in future IP networks. Currently, it is implemented in such operating systems like BSD, Linux, HP-UX or Sun Solaris. It is also supported in Cisco network devices operating system (Cisco IOS) and may be used in Windows. This paper describes potential steganographic methods that may be applied to SCTP and may pose a threat to network security. Proposed methods utilize new, characteristic SCTP features like multi-homing and multistreaming. Identified new threats and suggested countermeasures may be used as a supplement to RFC 5062, which describes security attacks in SCTP protocol and can induce further standard modifications.

  4. Protocols for Scholarly Communication

    CERN Document Server

    Pepe, Alberto; Pepe, Alberto; Yeomans, Joanne

    2007-01-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should naturally guide authors towards OA publication and CERN wants to help reach a full...

  5. Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Meldgaard, Sigurd Torkel

    they are used to speed up secure computation. An Oblivious RAM is a construction for a client with a small $O(1)$ internal memory to store $N$ pieces of data on a server while revealing nothing more than the size of the memory $N$, and the number of accesses. This specifically includes hiding the access pattern......This thesis contains research on the theory of secure multi-party computation (MPC). Especially information theoretically (as opposed to computationally) secure protocols. It contains results from two main lines of work. One line on Information Theoretically Secure Oblivious RAMS, and how....... We construct an oblivious RAM that hides the client's access pattern with information theoretic security with an amortized $\\log^3 N$ query overhead. And how to employ a second server that is guaranteed not to conspire with the first to improve the overhead to $\\log^2 N$, while also avoiding...

  6. A PROGRAMMED LABOUR - PROTOCOL

    Directory of Open Access Journals (Sweden)

    Savita

    2014-12-01

    Full Text Available A Prospective randomized Clinical study of outcome of labour following. “A Programmed labour. Protocol” was done at Department of OBG, MRMC Gulbarga. The Protocol was aimed with dual. Objective of Providing Pain relief during labour and teaching the goal of safe motherhood by optimizing objective outcome. AIMS AND OBJECTIVES: Shortening of duration of labour. Effect of labour analgesia. Monitoring of the events during labour. Lowering the incidence of operative deliveries. METHODS: 100 cases primi pregnant women admitted in labour room are randomly selected. It is designed to apply to low risk primi parous, singleton cephalic presentation without evidence of CPD and spontaneous onset of labour. RESULTS: Shortened duration of all the stages of Labour, especially significant reduction in duration of active phase of labour. CONCLUSION: The programmed labour is simple easy and effective method for painless and safe delivery.

  7. Quantitative analysis of the anti-proliferative activity of combinations of selected iron-chelating agents and clinically used anti-neoplastic drugs.

    Directory of Open Access Journals (Sweden)

    Eliska Potuckova

    Full Text Available Recent studies have demonstrated that several chelators possess marked potential as potent anti-neoplastic drugs and as agents that can ameliorate some of the adverse effects associated with standard chemotherapy. Anti-cancer treatment employs combinations of several drugs that have different mechanisms of action. However, data regarding the potential interactions between iron chelators and established chemotherapeutics are lacking. Using estrogen receptor-positive MCF-7 breast cancer cells, we explored the combined anti-proliferative potential of four iron chelators, namely: desferrioxamine (DFO, salicylaldehyde isonicotinoyl hydrazone (SIH, (E-N'-[1-(2-hydroxy-5-nitrophenylethyliden] isonicotinoyl hydrazone (NHAPI, and di-2-pyridylketone 4,4-dimethyl-3-thiosemicarbazone (Dp44mT, plus six selected anti-neoplastic drugs. These six agents are used for breast cancer treatment and include: paclitaxel, 5-fluorouracil, doxorubicin, methotrexate, tamoxifen and 4-hydroperoxycyclophosphamide (an active metabolite of cyclophosphamide. Our quantitative chelator-drug analyses were designed according to the Chou-Talalay method for drug combination assessment. All combinations of these agents yielded concentration-dependent, anti-proliferative effects. The hydrophilic siderophore, DFO, imposed antagonism when used in combination with all six anti-tumor agents and this antagonistic effect increased with increasing dose. Conversely, synergistic interactions were observed with combinations of the lipophilic chelators, NHAPI or Dp44mT, with doxorubicin and also the combinations of SIH, NHAPI or Dp44mT with tamoxifen. The combination of Dp44mT with anti-neoplastic agents was further enhanced following formation of its redox-active iron and especially copper complexes. The most potent combinations of Dp44mT and NHAPI with tamoxifen were confirmed as synergistic using another estrogen receptor-expressing breast cancer cell line, T47D, but not estrogen receptor

  8. Quantitative analysis of the anti-proliferative activity of combinations of selected iron-chelating agents and clinically used anti-neoplastic drugs.

    Science.gov (United States)

    Potuckova, Eliska; Jansova, Hana; Machacek, Miloslav; Vavrova, Anna; Haskova, Pavlina; Tichotova, Lucie; Richardson, Vera; Kalinowski, Danuta S; Richardson, Des R; Simunek, Tomas

    2014-01-01

    Recent studies have demonstrated that several chelators possess marked potential as potent anti-neoplastic drugs and as agents that can ameliorate some of the adverse effects associated with standard chemotherapy. Anti-cancer treatment employs combinations of several drugs that have different mechanisms of action. However, data regarding the potential interactions between iron chelators and established chemotherapeutics are lacking. Using estrogen receptor-positive MCF-7 breast cancer cells, we explored the combined anti-proliferative potential of four iron chelators, namely: desferrioxamine (DFO), salicylaldehyde isonicotinoyl hydrazone (SIH), (E)-N'-[1-(2-hydroxy-5-nitrophenyl)ethyliden] isonicotinoyl hydrazone (NHAPI), and di-2-pyridylketone 4,4-dimethyl-3-thiosemicarbazone (Dp44mT), plus six selected anti-neoplastic drugs. These six agents are used for breast cancer treatment and include: paclitaxel, 5-fluorouracil, doxorubicin, methotrexate, tamoxifen and 4-hydroperoxycyclophosphamide (an active metabolite of cyclophosphamide). Our quantitative chelator-drug analyses were designed according to the Chou-Talalay method for drug combination assessment. All combinations of these agents yielded concentration-dependent, anti-proliferative effects. The hydrophilic siderophore, DFO, imposed antagonism when used in combination with all six anti-tumor agents and this antagonistic effect increased with increasing dose. Conversely, synergistic interactions were observed with combinations of the lipophilic chelators, NHAPI or Dp44mT, with doxorubicin and also the combinations of SIH, NHAPI or Dp44mT with tamoxifen. The combination of Dp44mT with anti-neoplastic agents was further enhanced following formation of its redox-active iron and especially copper complexes. The most potent combinations of Dp44mT and NHAPI with tamoxifen were confirmed as synergistic using another estrogen receptor-expressing breast cancer cell line, T47D, but not estrogen receptor-negative MDA

  9. Chemosensitivity assay in mice prostate tumor: Preliminary report of flow cytometry, DNA fragmentation, ion ratiometric methods of anti-neoplastic drug monitoring

    Directory of Open Access Journals (Sweden)

    Kline Richard

    2004-03-01

    Full Text Available Abstract Flow cytometry, DNA fragmentation, ion ratiomateric analysis and NMR peaks characterized drug chemosensitivity of antineoplastic drugs. Hypotheses were: 1. The chemosensitive effect of different cancer cell lines is characteristic; 2. DNA fragmentation, ion ratiometric analysis suggest apoptosis status of tumor cells. Methods PC-3 cell lines were compared with DU-145, LNCaP cell lines in culture for the [Na]i and [Ca]i ion sensing dyes, cell death, NMR peaks and apoptosis staining for chemotherapeutic action of different drugs. Results DNA fragmentation, ratiometric ions and fluorescence endlabelling plots were characteristic for cell lines and drug response. 31P-23Na NMR spectra showed characteristic high phospho-choline and sodium peaks. Conclusion Flow cytometry, DNA fragmentation, ion ratiometric methods and NMR peaks indicated apoptosis and offered in vivo drug monitoring method.

  10. Protocols for Robotic Telescope Networks

    Directory of Open Access Journals (Sweden)

    Alain Klotz

    2010-01-01

    This paper is addressed to astronomers who are not specialists in computer science. We give explanations of some basic and advanced protocols to receive events and how to implement them in a robotic observatory software. We describe messages such as GCN notices, VOEvents or RTML, and protocols such as CGI, HTTP, SOAP, RSS, and XMPP.

  11. Protocols for Scholarly Communication

    Science.gov (United States)

    Pepe, A.; Yeomans, J.

    2007-10-01

    CERN, the European Organization for Nuclear Research, has operated an institutional preprint repository for more than 10 years. The repository contains over 850,000 records of which more than 450,000 are full-text OA preprints, mostly in the field of particle physics, and it is integrated with the library's holdings of books, conference proceedings, journals and other grey literature. In order to encourage effective propagation and open access to scholarly material, CERN is implementing a range of innovative library services into its document repository: automatic keywording, reference extraction, collaborative management tools and bibliometric tools. Some of these services, such as user reviewing and automatic metadata extraction, could make up an interesting testbed for future publishing solutions and certainly provide an exciting environment for e-science possibilities. The future protocol for scientific communication should guide authors naturally towards OA publication, and CERN wants to help reach a full open access publishing environment for the particle physics community and related sciences in the next few years.

  12. Internet Protocol Television (IPTV

    Directory of Open Access Journals (Sweden)

    Lokesh Mittal

    2012-09-01

    Full Text Available IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same infrastructure. IPTV is not the Internet Video that simply allows users to watch videos, like movie previews and web-cams, over the Internet in a best effort fashion. IPTV technology offers revenue-generating opportunities for the telecom and cable service providers. For traditional telephone service providers, Triple Play is delivered using a combination of optical fiber and Digital Subscriber Line (DSL technologies to its residential base. IPTV is a system where a digital television service is delivered by using Internet Protocol over a network infrastructure, which may include delivery by a broadband connection. A general definition of IPTV is television content that, instead of being delivered through traditional broadcast and cable formats, is received by the viewer through the technologies used for computer networks. In this paper I am trying to discuss this topic as my knowledge, including what is IPTV, how it works, its advantages and its applications

  13. Uncaria tomentosa exerts extensive anti-neoplastic effects against the Walker-256 tumour by modulating oxidative stress and not by alkaloid activity.

    Directory of Open Access Journals (Sweden)

    Arturo Alejandro Dreifuss

    Full Text Available This study aimed to compare the anti-neoplastic effects of an Uncaria tomentosa (UT brute hydroethanolic (BHE extract with those of two fractions derived from it. These fractions are choroformic (CHCl3 and n-butanolic (BuOH, rich in pentacyclic oxindole alkaloids (POA and antioxidant substances, respectively. The cancer model was the subcutaneous inoculation of Walker-256 tumour cells in the pelvic limb of male Wistar rat. Subsequently to the inoculation, gavage with BHE extract (50 mg.kg(-1 or its fractions (as per the yield of the fractioning process or vehicle (Control was performed during 14 days. Baseline values, corresponding to individuals without tumour or treatment with UT, were also included. After treatment, tumour volume and mass, plasma biochemistry, oxidative stress in liver and tumour, TNF-α level in liver and tumour homogenates, and survival rates were analysed. Both the BHE extract and its BuOH fraction successfully reduced tumour weight and volume, and modulated anti-oxidant systems. The hepatic TNF-α level indicated a greater effect from the BHE extract as compared to its BuOH fraction. Importantly, both the BHE extract and its BuOH fraction increased the survival time of the tumour-bearing animals. Inversely, the CHCl3 fraction was ineffective. These data represent an in vivo demonstration of the importance of the modulation of oxidative stress as part of the anti-neoplastic activity of UT, as well as constitute evidence of the lack of activity of isolated POAs in the primary tumour of this tumour lineage. These effects are possibly resulting from a synergic combination of substances, most of them with antioxidant properties.

  14. Cellular uptake mechanism and comparative evaluation of antineoplastic effects of paclitaxel–cholesterol lipid emulsion on triple-negative and non-triple-negative breast cancer cell lines

    Science.gov (United States)

    Ye, Jun; Xia, Xuejun; Dong, Wujun; Hao, Huazhen; Meng, Luhua; Yang, Yanfang; Wang, Renyun; Lyu, Yuanfeng; Liu, Yuling

    2016-01-01

    There is no effective clinical therapy for triple-negative breast cancers (TNBCs), which have high low-density lipoprotein (LDL) requirements and express relatively high levels of LDL receptors (LDLRs) on their membranes. In our previous study, a novel lipid emulsion based on a paclitaxel–cholesterol complex (PTX-CH Emul) was developed, which exhibited improved safety and efficacy for the treatment of TNBC. To date, however, the cellular uptake mechanism and intracellular trafficking of PTX-CH Emul have not been investigated. In order to offer powerful proof for the therapeutic effects of PTX-CH Emul, we systematically studied the cellular uptake mechanism and intracellular trafficking of PTX-CH Emul and made a comparative evaluation of antineoplastic effects on TNBC (MDA-MB-231) and non-TNBC (MCF7) cell lines through in vitro and in vivo experiments. The in vitro antineoplastic effects and in vivo tumor-targeting efficiency of PTX-CH Emul were significantly more enhanced in MDA-MB-231-based models than those in MCF7-based models, which was associated with the more abundant expression profile of LDLR in MDA-MB-231 cells. The results of the cellular uptake mechanism indicated that PTX-CH Emul was internalized into breast cancer cells through the LDLR-mediated internalization pathway via clathrin-coated pits, localized in lysosomes, and then released into the cytoplasm, which was consistent with the internalization pathway and intracellular trafficking of native LDL. The findings of this paper further confirm the therapeutic potential of PTX-CH Emul in clinical applications involving TNBC therapy. PMID:27601899

  15. Cellular uptake mechanism and comparative evaluation of antineoplastic effects of paclitaxel-cholesterol lipid emulsion on triple-negative and non-triple-negative breast cancer cell lines.

    Science.gov (United States)

    Ye, Jun; Xia, Xuejun; Dong, Wujun; Hao, Huazhen; Meng, Luhua; Yang, Yanfang; Wang, Renyun; Lyu, Yuanfeng; Liu, Yuling

    2016-01-01

    There is no effective clinical therapy for triple-negative breast cancers (TNBCs), which have high low-density lipoprotein (LDL) requirements and express relatively high levels of LDL receptors (LDLRs) on their membranes. In our previous study, a novel lipid emulsion based on a paclitaxel-cholesterol complex (PTX-CH Emul) was developed, which exhibited improved safety and efficacy for the treatment of TNBC. To date, however, the cellular uptake mechanism and intracellular trafficking of PTX-CH Emul have not been investigated. In order to offer powerful proof for the therapeutic effects of PTX-CH Emul, we systematically studied the cellular uptake mechanism and intracellular trafficking of PTX-CH Emul and made a comparative evaluation of antineoplastic effects on TNBC (MDA-MB-231) and non-TNBC (MCF7) cell lines through in vitro and in vivo experiments. The in vitro antineoplastic effects and in vivo tumor-targeting efficiency of PTX-CH Emul were significantly more enhanced in MDA-MB-231-based models than those in MCF7-based models, which was associated with the more abundant expression profile of LDLR in MDA-MB-231 cells. The results of the cellular uptake mechanism indicated that PTX-CH Emul was internalized into breast cancer cells through the LDLR-mediated internalization pathway via clathrin-coated pits, localized in lysosomes, and then released into the cytoplasm, which was consistent with the internalization pathway and intracellular trafficking of native LDL. The findings of this paper further confirm the therapeutic potential of PTX-CH Emul in clinical applications involving TNBC therapy. PMID:27601899

  16. Uncaria tomentosa exerts extensive anti-neoplastic effects against the Walker-256 tumour by modulating oxidative stress and not by alkaloid activity.

    Science.gov (United States)

    Dreifuss, Arturo Alejandro; Bastos-Pereira, Amanda Leite; Fabossi, Isabella Aviles; Lívero, Francislaine Aparecida Dos Reis; Stolf, Aline Maria; Alves de Souza, Carlos Eduardo; Gomes, Liana de Oliveira; Constantin, Rodrigo Polimeni; Furman, Aline Emmer Ferreira; Strapasson, Regiane Lauriano Batista; Teixeira, Simone; Zampronio, Aleksander Roberto; Muscará, Marcelo Nicolás; Stefanello, Maria Elida Alves; Acco, Alexandra

    2013-01-01

    This study aimed to compare the anti-neoplastic effects of an Uncaria tomentosa (UT) brute hydroethanolic (BHE) extract with those of two fractions derived from it. These fractions are choroformic (CHCl3) and n-butanolic (BuOH), rich in pentacyclic oxindole alkaloids (POA) and antioxidant substances, respectively. The cancer model was the subcutaneous inoculation of Walker-256 tumour cells in the pelvic limb of male Wistar rat. Subsequently to the inoculation, gavage with BHE extract (50 mg.kg(-1)) or its fractions (as per the yield of the fractioning process) or vehicle (Control) was performed during 14 days. Baseline values, corresponding to individuals without tumour or treatment with UT, were also included. After treatment, tumour volume and mass, plasma biochemistry, oxidative stress in liver and tumour, TNF-α level in liver and tumour homogenates, and survival rates were analysed. Both the BHE extract and its BuOH fraction successfully reduced tumour weight and volume, and modulated anti-oxidant systems. The hepatic TNF-α level indicated a greater effect from the BHE extract as compared to its BuOH fraction. Importantly, both the BHE extract and its BuOH fraction increased the survival time of the tumour-bearing animals. Inversely, the CHCl3 fraction was ineffective. These data represent an in vivo demonstration of the importance of the modulation of oxidative stress as part of the anti-neoplastic activity of UT, as well as constitute evidence of the lack of activity of isolated POAs in the primary tumour of this tumour lineage. These effects are possibly resulting from a synergic combination of substances, most of them with antioxidant properties.

  17. AN IMPROVED AUTHENTICATED KEY AGREEMENT PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    In 1999, Seo and Sweeney proposed a simple authenticated key agreement protocol that was designed to act as a Diffie-Hellman key agreement protocol with user authentication.Various attacks on this protocol are described and enhanced in the literature. Recently, Ku and Wang proposed an improved authenticated key agreement protocol, where they asserted the protocol could withstand the existing attacks. This paper shows that Ku and Wang's protocol is still vulnerable to the modification attack and presents an improved authenticated key agreement protocol to enhance the security of Ku and Wang's protocol. The protocol has more efficient performance by replacing exponentiation operations with message authentication code operations.

  18. SIP protocol model for OMNET++

    Directory of Open Access Journals (Sweden)

    Jan Kucerak

    2016-01-01

    Full Text Available The article describes our new SIP protocol implementation for the OMNeT++ simulation framework. OMNeT++ simulation framework provides an extensive support of IP related protocols, nevertheless a working SIP protocol implementation is missing. Real measurements were also done using a SIPp traffic generator and the results are compared to those obtained by our new SIP model. Since this work is a part of bigger project concerned strictly on measuring "first response times" over networks with a faulty transmission links, the actually collected statistics are focused only this way.

  19. Dynamic random channel reservation protocol

    Institute of Scientific and Technical Information of China (English)

    Ren Yanying; Zhang Wenjun; Yu Songyu

    2005-01-01

    Demand assignment MAC protocols have been used widely in wireless networks. It can effectively utilize wireless bandwidth. Some strategies can be used by demand assignment MAC protocols to further improve their efficiency. The concept of transmit probability is introduced. This concept allows a request slot to be assigned to many different traffic classes at the same time. Based on it, the dynamic random channel reservation (DRCR) protocol is proposed. The DRCR protocol operates dynamically by observing the traffic conditions. It uses information about the recent traffic conditions to assign transmit probability with which an mobile station can select request slots with lower traffic. The performance of DRCR is evaluated and compared with RSCA. The results show that DRCR is more stable than RSCA, it offers shorter delays of requests than RSCA and can relieve heavily stressed traffic classes faster than RSCA.

  20. National Elk Refuge vaccination protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Proposal by the State of Wyoming, Wyoming Game and Fish Department, to vaccinate elk on the National Elk Refuge. The proposal provides a protocol for vaccinating...

  1. Automatic Sequencing for Experimental Protocols

    Science.gov (United States)

    Hsieh, Paul F.; Stern, Ivan

    We present a paradigm and implementation of a system for the specification of the experimental protocols to be used for the calibration of AXAF mirrors. For the mirror calibration, several thousand individual measurements need to be defined. For each measurement, over one hundred parameters need to be tabulated for the facility test conductor and several hundred instrument parameters need to be set. We provide a high level protocol language which allows for a tractable representation of the measurement protocol. We present a procedure dispatcher which automatically sequences a protocol more accurately and more rapidly than is possible by an unassisted human operator. We also present back-end tools to generate printed procedure manuals and database tables required for review by the AXAF program. This paradigm has been tested and refined in the calibration of detectors to be used in mirror calibration.

  2. Improved Authenticated Multi-Key Agreement Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hua; YUAN Zheng; WEN Qiaoyan

    2006-01-01

    Zhou et al give an attack on Harn's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack.

  3. Self-Healing Protocol Implementations

    OpenAIRE

    Tschudin, Christian; Yamamoto, Lidia

    2005-01-01

    Current studies on self-configuring and adaptive networks aim at developing specific and fixed protocols which are able to optimize their configuration in a variable network environment. In this talk we study the problem where the protocols need to cope with a defective execution, including the lossy execution or the injection of foreign code. One guiding question will be the creation of robust execution circuits which can distribute over a network and which continue their service despite par...

  4. Secure E-payment Protocol

    Directory of Open Access Journals (Sweden)

    Sattar J Aboud

    2009-11-01

    Full Text Available The vast spreading of information in the last decade has led to greatdevelopment in e-commerce. For instance, e-trade and e-bank are two mainInternet services that implement e-transaction from anyplace in the world. Thishelps merchant and bank to ease the financial transaction process and to giveuser friendly services at any time. However, the cost of workers andcommunications falls down considerably while the cost of trusted authority andprotecting information is increased. E-payment is now one of the most centralresearch areas in e-commerce, mainly regarding online and offline paymentscenarios. In this paper, we will discuss an important e-payment protocol namelyKim and Lee scheme examine its advantages and delimitations, whichencourages the author to develop more efficient scheme that keeping allcharacteristics intact without concession of the security robustness of theprotocol. The suggest protocol employs the idea of public key encryption schemeusing the thought of hash chain. We will compare the proposed protocol with Kimand Lee protocol and demonstrate that the proposed protocol offers moresecurity and efficiency, which makes the protocol workable for real worldservices.

  5. Analysis of the Utilization of Antineoplastic Chinese Patent Medicine in Our Hospital during the Period of 2008-2011%我院2008-2011年抗肿瘤口服中成药使用分析

    Institute of Scientific and Technical Information of China (English)

    郭玉霞; 张磊; 齐伟; 吴志恒

    2012-01-01

    OBJECTIVE: To evaluate the status quo of the utilization of antineoplastic Chinese patent medicine in our hospital and to promote rational use of drugs. METHODS: The consumption sum, DDDs.DDC and DUI of antineoplastic Chinese patent medicine in our hospital during the period of 2008—2010 were analyzed statistically. RESULTS: The variety of antineoplastic Chinese patent medicine in our hospital was stable during 2008—2011, the consumption sum of drugs increased year by year, suitable price and effective therapeutic efficacy of Chinese patent medicine took the lead on the list of DDDs and DDC. CONCLUSION: In our hospital, the utilization of antineoplastic Chinese patent medicine is rational on the whole. Comprehensive considerations including good effect and reasonable cost should be taken into account during clinical drug use.%目的:评价我院抗肿瘤口服中成药的使用现状,促进合理用药.方法:对我院2008-2011年抗肿瘤口服中成药的销售金额、用药频度(DDDs)、日用药金额(DDC)、药物利用指数(DUI)进行排序和分析.结果:我院2008-2011年抗肿瘤口服中成药品种基本固定,销售金额呈逐年上升趋势,疗效确切、价格适中的中成药DDDs、DDC、DUI排序靠前.结论:我院抗肿瘤中成药的应用基本合理,在临床用药过程中要综合考虑疗效和经济两方面.

  6. Protocols.io: Virtual Communities for Protocol Development and Discussion

    Science.gov (United States)

    Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L.

    2016-01-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  7. Protocols.io: Virtual Communities for Protocol Development and Discussion.

    Science.gov (United States)

    Teytelman, Leonid; Stoliartchouk, Alexei; Kindler, Lori; Hurwitz, Bonnie L

    2016-08-01

    The detailed know-how to implement research protocols frequently remains restricted to the research group that developed the method or technology. This knowledge often exists at a level that is too detailed for inclusion in the methods section of scientific articles. Consequently, methods are not easily reproduced, leading to a loss of time and effort by other researchers. The challenge is to develop a method-centered collaborative platform to connect with fellow researchers and discover state-of-the-art knowledge. Protocols.io is an open-access platform for detailing, sharing, and discussing molecular and computational protocols that can be useful before, during, and after publication of research results. PMID:27547938

  8. Dexamethasone-(C21-phosphoramide)-[anti-EGFR]: molecular design, synthetic organic chemistry reactions, and antineoplastic cytotoxic potency against pulmonary adenocarcinoma (A549)

    Science.gov (United States)

    Coyne, Cody P; Narayanan, Lakshmi

    2016-01-01

    Purpose Corticosteroids are effective in the management of a variety of disease states, such as several forms of neoplasia (leukemia and lymphoma), autoimmune conditions, and severe inflammatory responses. Molecular strategies that selectively “target” delivery of corticosteroids minimize or prevents large amounts of the pharmaceutical moiety from passively diffusing into normal healthy cell populations residing within tissues and organ systems. Materials and methods The covalent immunopharmaceutical, dexamethasone-(C21-phosphoramide)-[anti-EGFR] was synthesized by reacting dexamethasone-21-monophosphate with a carbodiimide reagent to form a dexamethasone phosphate carbodiimide ester that was subsequently reacted with imidazole to create an amine-reactive dexamethasone-(C21-phosphorylimidazolide) intermediate. Monoclonal anti-EGFR immunoglobulin was combined with the amine-reactive dexamethasone-(C21-phosphorylimidazolide) intermediate, resulting in the synthesis of the covalent immunopharmaceutical, dexamethasone-(C21-phosphoramide)-[anti-EGFR]. Following spectrophotometric analysis and validation of retained epidermal growth factor receptor type 1 (EGFR)-binding avidity by cell-ELISA, the selective anti-neoplasic cytotoxic potency of dexamethasone-(C21-phosphoramide)-[anti-EGFR] was established by MTT-based vitality stain methodology using adherent monolayer populations of human pulmonary adenocarcinoma (A549) known to overexpress the tropic membrane receptors EGFR and insulin-like growth factor receptor type 1. Results The dexamethasone:IgG molar-incorporation-index for dexamethasone-(C21-phosphoramide)-[anti-EGFR] was 6.95:1 following exhaustive serial microfiltration. Cytotoxicity analysis: covalent bonding of dexamethasone to monoclonal anti-EGFR immunoglobulin did not significantly modify the ex vivo antineoplastic cytotoxicity of dexamethasone against pulmonary adenocarcinoma at and between the standardized dexamethasone equivalent concentrations of 10

  9. Cryptographic Protocols under Quantum Attacks

    CERN Document Server

    Lunemann, Carolin

    2011-01-01

    The realm of this thesis is cryptographic protocol theory in the quantum world. We study the security of quantum and classical protocols against adversaries that are assumed to exploit quantum effects to their advantage. Security in the quantum world means that quantum computation does not jeopardize the assumption, underlying the protocol construction. But moreover, we encounter additional setbacks in the security proofs, which are mostly due to the fact that some well-known classical proof techniques are forbidden by certain properties of a quantum environment. Interestingly, we can exploit some of the very same properties to the benefit of quantum cryptography. Thus, this work lies right at the heart of the conflict between highly potential effects but likewise rather demanding conditions in the quantum world.

  10. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus;

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... string model. While our protocol is classical, it is sound against a cheating unbounded quantum prover and computational zero-knowledge even if the verifier is allowed a superposition attack. Finally, we consider multiparty computation and show that for the most general type of attack, simulation based...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  11. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    a concrete protocol by Blumberg et al. using one-way functions and commitments for providing various location based vehicle services, and report on our ndings and experience of carrying out its analysis using the ProVerif tool. Third, we make an abstract model of the powerful simulation-based Universally...... Compos- able framework by Canetti for specifying and analysing protocols, and show that our model is sound with respect to its standard computational interpretation. Our model supports powerful primitives such as homomorphic encryption and non-interactive zero-knowledge proofs, which we show may be used...... to implement several interesting two-party functionalities. As a case study we use the ProVerif tool to analyse an oblivious transfer protocol by Damgard et al. under static corruption...

  12. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  13. The Kyoto protocol development; La viabilite du protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    Cooper, R. [Harvard Univ., Barrow, AK (United States); Guesneris, R. [College de France, 75 - Paris (France)

    2002-04-01

    From the author R. Cooper point of view the Kyoto Protocol is a flawed concept. The reasons for dropping Kyoto are presented in this paper insisting that rejecting Kyoto not means to imply that global climate change is not a serious problem. After a presentation of the US policy facing the Climatic Change, some concluding propositions are proposed. (A.L.B.)

  14. Additional protocol experience in Romania

    International Nuclear Information System (INIS)

    Full text: National Commission for Nuclear Activities Control (CNCAN) is the national regulatory body with regulation, authorization and control responsibilities. CNCAN has the right and obligation to ensure that safeguards are applied, in accordance with the terms of the safeguards agreement, on all source or special fissionable material in all peaceful nuclear activities within the State, under its jurisdiction or carried out under its control anywhere, for the exclusive purpose of verifying that such material is not diverted to nuclear weapons or other nuclear explosive devices. CNCAN has built a strong primary and secondary legislation in order to have a strong legal framework to fulfill the NPT, Safeguards Agreement and Additional Protocol requirements. In respect of the non-proliferation issues CNCAN has as a major goal to strengthen the effectiveness and to improve the efficiency of the safeguards system. Also closer co-operation between the IAEA and CNCAN as coordinator of the national system of accounting for and control of nuclear material has been developed by organizing international and national seminars on the implementation of safeguards and the additional protocol. After the entry into force of the Additional Protocol, CNCAN prepared appropriate declarations and answers to the relevant IAEA questions in order to obtain a drawn conclusion of the absence of undeclared nuclear material and nuclear activities within Romania territory. The IAEA evaluated in Romania not only the results of its nuclear material related activities under the Safeguards Agreement but also the results of its broader, more qualitative, evaluation and verification activities under the Additional Protocol. CNCAN assured that the IAEA inspectors have complementary access according to the Additional Protocol as requested in accordance with the provisions of the Safeguards Agreement and the Additional Protocol and cooperated in resolving in a timely manner, any questions or

  15. Synthesis, characterization, and in vitro anti-neoplastic activity of novel vic-dioximes bearing thiosemicarbazone side groups and their mononuclear complexes.

    Science.gov (United States)

    Babahan, İlknur; Özmen, Ali; Orhan, Nil; Kazar, Didem; Değirmenci, Esin Hafize

    2014-04-01

    Two novel vicinal dioxime ligands containing thiosemicarbazone units, (2E)-2-[4-(diethylamino)benzylidene]-N-[(1Z,2E)-N-hydroxy-2-(hydroxyimino)ethanimidoyl]hydrazine carbothioamide (L(1)H2) and (2E)-2-[4-(dimethylamino)benzylidene]-N-[(1Z,2E)-N-hydroxy-2-(hydroxyimino)ethanimidoyl]hydrazinecarbothioamide (L(2)H2), were synthesized. Using the HL-60 human leukemia cell line, the in vitro anti-neoplastic activity of these thiosemicarbazone-oxime derivatives was evaluated. Mononuclear nickel(II), copper(II), and cobalt(II) complexes with a metal:ligand ratio of 1:2 for both the L(1)H2 and L(2)H2 ligands were also synthesized. To characterize these compounds, Fourier transform-infrared spectroscopy (FT-IR), mass spectrometry (MS), magnetic susceptibility measurements, (1)H and (13)C nuclear magnetic resonance (NMR), ultraviolet-visible (UV-Vis) absorption spectroscopy, heteronuclear multiple-bond correlation (HMQC), and elemental analysis were performed. For L(1)H2, L(2)H2, and each of their derivatives, antiproliferative effects against HL-60 cells were exhibited and the associated IpC50 values ranged from 5μM to 20μM. Furthermore, L(1)H2 and its derivatives inhibited the proliferation of HL-60 cells more effectively than L(2)H2, and 5μM [Cu(L(1)H)2] exhibited the strongest antiproliferative activity. PMID:24651042

  16. Identification of differential anti-neoplastic activity of copper bis(thiosemicarbazones) that is mediated by intracellular reactive oxygen species generation and lysosomal membrane permeabilization.

    Science.gov (United States)

    Stefani, Christian; Al-Eisawi, Zaynab; Jansson, Patric J; Kalinowski, Danuta S; Richardson, Des R

    2015-11-01

    Bis(thiosemicarbazones) and their copper (Cu) complexes possess unique anti-neoplastic properties. However, their mechanism of action remains unclear. We examined the structure-activity relationships of twelve bis(thiosemicarbazones) to elucidate factors regarding their anti-cancer efficacy. Importantly, the alkyl substitutions at the diimine position of the ligand backbone resulted in two distinct groups, namely, unsubstituted/monosubstituted and disubstituted bis(thiosemicarbazones). This alkyl substitution pattern governed their: (1) Cu(II/I) redox potentials; (2) ability to induce cellular (64)Cu release; (3) lipophilicity; and (4) anti-proliferative activity. The potent anti-cancer Cu complex of the unsubstituted bis(thiosemicarbazone) analog, glyoxal bis(4-methyl-3-thiosemicarbazone) (GTSM), generated intracellular reactive oxygen species (ROS), which was attenuated by Cu sequestration by a non-toxic Cu chelator, tetrathiomolybdate, and the anti-oxidant, N-acetyl-l-cysteine. Fluorescence microscopy suggested that the anti-cancer activity of Cu(GTSM) was due, in part, to lysosomal membrane permeabilization (LMP). For the first time, this investigation highlights the role of ROS and LMP in the anti-cancer activity of bis(thiosemicarbazones).

  17. Identification of differential anti-neoplastic activity of copper bis(thiosemicarbazones) that is mediated by intracellular reactive oxygen species generation and lysosomal membrane permeabilization.

    Science.gov (United States)

    Stefani, Christian; Al-Eisawi, Zaynab; Jansson, Patric J; Kalinowski, Danuta S; Richardson, Des R

    2015-11-01

    Bis(thiosemicarbazones) and their copper (Cu) complexes possess unique anti-neoplastic properties. However, their mechanism of action remains unclear. We examined the structure-activity relationships of twelve bis(thiosemicarbazones) to elucidate factors regarding their anti-cancer efficacy. Importantly, the alkyl substitutions at the diimine position of the ligand backbone resulted in two distinct groups, namely, unsubstituted/monosubstituted and disubstituted bis(thiosemicarbazones). This alkyl substitution pattern governed their: (1) Cu(II/I) redox potentials; (2) ability to induce cellular (64)Cu release; (3) lipophilicity; and (4) anti-proliferative activity. The potent anti-cancer Cu complex of the unsubstituted bis(thiosemicarbazone) analog, glyoxal bis(4-methyl-3-thiosemicarbazone) (GTSM), generated intracellular reactive oxygen species (ROS), which was attenuated by Cu sequestration by a non-toxic Cu chelator, tetrathiomolybdate, and the anti-oxidant, N-acetyl-l-cysteine. Fluorescence microscopy suggested that the anti-cancer activity of Cu(GTSM) was due, in part, to lysosomal membrane permeabilization (LMP). For the first time, this investigation highlights the role of ROS and LMP in the anti-cancer activity of bis(thiosemicarbazones). PMID:26335599

  18. The Simplest Protocol for Oblivious Transfer

    DEFF Research Database (Denmark)

    Chou, Tung; Orlandi, Claudio

    2015-01-01

    Oblivious Transfer (OT) is the fundamental building block of cryptographic protocols. In this paper we describe the simplest and most efficient protocol for 1-out-of-n OT to date, which is obtained by tweaking the Diffie-Hellman key-exchange protocol. The protocol achieves UC-security against...... optimizations) is at least one order of magnitude faster than previous work. Category / Keywords: cryptographic protocols / Oblivious Transfer, UC Security, Elliptic Curves, Efficient Implementation...

  19. Analysis of the Transport Layer Security protocol

    OpenAIRE

    Firing, Tia Helene

    2010-01-01

    In this master thesis we have presented a security analysis of the TLS protocol with particular emphasis on the recently discovered renegotiation attack. From our security proof we get that the Handshake protocol with renegotiation, including the fix from IETF, is secure, and hence not vulnerable to the renegotiation attack anymore. We have also analysed the Handshake protocol with session resumption, and the Application data protocol together with the Record protocol. Both of these prot...

  20. Developing security protocols in χ-Spaces

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Milicia, Giuseppe

    2002-01-01

    It is of paramount importance that a security protocol effectively enforces the desired security requirements. The apparent simplicity of informal protocol descriptions hides the inherent complexity of their interactions which, often, invalidate informal correctness arguments and justify the effo......-Spaces aids several steps in the development of a security protocolprotocol executions can be simulated in hostile environments, a security protocol can be implemented, and security properties of implementations can be formally verified....

  1. Protocol biopsies for renal transplantation

    Directory of Open Access Journals (Sweden)

    Rush David

    2010-01-01

    Full Text Available Protocol biopsies in renal transplantation are those that are procured at predetermined times post renal transplantation, regardless of renal function. These biopsies have been useful to study the natural history of the transplanted kidney as they have detected unexpected - i.e. "subclinical" pathology. The most significant subclinical pathologies that have been detected with protocol biopsies have been acute lesions, such as cellular and antibody mediated rejection, and chronic lesions, such as interstitial fibrosis and tubular atrophy, and transplant glomerulopathy. The potential benefit of early recognition of the above lesions is that their early treatment may result in improved long-term outcomes. Conversely, the identification of normal histology on a protocol biopsy, may inform us about the safety of reduction in overall immunosuppression. Our centre, as well as others, is attempting to develop non-invasive methods of immune monitoring of renal transplant patients. However, we believe that until such methods have been developed and validated, the protocol biopsy will remain an indispensable tool for the complete care of renal transplant patients.

  2. Kyoto protocol on climate change

    International Nuclear Information System (INIS)

    This article reports a short overview of main points of Kyoto protocol to United Nations Framework Convention on climate Change and of some options still to be defined, evolutions of Italian emissions with respect to other European countries, check of decree by inter ministerial committee on economic planning on national plan to reduce emissions

  3. Performance Evaluation of Security Protocols

    DEFF Research Database (Denmark)

    Bodei, Chiara; Buchholtz, Mikael; Curti, Michele;

    2005-01-01

    We use a special operational semantics which drives us in inferring quantitative measures on systems describing cryptographis cryptographic protocols. We assign rates to transitions by only looking at these labels. The rates reflect the distributed architecture running applications and the use of...... of possibly different cryptosystems. We then map transition systems to Markov chains and evaluate performance of systems, using standard tools....

  4. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrate...

  5. From protocol to published report

    DEFF Research Database (Denmark)

    Berendt, Louise; Callréus, Torbjörn; Petersen, Lene Grejs;

    2016-01-01

    %) of the sample, and 87% (95% CI: 80 to 94%) of the trials were hospital based. CONCLUSIONS: Overall consistency between protocols and their corresponding published reports was low. Motivators for the inconsistencies are unknown but do not seem restricted to economic incentives....

  6. Improving the DGK comparison protocol

    NARCIS (Netherlands)

    Veugen, P.J.M.

    2012-01-01

    When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison pr

  7. The Kyoto Protocol and China

    Institute of Scientific and Technical Information of China (English)

    佘巧云

    2005-01-01

    The kyoto Protocol is an agreement to the United Nations Framework Convention on CLimate Change (UNFCCC)2,an international treaty on global warming .It is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by an average of 5.2% compared to the level of 1990 during the 2008-12 period.

  8. Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2004-01-01

    This paper introduces a process calculus with recursion which allows us to express an unbounded number of runs of the ping-pong protocols introduced by Dolev and Yao. We study the decidability issues associated with two common approaches to checking security properties, namely reachability analysis...

  9. Bundle Security Protocol for ION

    Science.gov (United States)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  10. Automata-theoretic protocol programming

    NARCIS (Netherlands)

    Jongmans, Sung-Shik Theodorus Quirinus

    2016-01-01

    Parallel programming has become essential for writing scalable programs on general hardware. Conceptually, every parallel program consists of workers, which implement primary units of sequential computation, and protocols, which implement the rules of interaction that workers must abide by. As progr

  11. A Student Teamwork Induction Protocol

    Science.gov (United States)

    Kamau, Caroline; Spong, Abigail

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in higher education. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group…

  12. Improvement In MAODV Protocol Using Location Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Kaur Sharnjeet

    2016-01-01

    Full Text Available Energy saving is difficult in wireless sensor network (WSN due to limited resources. Each node in WSN is constrained by their limited battery power for their energy. The energy is reduced as the time goes off due to the packet transmission and reception. Energy management techniques are necessary to minimize the total power consumption of all the nodes in the network in order to maximize its life span. Our proposed protocol Location based routing (LBR aimed to find a path which utilizes the minimum energy to transmit the packets between the source and the destination. The required energy for the transmission and reception of data is evaluated in MATLAB. LBR is implemented on Multicast Ad hoc On Demand Distance Vector Routing Protocol (MAODV to manage the energy consumption in the transmission and reception of data. Simulation results of LBR show the energy consumption has been reduced.

  13. Session Initiation Protocol Attacks and Challenges

    CERN Document Server

    Keshavarz, Hassan; Noor, Rafidah Md

    2012-01-01

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols. It is a text-based protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a strong enough signaling protocol on the internet for establishing, maintaining, and terminating session. In this paper the areas of security and attacks in SIP are discussed. We consider attacks from diverse related perspectives. The authentication schemes are compared, the representative existing solutions are highlighted, and several remaining research challenges are identified. Finally, the taxonomy of SIP threat will be presented.

  14. How to write a protocol: part 2.

    Science.gov (United States)

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical protocols play an important role in the provision of high-quality care in nuclear medicine. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. The following article is the second in a 2-part series on how to write a protocol. A framework for composing protocols and the components of clinical imaging protocols were detailed in the first article. This article details the framework and components of protocols for cardiac stress testing, therapy, and quality control. PMID:25655345

  15. Novel analysis and improvement of Yahalom protocol

    Institute of Scientific and Technical Information of China (English)

    CHEN Chun-ling; YU Han; L(U) Heng-shan; WANG Ru-chuan

    2009-01-01

    The modified version of Yahalom protocol improved by Burrows, Abradi, and Needham (BAN) still has security drawbacks. This study analyzed such flaws in a detailed way from the point of strand spaces, which is a novel method of analyzing protocol's security. First, a mathematical model of BAN-Yahalom protocol is constructed. Second, penetrators' abilities are restricted with a rigorous and formalized definition. Moreover, to increase the security of this protocol against potential attackers in practice, a further improvement is made to the protocol. Future application of this re-improved protocol is also discussed.

  16. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    Science.gov (United States)

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-09-08

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency.

  17. Implementation and evaluation of a protocol management system for automated review of CT protocols.

    Science.gov (United States)

    Grimes, Joshua; Leng, Shuai; Zhang, Yi; Vrieze, Thomas; McCollough, Cynthia

    2016-01-01

    Protocol review is important to decrease the risk of patient injury and increase the consistency of CT image quality. A large volume of CT protocols makes manual review labor-intensive, error-prone, and costly. To address these challenges, we have developed a software system for automatically managing and monitoring CT proto-cols on a frequent basis. This article describes our experiences in the implementation and evaluation of this protocol monitoring system. In particular, we discuss various strategies for addressing each of the steps in our protocol-monitoring workflow, which are: maintaining an accurate set of master protocols, retrieving protocols from the scanners, comparing scanner protocols to master protocols, reviewing flagged differences between the scanner and master protocols, and updating the scanner and/or master protocols. In our initial evaluation focusing only on abdo-men and pelvis protocols, we detected 309 modified protocols in a 24-week trial period. About one-quarter of these modified protocols were determined to contain inappropriate (i.e., erroneous) protocol parameter modifications that needed to be corrected on the scanner. The most frequently affected parameter was the series description, which was inappropriately modified 47 times. Two inappropriate modifications were made to the tube current, which is particularly important to flag as this parameter impacts both radiation dose and image quality. The CT protocol changes detected in this work provide strong motivation for the use of an automated CT protocol quality control system to ensure protocol accuracy and consistency. PMID:27685112

  18. Dexamethasone-(C21-phosphoramide-[anti-EGFR]: molecular design, synthetic organic chemistry reactions, and antineoplastic cytotoxic potency against pulmonary adenocarcinoma (A549

    Directory of Open Access Journals (Sweden)

    Coyne CP

    2016-08-01

    did not significantly modify the ex vivo antineoplastic cytotoxicity of dexamethasone against pulmonary adenocarcinoma at and between the standardized dexamethasone equivalent concentrations of 10-9 M and 10-5 M. Rapid increases in antineoplastic cytotoxicity were observed at and between the dexamethasone equivalent concentrations of 10-9 M and 10-7 M where cancer cell death increased from 7.7% to a maximum of 64.9% (92.3%–35.1% residual survival, respectively, which closely paralleled values for “free” noncovalently bound dexamethasone. Discussion: Organic chemistry reaction regimens were optimized to develop a multiphase synthesis regimen for dexamethasone-(C21-phosphoramide-[anti-EGFR]. Attributes of dexamethasone-(C21-phosphoramide-[anti-EGFR] include a high dexamethasone molar incorporation-index, lack of extraneous chemical group introduction, retained EGFR-binding avidity (“targeted” delivery properties, and potential to enhance long-term pharmaceutical moiety effectiveness. Keywords: dexamethasone, anti-EGFR, organic chemistry reactions, synthesis, selective “targeted” delivery, covalent immunopharmaceuticals, EGFR 

  19. Antineoplastic mechanism of Octreotide in human hepatoma%细胞凋亡-奥曲肽抑制人肝癌生长的机制的探讨

    Institute of Scientific and Technical Information of China (English)

    陈绪军; 刘志苏; 艾中立

    2001-01-01

    目的奥曲肽能抑制人肝癌的生长,其机制尚未明了,本研究旨在观察奥曲肽在体外能否诱导人肝癌细胞凋亡,以从诱导肿瘤细胞凋亡的角度来探讨其抑制人肝癌生长的机制.方法将奥曲肽作用体外培养的人肝癌细胞株,运用细胞化学染色(Hochesst 33 258),透射电子显微镜术,DNA琼脂糖电泳及流式细胞术(flow cytometry,FCM)等方法来检测凋亡.结果经0.2μg/ml的奥曲肽处理后,形态学上,BEL-7402肝癌细胞表现为细胞皱缩,核质浓缩、核碎裂,细胞起泡以及凋亡小体形成等凋亡特征性的形态学改变;生化学上,DNA琼脂糖电泳呈现为梯状带.经FCM定量发现,随着奥曲肽之浓度增高(0~2 μg/ml),凋亡细胞增多,而且凋亡率与奥曲肽的药物浓度呈正相关(r=0.809,P<0.05).结论在体外,奥曲肽可诱导人肝癌细胞凋亡,这可能为奥曲肽抑制人肝癌生长的机制.%Objectives To investigate whether apoptosis can be induced by Octreotide in human hepatoma cells in vitro and elucidate the antineoplastic mechanism of Octreotide in hepatoma.Methods A cultured human hepatoma cell line,BEL-7402,was exposed to Octreotide and apoptosis was evaluated by cytochemical staining(Hochesst 33258),transmission electron microscopy,agarose gel electrophoresis and flow cytometry(FCM).Results After exposure to 0.2 μg/ml Octreotide,apoptosis with nuclear chromatin condensation as well as fragmentation,cell shrinkage and the formation of apoptotic bodies was observed using cytochemical staining and transmission electron microscopy.A DNA ladder in agarose gel electrophoresis was also displayed.FCM showed that the apoptotic cell number rose with an increase in the concentration of Octreotide(0- 2 iμg/ml).There was a positive correlation between Octreotide concentration and apoptotic rate in BEL-7402 cells(r=0.809,P<0.05).Conclusion Apoptosis in human hepatoma cells can be induced by Octreotide,which may be related to the

  20. Kyoto: protocol on climate protection

    International Nuclear Information System (INIS)

    At the 3rd Conference of the Signatory States to the United Nations Climate Framework Convention held in Kyoto, the so-called Kyoto Protocol on the UN Climate Framework Convention was adopted unanimously, after two years of difficult and complex negotiations, on December 11, 1997. The protocol for the first time includes legally binding obligations for the industrialized countries requiring them to reduce their greenhouse gas emissions between 2008 and 2012 by a total of 5.2% relative to the 1990 level. In meeting this obligation, the industrialized countries assumed different levels of reduction and limitation, respectively. Thus, e.g., the EU countries accepted a Communitywide reduction by 8%, while the USA is obliged to reduce by 7% and Japan by 6%. (orig.)

  1. Neonatal euthanasia: The Groningen Protocol.

    Science.gov (United States)

    Vizcarrondo, Felipe E

    2014-11-01

    For the past thirty years, voluntary euthanasia and physician-assisted suicide of adult patients have been common practice in the Netherlands. Neonatal euthanasia was recently legalized in the Netherlands and the Groningen Protocol (GP) was developed to regulate the practice. Supporters claim compliance with the GP criteria makes neonatal euthanasia ethically permissible. An examination of the criteria used by the Protocol to justify the euthanasia of seriously ill neonates reveals the criteria are not based on firm moral principles. The taking of the life of a seriously ill person is not the solution to the pain and suffering of the dying process. It is the role of the medical professional to care for the ailing patient with love and compassion, always preserving the person's dignity. Neonatal euthanasia is not ethically permissible. PMID:25473136

  2. Chapter 14: Chiller Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Tiessen, A.

    2014-09-01

    This protocol defines a chiller measure as a project that directly impacts equipment within the boundary of a chiller plant. A chiller plant encompasses a chiller--or multiple chillers--and associated auxiliary equipment. This protocol primarily covers electric-driven chillers and chiller plants. It does not include thermal energy storage and absorption chillers fired by natural gas or steam, although a similar methodology may be applicable to these chilled water system components. Chillers provide mechanical cooling for commercial, institutional, multiunit residential, and industrial facilities. Cooling may be required for facility heating, ventilation, and air conditioning systems or for process cooling loads (e.g., data centers, manufacturing process cooling). The vapor compression cycle, or refrigeration cycle, cools water in the chilled water loop by absorbing heat and rejecting it to either a condensing water loop (water cooled chillers) or to the ambient air (air-cooled chillers).

  3. On using Mobile IP Protocols

    Directory of Open Access Journals (Sweden)

    Fayza A. Nada

    2006-01-01

    Full Text Available The recent advances in wireless communication technology and the unprecedented growth of the Internet have paved the way for wireless networking and IP mobility. Mobile Internet protocol has been designed within the IETF to support the mobility of users who wish to connect to the Internet and maintain communications as they move from place to place. This study describes and summarizes the current Internet draft for mobile IP (MIPv4 with its major components: agent discovery, registration and tunneling. In addition, we outline the available encapsulation techniques and route optimization procedure. In the end, we describe the design of the new protocol for transparent routing of IPv6 packets to mobile IPv6 nodes operating in the Internet.

  4. Building America House Simulation Protocols

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, Robert [National Renewable Energy Lab. (NREL), Golden, CO (United States); Engebrecht, Cheryn [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2010-09-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  5. A student teamwork induction protocol

    OpenAIRE

    Kamau, Caroline; Spong, A.

    2015-01-01

    Faulty group processes have harmful effects on performance but there is little research about intervention protocols to pre-empt them in HE. This naturalistic experiment compared a control cohort with an inducted cohort. The inducted cohort attended a workshop, consultations, elected a leader and used tools (a group log and group contract) designed to minimize social loafing, optimize coordination (by boosting good information sampling) and orient group dynamics towards the task. In the absen...

  6. Heuristic Methods for Security Protocols

    OpenAIRE

    Qurat ul Ain Nizamani; Emilio Tuosto

    2009-01-01

    Model checking is an automatic verification technique to verify hardware and software systems. However it suffers from state-space explosion problem. In this paper we address this problem in the context of cryptographic protocols by proposing a security property-dependent heuristic. The heuristic weights the state space by exploiting the security formulae; the weights may then be used to explore the state space when searching for attacks.

  7. Analysing Protocol Stacks for Services

    DEFF Research Database (Denmark)

    Gao, Han; Nielson, Flemming; Nielson, Hanne Riis

    2011-01-01

    We show an approach, CaPiTo, to model service-oriented applications using process algebras such that, on the one hand, we can achieve a certain level of abstraction without being overwhelmed by the underlying implementation details and, on the other hand, we respect the concrete industrial standa...... to the financial case study taken from Chapter 0-3. Finally, we develop a static analysis to analyse the security properties as they emerge at the level of concrete industrial protocols....

  8. Power Control Protocols in VANET

    OpenAIRE

    Samara, Ghassan; Salem, Amer O. Abu; Alhmiedat, Tareq

    2013-01-01

    Vehicular Ad hoc Networks (VANET) is one of the most challenging research area in the field of the Mobile Ad hoc Network (MANET), Power control is a critical issue in VANETwhere is should be managed carefully to help the channel to have high performance. In this paper a comparative study in the published protocols in the field of safety message dynamic power control will be presented and evaluated.

  9. Carcinogenicity of the antineoplastic agent, 5-(3,3-dimethyl-1-triazeno)-imidazole-4-carboxamide, and its metabolites in rats.

    Science.gov (United States)

    Beal, D D; Skibba, J L; Croft, W A; Cohen, S M; Bryan, G T

    1975-04-01

    Chronic oral administration of the antineoplastic agent, 5-(3,3-dimethyl-1-triazeno)imidazole-4-carboxamide (NSC-45388, DTIC), induced predominantly thymic and mammary tumors as demonstrated previously. Male and female Sprague-Dawley and female Buffalo rats were susceptible to the carcinogenicity of DTIC. A 50% incidence of mammary adenocarcinomas was induced in males within 18 weeks. Type of tumor and tumor incidence were dose dependent. Single and multiple intraperitoneal injections of DTIC did not alter organ specificity. DTIC-induced thymic lymphosarcomas and mammary adenocarcinomas were transplantable. Tissue distribution studies revealed no correlation between uptake of DTIC by a given tissue and its susceptibility to carcinogenicity. Metabolites of DTIC were tested for carcinogenic activity. Animals administered 5-diazoimidazole-4-carboxamide orally, intraperitoneally, or intragastrically developed low incidences of thymic, stomach, bladder, or mammary tumors. A low incidence of mammary tumors developed in rats fed 2-azahypoxanthine. A variety of tumors, including several ependymoblastomas, were induced in rats that received 5-aminoimidazole-4-carboxamide orally. 5-(3-Methyl-1-triazeno)imidazole-4-carboxamide (MTIC), when fed or given in single or multiple intraperitoneal injections, induced a high incidence of mammary adenofibromas and a low incidence of uterine leiomyosarcomas. Control rats had low incidences of mammary adenocarcinomas and adenofibromas after 52 weeks. These data show that the carcinogenic properties of DTIC resemble those of carcinogenic N-nitroso compounds, hydrazine, azo, and azoxy-alkanes and aryltriazenes and thus suggest similar mechanism(s) of action. These data also indicate that MTIC is involved in the induction of mammary adenofibromas and uterine leiomyosarcomas by DTIC.

  10. Antineoplastic Activity of Compound Recipe Xingqi Preparation%复方星芪制剂抗肿瘤活性的研究

    Institute of Scientific and Technical Information of China (English)

    任小巧; 侯凤飞; 高增平; 胡京红

    2012-01-01

    目的:探讨民间验方复方星芪制剂的抗肿瘤活性.方法:采用小鼠腋下接种肿瘤细胞法测定复方星芪制剂的抗肿瘤活性,MTT法测定复方星芪制剂提取物对小鼠脾细胞的增殖活性.结果:复方星芪方对移植性肿瘤(肉瘤S180和肝癌H22)具有显著的抑制作用,对小鼠脾细胞的增殖具有促进作用,并有较好的剂量依赖关系.结论:复方星芪制剂有抗肿瘤作用,其抗肿瘤作用可能与促进机体免疫有关.%Objective:To study the antineoplastic activity of compound recipe Xingqi preparation. Methods;Use tumor cells vaccination of mice armpit to determine anti-tumor activity and MTT method to determine proliferation activity for spleen cell. Results:The compound recipe Xingqi preparation has significant inhibitory action on portability tumor (sarcoma SI 80 and liver cancer H22) , but promoting effect for spleen cell proliferation and good dose-response relationship. Conclusion: The compound recipe Xingqi preparation has antitu-mor effect and its anti-tumor effects may be concerned with immunization promotion.

  11. Automatic analysis of distance bounding protocols

    CERN Document Server

    Malladi, Sreekanth; Kothapalli, Kishore

    2010-01-01

    Distance bounding protocols are used by nodes in wireless networks to calculate upper bounds on their distances to other nodes. However, dishonest nodes in the network can turn the calculations both illegitimate and inaccurate when they participate in protocol executions. It is important to analyze protocols for the possibility of such violations. Past efforts to analyze distance bounding protocols have only been manual. However, automated approaches are important since they are quite likely to find flaws that manual approaches cannot, as witnessed in literature for analysis pertaining to key establishment protocols. In this paper, we use the constraint solver tool to automatically analyze distance bounding protocols. We first formulate a new trace property called Secure Distance Bounding (SDB) that protocol executions must satisfy. We then classify the scenarios in which these protocols can operate considering the (dis)honesty of nodes and location of the attacker in the network. Finally, we extend the const...

  12. How to write a protocol: part 1.

    Science.gov (United States)

    Thomas, Kathy; Farrell, Mary Beth

    2015-03-01

    Clinical imaging protocols play an important role in the provision of high-quality care in nuclear medicine. It is imperative that all nuclear medicine facilities have protocols for every procedure performed. However, creating protocols that are detailed, unambiguous, and consistent is often easier said than done. Properly written protocols help to ensure that nuclear medicine procedures are performed in a standardized, reproducible manner so that patients receive high-quality care. This 2-part article provides technologists with a framework for composing comprehensive protocols. Part 1 discusses the secrets to successfully composing protocols ensuring they are detailed and step-by-step along with the importance of basing protocols on evidence from published guidelines and peer-reviewed literature. The components and important aspects of clinical imaging protocols are detailed. PMID:25613336

  13. A father protocol for quantum broadcast channels

    OpenAIRE

    Dupuis, Frédéric; Hayden, Patrick; Li, Ke

    2006-01-01

    A new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol is presented. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communica...

  14. Static Validation of a Voting Protocol

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde; Andersen, Esben Heltoft; Nielson, Hanne Riis

    2005-01-01

    The desired security properties of electronic voting protocols include verifiability, accuracy, democracy and fairness. In this paper we use a static program analysis tool to validate these properties for one of the classical voting protocols under appropriate assumptions. The protocol...... is formalised in an extension of the LySa process calculus with blinding signatures. The analysis, which is fully automatic, pinpoints previously undiscovered flaws related to verifiability and accuracy and we suggest modifications of the protocol needed for validating these properties....

  15. ACSEPP On-Line Electronic Payment Protocol

    Institute of Scientific and Technical Information of China (English)

    WANG Shao-bin; ZHU Xian; HONG Fan

    2004-01-01

    With analyzing the existing on-line electronic payment protocols, this paper presents a new on-line electronic payment protocol named ACSEPP: Anonymous, Convenient and Secure Electronic Payment Protocol.Its aim is to design a practical electronic payment protocol which is both secure and convenient.Without using PKI_CA frame, it realized the anonymity of consumer and merchant, the convenient of handling, the low cost of maintenance and the security.

  16. Component versioning for protocol configuration management

    Institute of Scientific and Technical Information of China (English)

    CHEN Tian-zhou; HE Zhen-jie; HUANG Jiang-wei; DAI Hong-jun

    2005-01-01

    Classical software configuration management which deals with source code versioning becomes insufficient when most components are distributed in binary form. As an important aspect of software configuration, protocol configuration also encounters those problems. This paper focuses on solving protocol component versioning issues for protocol configuration management on embedded system, incorporating the following versioning issues: version identification, version description and protocol component archiving and retrieving based on the version library.

  17. A father protocol for quantum broadcast channels

    CERN Document Server

    Dupuis, F; Dupuis, Fr\\'ed\\'eric; Hayden, Patrick

    2006-01-01

    We present a new protocol for quantum broadcast channels based on the fully quantum Slepian-Wolf protocol. The protocol yields an achievable rate region for entanglement-assisted transmission of quantum information through a quantum broadcast channel that can be considered the quantum analogue of Marton's region for classical broadcast channels. The protocol can be adapted to yield achievable rate regions for unassisted quantum communication and for entanglement-assisted classical communication. Regularized versions of all three rate regions are provably optimal.

  18. Bioinspired Security Analysis of Wireless Protocols

    DEFF Research Database (Denmark)

    Petrocchi, Marinella; Spognardi, Angelo; Santi, Paolo

    2016-01-01

    work, this paper investigates feasibility of adopting fraglets as model for specifying security protocols and analysing their properties. In particular, we give concrete sample analyses over a secure RFID protocol, showing evolution of the protocol run as chemical dynamics and simulating an adversary...

  19. Cryptanalysis on Cheng et al. protocol

    Science.gov (United States)

    Thakur, Tejeshwari

    2016-06-01

    Deployment of new node in any wireless sensor network is a sensitive task. This is the reason why, an Access Control Protocol is required in WSN. In this paper, we demonstrate that Access Control Protocol proposed by Cheng et al.[1] for Wireless Sensor Network is insecure. The reason is that this protocol fails to resist the active attack.

  20. Epidemic Protocols for Pervasive Computing Systems - Moving Focus from Architecture to Protocol

    DEFF Research Database (Denmark)

    Mogensen, Martin

    2009-01-01

    epidemic protocols as distribution mechanism for pervasive systems. The nature of epidemic protocols make them easy to implement, easy to deploy, and resilient to failures. By using epidemic protocols, it is possible to mitigate a wide range of the potential issues on the protocol layer. The result...

  1. Antineoplastic Activity of New Transition Metal Complexes of 6-Methylpyridine-2-carbaldehyde-N(4-ethylthiosemicarbazone: X-Ray Crystal Structures of [VO2(mpETSC] and [Pt(mpETSCCl

    Directory of Open Access Journals (Sweden)

    Shadia A. Elsayed

    2010-01-01

    Full Text Available New complexes of dioxovanadium(V, zinc(II, ruthenium(II, palladium(II, and platinum(II with 6-methylpyridine-2-carbaldehyde-N(4-ethylthiosemicarbazone (HmpETSC have been synthesized. The composition of these complexes is discussed on the basis of elemental analyses, IR, Raman, NMR (H1, C13, and P31, and electronic spectral data. The X-ray crystal structures of [VO2(mpETSC] and [Pt(mpETSCCl] are also reported. The HmpETSC and its [Zn(HmpETSCCl2] and [Pd(mpETSCCl] complexes exhibit antineoplastic activity against colon cancer human cell lines (HCT 116.

  2. Optimizing One Fair Document Exchange Protocol

    CERN Document Server

    Alaraj, Abdullah M

    2012-01-01

    This paper presents an efficient fair document exchange protocol. The exchange of the documents will be between two parties. The protocol is based on the verifiable and recoverable encryption of a document's key. This verifiable and recoverable encryption of the document's key will allow one party to verify the encrypted key. It will also ensure this party that the Semi Trusted Third Party will be able to recover the key if the other party misbehaves. The protocol also incorporates the concept of enforcing the honesty of one party. The proposed protocol consists of only three messages and is more efficient than related protocols.

  3. Vulnerabilities in Quantum Key Distribution Protocols

    CERN Document Server

    Kuhn, D R

    2003-01-01

    Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return of entangled qubits to create a shared key. The protocols that are cryptanalyzed in this paper were proven secure with respect to some eavesdropping approaches, and results reported here do not invalidate these proofs. Rather, they suggest that quantum cryptographic protocols, like conventional protocols, may be vulnerable to methods of attack that were not envisaged by their designers.

  4. Reactive broadcasting protocol for video on demand

    Science.gov (United States)

    Paris, Jehan-Francois; Carter, Steven W.; Long, Darrell D. E.

    1999-12-01

    We propose a reactive broadcasting protocol that addresses the problem of distributing moderately popular videos in a more efficient fashion. Like all efficient broadcasting protocols, reactive broadcasting assumes that the customer set-top box has enough local storage to store at least one half of each video being watched. Unlike other broadcasting protocols, reactive broadcasting only broadcasts the later portions of each video. the initial segment of each video is distributed on demand using a stream tapping protocol. Our simulations show that reactive broadcasting outperforms both conventional broadcasting protocols and pure stream tapping for a wide range of video request rates.

  5. Sequence Patterns of Identity Authentication Protocols

    Institute of Scientific and Technical Information of China (English)

    Tao Hongcai; He Dake

    2006-01-01

    From the viewpoint of protocol sequence, analyses are made of the sequence patterns of possible identity authentication protocol under two cases: with or without the trusted third party (TTP). Ten feasible sequence patterns of authentication protocol with TTP and 5 sequence patterns without TTP are gained. These gained sequence patterns meet the requirements for identity authentication,and basically cover almost all the authentication protocols with TTP and without TTP at present. All of the sequence patterns gained are classified into unilateral or bilateral authentication. Then , according to the sequence symmetry, several good sequence patterns with TTP are evaluated. The accompolished results can provide a reference to design of new identity authentication protocols.

  6. Simple and Efficient Contract Signing Protocol

    CERN Document Server

    Alaraj, Abdullah M

    2012-01-01

    In this paper, a new contract signing protocol is proposed based on the RSA signature scheme. The protocol will allow two parties to sign the same contract and then exchange their digital signatures. The protocol ensures fairness in that it offers parties greater security: either both parties receive each other's signatures or neither does. The protocol is based on offline Trusted Third Party (TTP) that will be brought into play only if one party fails to sign the contract. Otherwise, the TTP remains inactive. The protocol consists of only three messages that are exchanged between the two parties.

  7. Novel Ω-protocols for NP

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    Ω-protocols, introduced by Garay, Mackenzie and Yang, is a variant of S-protocols with online extractor which is a useful tool to overcome the nest effect in concurrent scenario. In this work, we construct an Ω-protocol for Hamiltonian cycle problem, and therefore, it allows us to present Ω-protocol for any NP relation. For most general NP relations, our construction of Ω-protocols is much more efficient than the informal one described by Garay et al. and we believe that the method for our construction may be of independent interest.

  8. Authenticating Tripartite Key Agreement Protocol with Pairings

    Institute of Scientific and Technical Information of China (English)

    Sheng-Li Liu; Fang-Guo Zhang; Ke-Fei Chen

    2004-01-01

    In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.

  9. Generalized routing protocols for multihop relay networks

    KAUST Repository

    Khan, Fahd Ahmed

    2011-07-01

    Performance of multihop cooperative networks depends on the routing protocols employed. In this paper we propose the last-n-hop selection protocol, the dual path protocol, the forward-backward last-n-hop selection protocol and the forward-backward dual path protocol for the routing of data through multihop relay networks. The average symbol error probability performance of the schemes is analysed by simulations. It is shown that close to optimal performance can be achieved by using the last-n-hop selection protocol and its forward-backward variant. Furthermore we also compute the complexity of the protocols in terms of number of channel state information required and the number of comparisons required for routing the signal through the network. © 2011 IEEE.

  10. Security Protocols: Specification, Verification, Implementation, and Composition

    DEFF Research Database (Denmark)

    Almousa, Omar

    An important aspect of Internet security is the security of cryptographic protocols that it deploys. We need to make sure that such protocols achieve their goals, whether in isolation or in composition, i.e., security protocols must not suffer from any aw that enables hostile intruders to break...... their security. Among others, tools like OFMC [MV09b] and Proverif [Bla01] are quite efficient for the automatic formal verification of a large class of protocols. These tools use different approaches such as symbolic model checking or static analysis. Either approach has its own pros and cons, and therefore, we...... called SPS (Security Protocol Specification) language, that enables users, without requiring deep expertise in formal models from them, to specify a wide range of real-world protocols in a simple and intuitive way. Thus, SPS allows users to verify their protocols using different tools, and generate...

  11. Language, Semantics, and Methods for Security Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico

    Security protocols help in establishing secure channels between communicating systems. Great care needs therefore to be taken in developing and implementing robust protocols. The complexity of security-protocol interactions can hide, however, security weaknesses that only a formal analysis can...... reveal. The last few years have seen the emergence of successful intensional, event-based, formal approaches to reasoning about security protocols. The methods are concerned with reasoning about the events that a security protocol can perform, and make use of a causal dependency that exists between...... representation and do not address how to build up protocol representations in a compositional fashion. This dissertation presents a new, event-based approach to reasoning about security protocols. We seek a broader class of models to show how event-based models can be structured in a compositional way and so...

  12. A Secure Short Message Communication Protocol

    Institute of Scientific and Technical Information of China (English)

    Chao-Wen Chang; Heng Pan; Hong-Yong Jia

    2008-01-01

    According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway are realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application.

  13. Effective Protocols for Mobile Communications and Networking

    Energy Technology Data Exchange (ETDEWEB)

    Espinoza, J.; Sholander, P.; Van Leeuwen, B,

    1998-12-01

    This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

  14. Protocols for calibrating multibeam sonar

    OpenAIRE

    Foote, Kenneth G.; Chu, Dezhang; Hammar, Terence R.; Baldwin, Kenneth C.; Mayer, Larry A.; Hufnagle, Lawrence C. jr.; Jech, J. Michael

    2005-01-01

    Development of protocols for calibrating multibeam sonar by means of the standard-target method is documented. Particular systems used in the development work included three that provide the water-column signals, namely the SIMRAD SM2000/90- and 200-kHz sonars and RESON SeaBat 8101 sonar, with operating frequency of 240 kHz. Two facilities were instrumented specifically for the work: a sea well at the Woods Hole Oceanographic Institution and a large, indoor freshwater tank at the University o...

  15. Research on Container Behaviors Protocol

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    With the development of middleware technology, there are some new features to be adopted on demand in middleware platform based on container component. Aiming at the adaptation of middleware platform, from the nature of component container, this paper begins with behaviors features of EJB (Enterprise Java Bean) container, extracts general behaviors protocol of container, and defines its formal behaviors specification. In the end, the interactive relationship of components is described by WRIGHT language, and the configuration of whole system is shown. The method proposed in this paper mines the hidden features of framework of component container, and applies to refactor middleware platform in reflection and aspect-oriented programming technology.

  16. New Models for Population Protocols

    CERN Document Server

    Michail, Othon

    2010-01-01

    Wireless sensor networks are about to be part of everyday life. Homes and workplaces capable of self-controlling and adapting air-conditioning for different temperature and humidity levels, sleepless forests ready to detect and react in case of a fire, vehicles able to avoid sudden obstacles or possibly able to self-organize routes to avoid congestion, and so on, will probably be commonplace in the very near future. Mobility plays a central role in such systems and so does passive mobility, that is, mobility of the network stemming from the environment itself. The population protocol model was

  17. Protocolized Resuscitation of Burn Patients.

    Science.gov (United States)

    Cancio, Leopoldo C; Salinas, Jose; Kramer, George C

    2016-10-01

    Fluid resuscitation of burn patients is commonly initiated using modified Brooke or Parkland formula. The fluid infusion rate is titrated up or down hourly to maintain adequate urine output and other endpoints. Over-resuscitation leads to morbid complications. Adherence to paper-based protocols, flow sheets, and clinical practice guidelines is associated with decreased fluid resuscitation volumes and complications. Computerized tools assist providers. Although completely autonomous closed-loop control of resuscitation has been demonstrated in animal models of burn shock, the major advantages of open-loop and decision-support systems are identifying trends, enhancing situational awareness, and encouraging burn team communication. PMID:27600131

  18. Trust relationships in exchange protocols

    OpenAIRE

    González-Deleito Collell, Nicolás

    2005-01-01

    Les protocoles d'échange d'informations représentent un des grands domaines actuels de recherche en sécurité informatique, et sont entre autres à la base des mécanismes de commerce électronique. Ils sont par exemple nécessaires à la réalisation d'un achat en ligne, à la signature d'un contrat électronique et au courrier électronique recommandé. Dans ces exemples, les échanges d'informations consistent à échanger respectivement un objet électronique contre un paiement, des signatures digitales...

  19. Trypanosoma spp. ring test protocol

    International Nuclear Information System (INIS)

    Test material will be chosen by the coordinating lab for incorporation into a proficiency panel after repeated testing by more than one analyst on multiple PCR runs on different days. Test material: suitable test material will be provided. Protocol and laboratory procedures: Each laboratory is allowed to use their own 'in-house' test procedure (SOPs will nevertheless be provided by the respective laboratories for comparison and evaluation). Each PCR should be executed on two separate occasions. Test material used will be coded and sent as a blind panel to the participants. Each participating laboratory will be given a unique set of codes

  20. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  1. Latest approaches of Kyoto protocol

    International Nuclear Information System (INIS)

    Recently EURELECTRIC welcome the proposal of new EC Directive concerning the inclusion in the EU Emissions Trading Scheme (ETS) of credits from the project mechanisms - Joint Implementation (JI) and Clean Development Mechanism (CDM). The proposed Directive is an amendment to the EU Emissions Trading Directive adopted in June 2003. EURELECTRIC calls for unlimited use of credits in ETS. The draft Directive provides for the application of these mechanisms to begin as of 2008, on condition that the Kyoto Protocol does actually enter into force, an event which is still dependent on Russia's ratification. Such ratification has been subject to contradictory statements from the Russian Government, and the question of whether their signature to the Protocol is forthcoming is still fraught with uncertainty. Although it is not anticipated that significant quantities of JI or CDM certified credits will be available in the period 2005-2007, those that do become available would provide some additional liquidity in the emissions trading market. There is a direct relation between the coming ETS and electricity pricing: environmental policy is the driver, based on the need to switch to a low-carbon future and manage the necessary investments in a rational manner - and emissions trading is the best solution available. Romania has good opportunities to be involved in the greenhouse gases market, both in ETS and JI mechanisms. Some JI projects between Romanian and The Netherlands are already done or underway. (author)

  2. Frequencies of 23 functionally significant variant alleles related with metabolism of antineoplastic drugs in the Chilean population: comparison with Caucasian and Asian populations

    Directory of Open Access Journals (Sweden)

    Angela Margarita Roco

    2012-11-01

    Full Text Available Cancer is a leading cause of death worldwide. The cancer incidence rate in Chile is 133.7/100,000 inhabitants and it is the second cause of death, after cardiovascular diseases. Most of the antineoplastic drugs are metabolized to be detoxified, and some of them to be activated. Genetic polymorphisms of drug-metabolizing enzymes can induce deep changes in enzyme activity, leading to individual variability in drug efficacy and/or toxicity. The present research describes the presence of genetic polymorphisms in the Chilean population, which might be useful in public health programs for personalized treatment of cancer, and compare these frequencies with those reported for Asian and Caucasian populations, as a contribution to the evaluation of ethnic differences in the response to chemotherapy.We analyzed 23 polymorphisms in a group of 253 unrelated Chilean volunteers from the general population. The results showed that CYP2A6*2, CYP2A6*3, CYP2D6*3, CYP2C19*3 and CYP3A4*17 variant alleles are virtually absent in Chileans. CYP1A1*2A allele frequency (0.37 is similar to that of Caucasians and higher than that reported for Japanese people. Allele frequencies for CYP3A5*3 (0.76 and CYP2C9*3 (0.04 are similar to those observed in Japanese people. CYP1A1*2C (0.32, CYP1A2*1F (0.77, CYP3A4*1B(0.06, CYP2D6*2(0.41 and MTHFR T(0.52 allele frequencies are higher than the observed either in Caucasian or in Japanese populations. Conversely, CYP2C19*2 allele frequency (0.12 and GSTT1null (0.11 and GSTM1null (0.36 genotype frequencies are lower than those observed in both populations. Finally, allele frequencies for CYP2A6*4(0.04, CYP2C8*3(0.06, CYP2C9*2(0.06, CYP2D6*4(0.12, CYP2E1*5B(0.14, CYP2E1*6(0.19, and UGT2B7*2(0.40 are intermediate in relation to those described in Caucasian and in Japanese populations, as expected according to the ethnic origin of the Chilean population.In conclusion, our findings support the idea that ethnic variability must be considered

  3. Research on Routing Protocol of Mobile Ad Hoc Network

    OpenAIRE

    Tuo Ming Fu; Che Min

    2016-01-01

    Routing protocol is an important content of mobile Ad Hoc. The typical mobile Ad Hoc network routing protocols is introduced. The advantages and disadvantages of these routing protocols are analyzed. A hybrid routing protocol is put forward based on this.

  4. Symmetric cryptographic protocols for extended millionaires' problem

    Institute of Scientific and Technical Information of China (English)

    LI ShunDong; WANG DaoShun; DAI YiQi

    2009-01-01

    Yao's millionaires' problem is a fundamental problem in secure multiparty computation, and its solutions have become building blocks of many secure multiparty computation solutions. Unfortunately,most protocols for millionaires' problem are constructed based on public cryptography, and thus are inefficient. Furthermore, all protocols are designed to solve the basic millionaires' problem, that is,to privately determine which of two natural numbers is greater. If the numbers are real, existing solutions do not directly work. These features limit the extensive application of the existing protocols. This study introduces and refines the first symmetric cryptographic protocol for the basic millionaires' problem, and then extends the symmetric cryptographic protocol to privately determining which of two real numbers is greater, which are called the extended millionaires' problem, and proposes corresponding Constructed based on symmetric cryptography, these protocols are very efficient.

  5. VANET Routing Protocols: Pros and Cons

    CERN Document Server

    Paul, Bijan; Bikas, Md Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol has taken significant attention. So, it is very necessary to identify the pros and cons of routing protocols which can be used for further improvement or development of any new routing protocol. This paper presents the pros and cons of VANET routing protocols for inter vehicle communication.

  6. Novel construction of Secure RFID Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Shafiqul Abidin

    2014-10-01

    Full Text Available This article proposes an efficient and secure authentication protocol for secure and low-cost RFID systems in random oracles. Security is one of the prime concerns of RFID system. Proposed protocol relies on Elliptic Curve Discrete Logarithm Problem (ECDLP to achieve security. The protocol achieves the most important security goals scalability, anonymity and anti-cloning for RFID system. A password based protocol has vulnerability on fixed password. This can be exploited by threats. In the proposed protocol, there is a provision to change the password of the Tags. Hence the vulnerability can be reduced in an acceptable level. Computation cost is very less as compare to the other protocols.

  7. E-Cash Payment Protocols

    Directory of Open Access Journals (Sweden)

    Shweta Srivastava

    2012-09-01

    Full Text Available E-cash is a payment system designed and implemented for making purchases over open networks such as the Internet. Need of a payment system which enables the electronic transactions are growing at the same time that the use of Internet is growing in our daily life. Present days electronic payment systems have a major problem, they cannot handle the security and the users anonymity and at the same time these systems are secure on the cost of their users anonymity. This paper shows the payment protocols for digital cash and discusses how a digital cash system can be formed by presenting a few of the present days digital cash systems in details. We also provide a comparison and determine them together to see which one of them fulfils the properties for digital cash and the required security level.

  8. Fetal MRI: techniques and protocols

    Energy Technology Data Exchange (ETDEWEB)

    Prayer, Daniela [Department of Neuroradiology, University Clinics of Radiodiagnostics, Medical University Vienna, Waehringerguertel 18-10, 1090, Vienna (Austria); Brugger, Peter Christian [Department of Anatomy, Integrative Morphology Group, Medical University Vienna (Austria); Prayer, Lucas [Diagnosezentrum Urania, Vienna (Austria)

    2004-09-01

    The development of ultrafast sequences has led to a significant improvement in fetal MRI. Imaging protocols have to be adjusted to the rapidly developing fetal central nervous system (CNS) and to the clinical question. Sequence parameters must be changed to cope with the respective developmental stage, to produce images free from motion artefacts and to provide optimum visualization of the region and focus of interest. In contrast to postnatal studies, every suspect fetal CNS abnormality requires examination of the whole fetus and the extrafetal intrauterine structures including the uterus. This approach covers both aspects of fetal CNS disorders: isolated and complex malformations and cerebral lesions arising from the impaired integrity of the feto-placental unit. (orig.)

  9. [The research protocol. Part I].

    Science.gov (United States)

    Miranda-Novales, María Guadalupe; Villasís-Keever, Miguel Ángel

    2015-01-01

    One of the principal aims in research is the publication of the study in scientific journals. This implies two challenges: the first one, the election of an adequate research design, and the second one, the concrete and simple wording of the results for the study to be accepted in the most appropriate journal according to the scope. Despite numerous supporting documents are available for both issues, the publication process is long, tiresome, and can discourage the most enthusiastic researcher. This is the first of a series of articles with the objective to describe the steps from the research question to the publication of the study. First of all, the importance of the research design will be addressed. The structure of the protocol is essential to achieve the objectives, and provides a way to organize the investigation in a logic, comprehensible and efficient manner.

  10. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    Directory of Open Access Journals (Sweden)

    Seema Mehla

    2010-05-01

    Full Text Available the Extensible Authentication Protocol (EAP is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP re-authentication protocol, andcompared it with that of the EAP-TLS protocol. The result shows that the authentication delay of EAP reauthentication protocol is only twentieth of that in the EAPTLS protocol.

  11. An Identity- Based Key- Exchange Protocol

    Institute of Scientific and Technical Information of China (English)

    ZHANG Ya-juan; ZHU Yue-fei; HUANG Qiu-sheng

    2005-01-01

    An identity-based key-exchange protocol using a bilinear map is proposed and it is proved SK-secure(session key secure) in the AM (authenticated links adversarial model)provided the BDDH (bilinear Diffie-Hellmen) assumption is correct. Then we apply the signature-based authenticator to our protocol and obtain an identity-Based key-exchange protocol that is SK-secure in the UM (unauthenticated links adversarial model) provided the BDDH assumption is correct.

  12. Vulnerabilities in Quantum Key Distribution Protocols

    OpenAIRE

    Kuhn, D. Richard

    2003-01-01

    Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return of entangled qubits to create a shared key. The protocols that are cryptanalyzed in this paper were proven secure with respect to some eavesdropping approaches, and results reported here do not invalidate these proofs. Rather, they suggest th...

  13. SCRUTINY OF BROADCASTING PROTOCOLS IN VANET

    OpenAIRE

    Rohini Nere; Uma Nagaraj

    2015-01-01

    Definitive broadcasting in vehicular ad hoc networks is the key to success for various services and applications on an intelligent transportation system. Many trusted broadcasting protocols have been proposed but none of them has been evaluated in realistic scenario. In this paper, we discuss these reliable broadcasting protocols on VANET. Basic mechanism in broadcasting, and also we are providing collective research of Broadcasting protocols in vanet in that some real time protoc...

  14. Emission trading under the Kyoto Protocol

    OpenAIRE

    Holtsmark, Bjart; Hagem, Cathrine

    2003-01-01

    On 11 December 1997, delegates to the third conference of the Parties to the UN Framework Convention on Climate Change agreed upon the Kyoto Protocol. The protocol sets binding emission targets for developed nations (Annex B countries). The Protocol states that Annex B countries may participate in emission trading. The rules for emission trading are to be discussed at the fourth Conference of the Parties in November 1998. differentiation of targets among countries, but not in any system...

  15. Security in network environment-network protocols

    OpenAIRE

    Fessl, Jaromír

    2011-01-01

    Work is focused on network protocols features and security characteristics. Overview of protocols is made through all layers of OSI model and by this design structured. For each layer is made summary of interesting facts. Separate chapter is dedicated for VPN and for implementation possibilities of VPN. In chapter Practical problems are reflected most important problems of actual security (from network protocol point of view) concerned on SSL/TLS, SMTP and DNS. Together with security charact...

  16. Security analysis of session initiation protocol

    OpenAIRE

    Dobson, Lucas E.

    2010-01-01

    Approved for public release; distribution is unlimited The goal of this thesis is to investigate the security of the Session Initiation Protocol (SIP). This was accomplished by researching previously discovered protocol and implementation vulnerabilities, evaluating the current state of security tools and using those tools to discover new vulnerabilities in SIP software. The CVSS v2 system was used to score protocol and implementation vulnerabilities to give them a meaning that was us...

  17. VULNERABILITIES OF THE SSL/TLS PROTOCOL

    OpenAIRE

    Jelena Ćurguz

    2016-01-01

    This paper analyzes vulnerabilities of the SSL/TLS Handshake protocol, which is responsible for authentication of the parties in the communication and negotiation of security parameters that will be used to protect confidentiality and integrity of the data. It will be analyzed the attacks against the implementation of Handshake protocol, as well as the attacks against the other elements necessary to SSL/TLS protocol to discover security flaws that were exploited, modes of attac...

  18. Rewriting-Based Verification of Authentication Protocols

    OpenAIRE

    Ogata, Kazuhiro; Futatsugi, Kokichi

    2004-01-01

    We propose a method of formally analysing security protocols based on rewriting. The method is roughly as follows. A security protocol is modeled as an observational transition system, which is described in CafeOBJ. Proof scores showing that the protocol has safety (security) properties are then written in CafeOBJ and the proof scores are executed (rewritten) by the CafeOBJ system.

  19. Bitcoin-NG: A Scalable Blockchain Protocol

    OpenAIRE

    Eyal, Ittay; Gencer, Adem Efe; Sirer, Emin Gun; van Renesse, Robbert

    2015-01-01

    Cryptocurrencies, based on and led by Bitcoin, have shown promise as infrastructure for pseudonymous online payments, cheap remittance, trustless digital asset exchange, and smart contracts. However, Bitcoin-derived blockchain protocols have inherent scalability limits that trade-off between throughput and latency and withhold the realization of this potential. This paper presents Bitcoin-NG, a new blockchain protocol designed to scale. Based on Bitcoin's blockchain protocol, Bitcoin-NG is By...

  20. VANET Routing Protocols: Pros and Cons

    OpenAIRE

    Paul, Bijan; Ibrahim, Md.; Bikas, Md. Abu Naser

    2012-01-01

    VANET (Vehicular Ad-hoc Network) is a new technology which has taken enormous attention in the recent years. Due to rapid topology changing and frequent disconnection makes it difficult to design an efficient routing protocol for routing data among vehicles, called V2V or vehicle to vehicle communication and vehicle to road side infrastructure, called V2I. The existing routing protocols for VANET are not efficient to meet every traffic scenarios. Thus design of an efficient routing protocol h...

  1. Failure of Kak quantum key distribution protocol

    Indian Academy of Sciences (India)

    Ching-Nung Yang; Su-Hsuan Chu; Bing-Ling Lu

    2005-01-01

    Kak's quantum key distribution (QKD) protocol provides not only the distribution but also the integrity of secret key simultaneously in quantum channel. Consequently the additional exchange of information, used to check whether an eavesdropper exists, is unnecessary. In this comment, we will point out the failure of Kak's protocol and show that Kak's protocol does not have the joint distribution and integration that the author declares in [1].

  2. CIMS Network Protocol and Its Net Models

    Institute of Scientific and Technical Information of China (English)

    罗军舟; 顾冠群

    1997-01-01

    Computer communication network architectures for cims are based on the OSI Reference Model.In this paper,CIMS network protocol model is set up on the basis of the corresqonding service model.Then the authors present a formal specification of transport protocols by using an extended Predicate/Transition net system that is briefly introduced in the third part.Finally,the general methods for the Petri nets based formal specification of CIMS network protocols are outlined.

  3. Universal protocol for alopecia areata clinical studies.

    Science.gov (United States)

    Mesinkovska, Natasha A; Bergfeld, Wilma F

    2013-12-01

    Within the area of alopecia areata research, there is an obvious need for well-designed clinical trials of therapeutic agents. The National Alopecia Areata Foundation (NAAF) has created an initiative for the development of a unified protocol with guidelines for clinical studies. The NAAF universal protocol represents a joint effort of clinicians and investigators with experience in treating alopecia areata. This protocol will serve as a tremendous resource to facilitate future clinical studies. PMID:24326554

  4. A Formal Approach to Protocol Performance Testing

    Institute of Scientific and Technical Information of China (English)

    XU Mingwei; WU Jianping

    1999-01-01

    This paper proposes a formal approach to protocol performance testing based on the extended concurrent TTCN. To meet the needs of protocol performance testing, concurrent TTCN is extended, and the extended concurrent TTCN's operational semantics is defined in terms of Input-Output Labeled Transition System. An architecture design of protocol performance test system is described, and an example of test cases and its test resultare given.

  5. [Adherence to oral antineoplastic therapy].

    Science.gov (United States)

    Olivera-Fernandez, R; Fernandez-Ribeiro, F; Piñeiro-Corrales, G; Crespo-Diz, C

    2014-11-03

    Introducción: Los tratamientos antineoplasicos orales presentan ventajas en cuanto a coste, comodidad y mejora potencial en la calidad de vida respecto al tratamiento endovenoso, pero es mas dificil controlar la adherencia y monitorizar los efectos adversos. El objetivo de este estudio fue conocer la adherencia real en pacientes con antineoplasicos orales en nuestro centro, analizar la influencia de las caracteristicas del paciente y del tratamiento, identificar motivos de no adherencia, oportunidades de mejora en la atencion farmaceutica y evaluar la posible relacion adherencia y respuesta al tratamiento. Método: estudio prospectivo observacional de cuatro meses de duracion, en los pacientes con tratamiento antineoplasico oral dispensado desde la consulta de farmacia oncologica. Para la recogida de datos se utilizaron: orden medica, historia clinica y visita con entrevistas al paciente. Resultados: Se evaluaron un total de 141 pacientes. Un 72% se considero totalmente adherente, mientras que en un 28% se detecto algun tipo de no adherencia. El tiempo desde el diagnostico y la presencia de efectos adversos fueron las variables que afectaron a la adherencia. No se pudo demostrar relacion entre adherencia y respuesta al tratamiento. Conclusiones: La adherencia al tratamiento antineoplasico oral en nuestro centro fue del 72%, identificando oportunidades de mejora en la atencion farmaceutica dirigidas a prevenir los efectos adversos y a potenciar la adherencia de nuestros pacientes.

  6. Quantum three-pass cryptography protocol

    Science.gov (United States)

    Yang, Li; Wu, Ling-An; Liu, Songhao

    2002-09-01

    We present a new kind of quantum cryptography protocol based on Shamir's three-pass protocol of classical cryptography, which allows the transmission of qubits directly and secretly via the aid of an unjammable classical channel. In this protocol we implement the encryption and decryption transformations via rotations on the Poincare sphere of the photons polarization parameters. The key technique is that Bob's encryption rotation must be commutative with Alice s decryption rotation; this means that the axes of these two rotations must be parallel. We also present a security analysis of the protocol under a man-in-the-middle attack.

  7. Network Coding Protocols for Smart Grid Communications

    DEFF Research Database (Denmark)

    Prior, Rui; Roetter, Daniel Enrique Lucani; Phulpin, Yannick;

    2014-01-01

    We propose a robust network coding protocol for enhancing the reliability and speed of data gathering in smart grids. At the heart of our protocol lies the idea of tunable sparse network coding, which adopts the transmission of sparsely coded packets at the beginning of the transmission process...... but then switches to a denser coding structure towards the end. Our systematic mechanism maintains the sparse structure during the recombination of packets at the intermediate nodes. The performance of our protocol is compared by means of simulations of IEEE reference grids against standard master-slave protocols...

  8. A formal model of fair exchange protocols

    Institute of Scientific and Technical Information of China (English)

    QING Sihan; LI Gaicheng

    2005-01-01

    Based on the study of existing fair exchange protocols, this paper sets up an accurate formal model by stepwise refinement. In the process of refinement an unreliable channel is employed to simulate an attack behavior. The model provides a novel formal definition of exchanged items, and presents the formal goals for fairness, accountability,etc., reflecting the inherent requirements for fair exchange protocols across-the-board. In order to check, prove, and design fair exchange protocols effectively and efficiently, the model puts forward a novel property of abuse-freeness which applies to all fair exchange protocols, gives a formal definition for trust strand of the third party, and presents general criteria of designing a secure and effective fair exchange protocol. Taking a typical fair exchange protocol as an example, this paper presents the analysis steps of fair exchange protocols appealing to our model. An unknown attack is uncovered. The analysis reveals the process of a complete attack, discovering deeper reasons for causing an attack.Finally, we modify the flawed protocol and the revised protocol ensures the desirable properties.

  9. A New Watermarking Protocol against Conspiracy

    Institute of Scientific and Technical Information of China (English)

    ZHANG Jun; KOU Weidong; FAN Kai; CAO Xuefei

    2006-01-01

    A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.

  10. Tool Supported Analysis of Web Services Protocols

    DEFF Research Database (Denmark)

    Marques, Abinoam P.; Ravn, Anders Peter; Srba, Jiri;

    2011-01-01

    We describe an abstract protocol model suitable for modelling of web services and other protocols communicating via unreliable, asynchronous communication channels. The model is supported by a tool chain where the first step translates tables with state/transition protocol descriptions, often used...... e.g. in the design of web services protocols, into an intermediate XML format. We further translate this format into a network of communicating state machines directly suitable for verification in the model checking tool UPPAAL. We introduce two types of communication media abstractions in order...

  11. Multimode Communication Protocols Enabling Reconfigurable Radios

    Directory of Open Access Journals (Sweden)

    Berlemann Lars

    2005-01-01

    Full Text Available This paper focuses on the realization and application of a generic protocol stack for reconfigurable wireless communication systems. This focus extends the field of software-defined radios which usually concentrates on the physical layer. The generic protocol stack comprises common protocol functionality and behavior which are extended through specific parts of the targeted radio access technology. This paper considers parameterizable modules of basic protocol functions residing in the data link layer of the ISO/OSI model. System-specific functionality of the protocol software is realized through adequate parameterization and composition of the generic modules. The generic protocol stack allows an efficient realization of reconfigurable protocol software and enables a completely reconfigurable wireless communication system. It is a first step from side-by-side realized, preinstalled modes in a terminal towards a dynamic reconfigurable anymode terminal. The presented modules of the generic protocol stack can also be regarded as a toolbox for the accelerated and cost-efficient development of future communication protocols.

  12. Mac protocols for cyber-physical systems

    CERN Document Server

    Xia, Feng

    2015-01-01

    This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book wil

  13. Secure Key Management Protocol in WIMAX

    Directory of Open Access Journals (Sweden)

    Noudjoud Kahya

    2012-12-01

    Full Text Available The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16, is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS to Subscriber Station (SS. In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. Wefound that PKMv2 is vulnerable to replay, DoS, Man-in-the middle attacks. At last we have proposed asecure protocol (SPKM to prevent the authorization protocol from such attacks.

  14. Efficient secure two-party protocols

    CERN Document Server

    Hazay, Carmit

    2010-01-01

    The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation -- both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them secure. In addition, the authors study different definitional paradigms and compare the efficiency of protocols achieved under these different definitions.The book opens with a general introduction to secure computation and then presents definitions of security for a

  15. Equilibria of Generalized Cut and Choose Protocols

    DEFF Research Database (Denmark)

    Branzei, Simina; Caragiannis, Ioannis; Kurokawa, David;

    Classic cake cutting protocols — which fairly allocate a divisible good among agents with heterogeneous preferences — are susceptible to manipulation. Do their strategic outcomes still guarantee fairness? To answer this question we adopt a novel algo rithmic approach, proposing a concrete...... computational model and reasoning about the game-theoretic properties of algorithms that operate in this model. Specifically, we show that each protocol in the class of generalized cut and choose (GCC) protocols — which includes the most important discrete cake cutting protocols — is guaranteed to have...

  16. Liquid-liquid extraction combined with high performance liquid chromatography-diode array-ultra-violet for simultaneous determination of antineoplastic drugs in plasma

    Directory of Open Access Journals (Sweden)

    Ananda Lima Sanson

    2011-06-01

    Full Text Available A liquid-liquid extraction (LLE combined with high-performance liquid chromatography-diode array detection method for simultaneous analysis of four chemically and structurally different antineoplastic drugs (cyclophosphamide, doxorubicin, 5-fluorouracil and ifosfamide was developed. The assay was performed by isocratic elution, with a C18 column (5 µm, 250 x 4.6 mm and mobile phase constituted by water pH 4.0- acetonitrile-methanol (68:19:13, v/v/v, which allowed satisfactory separation of the compounds of interest. LLE, with ethyl acetate, was used for sample clean-up with recoveries ranging from 60 to 98%. The linear ranges were from 0.5 to 100 µg mL-1, for doxorubicin and 1 to 100 µg mL-1, for the other compounds. The relative standard deviations ranged from 5.5 to 17.7%. This method is a fast and simple alternative that can be used, simultaneously, for the determination of the four drugs in plasma, with a range enabling quantification of the drugs in pharmacokinetics, bioequivalence and therapeutic drug-monitoring studies.Um método de extração líquido-líquido (ELL combinado com cromatografia líquida de alta eficiência-detector de arranjo de diodos foi desenvolvido para análise simultânea de quatro fármacos antineoplásicos quimicamente e estruturalmente diferentes (ciclofosfamida, doxorrubicina, fluoruracila e ifosfamida. O estudo foi realizado sob condições isocráticas, com coluna C18 (5µm, 250 x 4.6 mm e fase móvel constituída por água pH 4.0-acetonitrila-metanol (68:19:13, v/v/v, que permitiu separação satisfatória dos analitos de interesse. A ELL, com acetato de etila, foi utilizada para limpeza da amostra, com recuperação variando de 60 a 98%. As faixas foram lineares de 0,5 a 100 µg mL-1 para doxorrubicina e 1 a 100 µg mL-1 para os outros compostos. O desvio padrão relativo variou de 5,5 a 17,7%. Este método é uma alternativa rápida e simples que pode ser usado, simultaneamente, para a determinação dos

  17. Analysis of a security protocol in ?CRL

    NARCIS (Netherlands)

    Pang, J.

    2002-01-01

    Needham-Schroeder public-key protocol; With the growth and commercialization of the Internet, the security of communication between computers becomes a crucial point. A variety of security protocols based on cryptographic primitives are used to establish secure communication over insecure open netwo

  18. Diagrammatization of the Transmission Control Protocol

    Directory of Open Access Journals (Sweden)

    Sabah Al-Fedaghi

    2012-09-01

    Full Text Available With the wide spread of Internet services, developers and users need a greater understanding of the technology of networking. Acquiring a clear understanding of communication protocols is an important step in understanding how a network functions; however, many protocols are complicated, and explaining them can be demanding. In addition, protocols are often explained in terms of traffic analysis and oriented toward technical staff and those already familiar with network protocols. This paper aims at proposing a diagrammatic methodology to represent protocols in general, with a focus on the Transmission Control Protocol and Secure Sockets Layer in particular. The purpose is to facilitate understanding of protocols for learning and communication purposes. The methodology is based on the notion of flow of primitive things in a system with six stages: creation, release, transfer, arrival, acceptance, and processing. Though the method presents a basic description of protocols without in-depth analysis of all aspects and mechanisms, the resultant conceptual description is a systematic specification that utilizes a few basic notions that assist in illustrating functionality and support comprehension.

  19. Climate Change And The Kyoto Protocol

    International Nuclear Information System (INIS)

    The problem of global warming is addressed. Changes in earth surface temperature, emission of CO2 and other four major green house gases are presented. Effect of global warming on weather, ocean, and ecosystem is discussed. A brief history of the Kyoto protocol starting from the 151 Earth Summit in 1972 is outlined. An overview of the protocol and a brief summary are given

  20. Kyoto Protocol: trade versus the environment

    International Nuclear Information System (INIS)

    Could the signatories to the Kyoto Protocol find themselves up against the WTO? This paper examines how the climate change agreement could conflict with trade rules, and shows that there are potentially serious conflicts in the interface between the WTO and the Kyoto Protocol. It argues for dialogue and debate before it is too late. (author)

  1. Performance of a connectionless protocol over ATM

    NARCIS (Netherlands)

    Heijenk, Geert J.; Moorsel, van Aad P.A.; Niemegeers, Ignas G.

    1992-01-01

    Recent studies show the existence of a demand for a connectionless broadband service. In order to cope with this demand, a connectionless protocol for the B-ISDN needs to be designed. Such a protocol should make use of ATM and the ATM Adaptation Layer. It needs to specify destination and bandwidth o

  2. Summary Report on Rational Cryptographic Protocols

    DEFF Research Database (Denmark)

    Alwen, Joël; Cachin, Christian; Pereira, Olivier;

    This report gives an overview of some of the models and techniques in rational cryptography, an emerging research area which in particular uses the methodologies and techniques of game theory to analyze cryptographic protocols and which uses cryptographic protocol theory to implement game theoretic...

  3. Welfare monitroing system : assessment protocol for horses

    NARCIS (Netherlands)

    Livestock Research,

    2012-01-01

    This document describes the protocol for horses in more detail. For the development of the protocol the Welfare Quality® framework was used. For each measure there is a description how to assess the measure including the method of classification.

  4. 40 CFR 161.70 - Acceptable protocols.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Acceptable protocols. 161.70 Section 161.70 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) PESTICIDE PROGRAMS DATA... Development (OECD) Protocols. Tests conducted in accordance with the requirements and recommendations of...

  5. The Formal Specifications for Protocols of Decoders

    Institute of Scientific and Technical Information of China (English)

    YUAN Meng-ting; WU Guo-qing; SHU Feng-di

    2004-01-01

    This paper presents a formal approach, FSPD (Formal Specifications for Protocols of Decoders), to specify decoder communication protocols. Based on axiomatic, FSPD is a precise language with which programmers could use only one suitable driver to handle various types of decoders. FSPD is helpful for programmers to get high adaptability and reusability of decoder-driver software.

  6. Secure Geographic Routing Protocols: Issues and Approaches

    CERN Document Server

    sookhak, Mehdi; Haghparast, Mahboobeh; ISnin, Ismail Fauzi

    2011-01-01

    In the years, routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN) and also provide a qualitative comparison of them.

  7. Secure Geographic Routing Protocols: Issues and Approaches

    Directory of Open Access Journals (Sweden)

    Mehdi sookhak

    2011-09-01

    Full Text Available In the years, routing protocols in wireless sensor networks (WSN have been substantially investigated by researches Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN and also provide a qualitative comparison of them.

  8. Forests and the Kyoto Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Goetze, D.C. [Environment Canada, Ottawa, ON (Canada)

    2001-07-01

    This PowerPoint presentation referred to carbon sinks in the Clean Development Mechanism (CDM) as specified in the Kyoto Protocol. Policy issues, opportunities and challenges were discussed. The slides summarized the environmental potential of carbon sink projects, the current status of carbon sinks in the CDM, and strategies towards a CDM carbon sink. The Nyakach, Kenya biomass enhancement case study was presented, along with the Colombian Andean biodiversity corridor reforestation project. Potential sink projects were described as those resulting in direct reduction of emissions. These include reducing deforestation by protecting forests from being converted to agriculture, by protecting forests from the impacts of human activities, and by substituting biomass energy sources for fossil fuels. Indirect reduction of emissions via sequestration involves restoring natural forests in deforested or degraded areas and expanding agroforests and plantations. The co-benefits of carbon sink projects are biodiversity and socio-economic benefits. Under the Bonn Agreement, afforestation and reforestation projects are eligible under the CDM. Credits are limited to 1 per cent of Annex 1 party's base year emissions per year. The important elements of the Marrakech Accord are the prompt start of the CDM, as well as modalities and procedures.

  9. Treatment protocols for cervical cancer

    Directory of Open Access Journals (Sweden)

    Vujkov Tamara

    2002-01-01

    Full Text Available Introduction Cervical cancer is the second most common cancer in women worldwide and the second cause of cancer death among women. About 95% (90% in developed countries of invasive carcinomas are of sqamous types, and 5% (10% in developed countries are adenocarcinomas. FIGO classification of cervical carcinomas, based on clinical staging and prognostic factor dictate therapeutic procedures and help in designing treatment protocols. Therapeutic modalities Surgical therapy includes conization, radical hysterectomy with pelvic lymphadenectomy and palliative operation urinary diversion and colostomy. Radiotherapy, brachytherapy and teletherapy are most recently combined with chemotherapy as concurrent chemoradiation. Discussion and conclusion No change in therapeutic modalities will ever decrease mortality rate of cervical carcinoma as much as education, prevention and early screening. The 5-year survival for locally advanced disease has not improved during the last 40 years as a result of failure to deliver therapy to the paraaortic region. Paraaortic lymph nodes should be evaluated before therapy planning by different imaging procedures, or more exactly by surgical staging: laparoscopy or laparotomy. Radical operations of cervical carcinoma should be performed by experienced surgeons, educated for this type of operation, with sufficient number of cases.

  10. Quantum Communication Complexity of Quantum Authentication Protocols

    CERN Document Server

    Guedes, Elloá B

    2011-01-01

    In order to perform Quantum Cryptography procedures it is often essencial to ensure that the parties of the communication are authentic. Such task is accomplished by quantum authentication protocols which are distributed algorithms based on the intrinsic properties of Quantum Mechanics. The choice of an authentication protocol must consider that quantum states are very delicate and that the channel is subject to eavesdropping. However, even in face of the various existing definitions of quantum authentication protocols in the literature, little is known about them in this perspective, and this lack of knowledge may unfavor comparisons and wise choices. In the attempt to overcome this limitation, in the present work we aim at showing an approach to evaluate quantum authentication protocols based on the determination of their quantum communication complexity. Based on our investigation, no similar methods to analyze quantum authentication protocols were found in the literature. Pursuing this further, our approa...

  11. Security Weaknesses in Arbitrated Quantum Signature Protocols

    Science.gov (United States)

    Liu, Feng; Zhang, Kejia; Cao, Tianqing

    2014-01-01

    Arbitrated quantum signature (AQS) is a cryptographic scenario in which the sender (signer), Alice, generates the signature of a message and then a receiver (verifier), Bob, can verify the signature with the help of a trusted arbitrator, Trent. In this paper, we point out there exist some security weaknesses in two AQS protocols. Our analysis shows Alice can successfully disavow any of her signatures by a simple attack in the first protocol. Furthermore, we study the security weaknesses of the second protocol from the aspects of forgery and disavowal. Some potential improvements of this kind of protocols are given. We also design a new method to authenticate a signature or a message, which makes AQS protocols immune to Alice's disavowal attack and Bob's forgery attack effectively.

  12. Cryptanalysis of the arbitrated quantum signature protocols

    Science.gov (United States)

    Gao, Fei; Qin, Su-Juan; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-08-01

    As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

  13. Cryptanalysis of the arbitrated quantum signature protocols

    CERN Document Server

    Gao, Fei; Guo, Fen-Zhuo; Wen, Qiao-Yan

    2011-01-01

    As a new model for signing quantum message, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver Bob can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender Alice can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics in future study on AQS protocols.

  14. VULNERABILITIES OF THE SSL/TLS PROTOCOL

    Directory of Open Access Journals (Sweden)

    Jelena Ćurguz

    2016-05-01

    Full Text Available This paper analyzes vulnerabilities of the SSL/TLS Handshake protocol, which is responsible for authentication of the parties in the communication and negotiation of security parameters that will be used to protect confidentiality and integrity of the data. It will be analyzed the attacks against the implementation of Handshake protocol, as well as the attacks against the other elements necessary to SSL/TLS protocol to discover security flaws that were exploited, modes of attack, the potential consequences, but also studying methods of defense. All versions of the protocol are going to be the subject of the research but emphasis will be placed on the critical attack that the most endanger the safety of data. The goal of the research is to point out the danger of existence of at least vulnerability in the SSL/TLS protocol, which can be exploited and endanger the safety of the data that should be protected.

  15. Multicast Protocol for Uni-Directional Networks

    Institute of Scientific and Technical Information of China (English)

    黄皓; 陈贵海; 谢立; 孙钟秀

    2000-01-01

    A very inexpensive receive-only satellite receiver can receive high bandwidth traffic from a feeder. Therefore the connection between the feeder and the receiver is uni-directional. The existing routing protocols, such as Link-State and Distance-Vector, are designed on the premise that any links are bidirectional and they cannot handle the uni-directional links. In this paper, a dynamic multicast routing protocol is proposed, which can handle uni-directional networks. This protocol can also adapt to the dynamic change of the topology of the network and has good scalability. A formal description of the protocol by Petri net is given. Liveness,deadlock free and other properties of the protocol are proved.

  16. Attempts at the production of more selective antitumourals. Part I. The antineoplastic activity of cyclophosphazenes linked to the polyamines 1,3-diaminopropane and 1,4-diaminobutane (putrescine)

    Science.gov (United States)

    Labarre, Jean-François; Guerch, Guy; Sournies, François; Spreafico, Federico; Filippeschi, Stefania

    1984-06-01

    In an attempt to design antitumour cyclophosphazenes of improved specificity by linking them to some natural tumour finders, we studied the binding of gem-N 3P 3Az 4Cl 2 to 1,3-diaminopropane and 1,4-diaminobutane (putrescine). Synthesis, mass spectrum and NMR as well as X-ray crystal structures of the two spirocyclic N 3P 3Az 4 [HN(CH 2) 3,4NH] derivatives (in which the N 3P 3Az 4 active principle is linked to the diamine in a spiro configuration) are described. Results obtained with these compounds in 3 murine tumour systems (L1210 and P388 leukaemias and P815 mastocytoma), showing their potent antineoplastic activity in vivo obtainable at well-tolerated doses, are also described.

  17. A fully efficient secure quantum cryptography protocol

    CERN Document Server

    Xiang Bin Wang

    2001-01-01

    Since Bennett and Brassard suggested their quantum key distribution protocol(BB84 protocol) in 1984, the subject has been extensively studied both theoretically and experimentally. The protocol allows two remote parties Alice and Bob to create and share a secret key using a quantum channel and public authenticated communications. The quantum key created in this way is in principle secure because eavesdroppers have no way to tap the quantum channel without disturb it. In the protocol, two level quantum bits are measured in two basis, $X$ and $Z$ randomly by Bob. So at least half of the measurement results will be discarded because Bob has a half probability taking the measurement in a wrong basis. On the other hand, the security is not the maximum in BB84 protocol. To increase the security, one may straightforwardly increase the number of basis used in the protocol. For example, six state protocol was proposed recently for two level system. However, in this way, it seems to be the case that the higher the secu...

  18. Efficient Privacy Preserving Protocols for Similarity Join

    Directory of Open Access Journals (Sweden)

    Bilal Hawashin

    2012-04-01

    Full Text Available During the similarity join process, one or more sources may not allow sharing its data with other sources. In this case, a privacy preserving similarity join is required. We showed in our previous work [4] that using long attributes, such as paper abstracts, movie summaries, product descriptions, and user feedbacks, could improve the similarity join accuracy using supervised learning. However, the existing secure protocols for similarity join methods can not be used to join sources using these long attributes. Moreover, the majority of the existing privacy‐preserving protocols do not consider the semantic similarities during the similarity join process. In this paper, we introduce a secure efficient protocol to semantically join sources when the join attributes are long attributes. We provide two secure protocols for both scenarios when a training set exists and when there is no available training set. Furthermore, we introduced the multi‐label supervised secure protocol and the expandable supervised secure protocol. Results show that our protocols can efficiently join sources using the long attributes by considering the semantic relationships among the long string values. Therefore, it improves the overall secure similarity join performance.

  19. Snakebite management in Iran: Devising a protocol

    Directory of Open Access Journals (Sweden)

    Seyed Mostafa Monzavi

    2014-01-01

    Full Text Available Background: Snakebite in Iran has been a health concern. However, management of snakebite is not standardized and varies from center to center. This study is aimed at devising an evidence-based comprehensive protocol for snakebite management in Iran, to reduce unnecessary variations in practice. Materials and Methods: A narrative search in electronic databases was performed. Fifty peer-reviewed articles, guidelines, and textbooks were reviewed and practical details were extracted. Our currently used protocol in the Mashhad Toxicology Center was supplemented with this information. Consequently an improved wide-range protocol was developed. The protocol was then discussed and amended within a focus group comprised of medical toxicologists and internal medicine specialists. The amended version was finally discussed with expert physicians specialized in different areas of medicine, to be optimized by supplementing other specific considerations. Results: During a one-year process, the protocol was finalized. The final version of the protocol, which was designed in six steps, comprised of three components: A schematic algorithm, a severity grading scale, and instructions for supportive and adjunctive treatments. The algorithm pertains to both Viperidae and Elapidae snakebite envenomations and consists of a planned course of action and dosing of antivenom, based on the severity of the envenomation. Conclusion: Snakebite envenomation is a clinical toxicologic emergency, which needs to be treated in a timely and organized manner. Hence, a multi-aspect protocol was designed to improve the clinical outcomes, reduce unnecessary administration of antivenom, and help physicians make more proper clinical judgments.

  20. Energy Efficient Routing Protocol for MANET

    Directory of Open Access Journals (Sweden)

    S.Gopinath

    2012-03-01

    Full Text Available In recent years, many energy-efficient routing protocols have been proposed. However, very little efforts have been taken in studying the energy consumption of individual node, overhead and route maintaining issues. While not considering the design of energy efficient routing protocol, it may perform very worst than the normal routing protocol. Here, we have proposed On Demand Based Energy Efficient Routing Protocol (ODBEERP. The main aim of proposed protocol is to discover the minimum power-limitation route. The power limitation of a route is decided by the node which has the minimum energy in that route. So compared with the minimum node energy in any other route, the minimum node energy in the minimum power-limitation route has more energy. We have also proposed a more accurate analysis to track the energy consumptions due to various factors, and improve the performance during path discovery and in mobility scenarios. The proposed protocol is evaluated with object oriented discrete event simulator environment. Simulation results shows that the ODBEERP achieves good throughput, less delay, high packet delivery ratio and good energy efficiency than the existing protocol PEER.

  1. ANALYSIS OF THE PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

    Directory of Open Access Journals (Sweden)

    Amit Rana

    2012-09-01

    Full Text Available The Internet Engineering Task Force (IETF has proposednew protocols for highly secured wireless networking. Thepurpose of this paper is to implement one such proposedsecurity protocol - PEAP (Protected ExtensibleAuthentication Protocol [1]. PEAP was jointly developedby Microsoft, Cisco and RSA security. The protocolimplementation is done on the server end of a Client/Servernetwork model on a RADIUS server (RemoteAuthentication Dial-in User Service. The proposedprotocol - PEAP provides for Client identity protection andkey generation thus preventing unauthorized user accessand protecting or encrypting the data against maliciousactivities.

  2. Advanced Internet Protocols, Services, and Applications

    CERN Document Server

    Oki, Eiji; Tatipamula, Mallikarjun; Vogt, Christian

    2012-01-01

    Today, the internet and computer networking are essential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactions sent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security, and flexibility. This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on to discu

  3. Demand Priority Protocol Simulation and Evaluation

    Institute of Scientific and Technical Information of China (English)

    ZHAN Yongzhao; SONG Shunlin; XIE Li

    1999-01-01

    A new network protocol (DemandPriority Protocol) environment can provide more satisfying service fordifferent urgent transmission requests. In this paper, in order toprovide guidance for the selection of environment of multimedia datatransmission in Computer Supported Cooperative Work better, anobject-oriented protocol specification language based on C++ is used todesign a virtual environment of multiworkstation of computer cooperativework and to simulate exe-cution of demand priority network protocoland then the performances of various transmission requests are analyzed.Finally, an evaluation of the demand priority LAN is given.

  4. The Russian Federation and the Kyoto Protocol

    OpenAIRE

    Douma, Wybe; Ratsiborinskaya, Daria

    2007-01-01

    textabstractThis book brings together the results of two conferences: 'The Kyoto Protocol and beyond: A legal perspective', organised by the University of Siena on 10-11 June 2006, and 'Tackling Climate Change: An appraisal of the Kyoto Protocol and options for the future', held at the T.M.C. Asser Institute in The Hague on 30-31 March 2007. These conferences focused on the legal aspects of the Kyoto Protocol implementation and the post-2012 regime. Experts in European and international envir...

  5. Security-Preserving Asymmetric Protocol Encapsulation

    OpenAIRE

    Vaudenay, Serge; Phan, Raphael C-W

    2007-01-01

    Query-response based protocols between a client and a server such as SSL, TLS, SSH are asymmetric in the sense that the querying client and the responding server play different roles, and for which there is a need for two-way linkability between queries and responses within the protocol. We are motivated by the observation that though results exist in other related contexts, no provably secure scheme has been applied to the setting of client-server protocols, which differ from conventional co...

  6. Performance evaluation of TCP over ABT protocols

    Science.gov (United States)

    Ata, Shingo; Murata, Masayuki; Miyahara, Hideo

    1998-10-01

    ABT is promising for effectively transferring a highly bursty data traffic in ATM networks. Most of past studies focused on the data transfer capability of ABT within the ATM layer. In actual, however, we need to consider the upper layer transport protocol since the transport layer protocol also supports a network congestion control mechanism. One such example is TCP, which is now widely used in the Internet. In this paper, we evaluate the performance of TCP over ABT protocols. Simulation results show that the retransmission mechanism of ABT can effectively overlay the TCP congestion control mechanism so that TCP operates in a stable fashion and works well only as an error recovery mechanism.

  7. Overview of the InterGroup protocols

    Energy Technology Data Exchange (ETDEWEB)

    Berket, Karlo [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Agarwal, Deborah A. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Melliar-Smith, P. Michael [Univ. of California, Santa Barbara, CA (United States); Moser, Louise E. [Univ. of California, Santa Barbara, CA (United States)

    2001-03-01

    Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

  8. Analysis of Enhanced Associativity Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Said A. Shaar

    2006-01-01

    Full Text Available This study introduces an analysis to the performance of the Enhanced Associativity Based Routing protocol (EABR based on two factors; Operation complexity (OC and Communication Complexity (CC. OC can be defined as the number of steps required in performing a protocol operation, while CC can be defined as the number of messages exchanged in performing a protocol operation[1]. The values represent the worst-case analysis. The EABR has been analyzed based on CC and OC and the results have been compared with another routing technique called ABR. The results have shown that EABR can perform better than ABR in many circumstances during the route reconstruction.

  9. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  10. Comparison of on Demand Routing Protocols

    Directory of Open Access Journals (Sweden)

    Bharat Bhushan

    2013-02-01

    Full Text Available A routing protocol is used to facilitate communication in ad hoc network. The primary goal of such a routing protocol is to provide an efficient and reliable path between a pair of nodes. The routing protocols for ad hoc network can be categorized into three categories: table driven, on demand and hybrid routing. The table driven and hybrid routing strategies require periodic exchange of hello messages between nodes of the ad hoc network and thus have high processing and bandwidth requirements. On the other hand on demand routing strategy creates routes when required and hence is very much suitable for ad hoc network. This paper therefore examines the performance of three on demand routing protocols at application layer using QualNet-5.01 simulator.

  11. Implementation of the Additional Protocol in Japan

    International Nuclear Information System (INIS)

    The Additional Protocol between Japan and the IAEA entered into force in December 1999. To come into force a series of implementation trials of Additional Protocol was carried out at two Japanese representative nuclear research centers, i.e. Tokai Research Establishment of Japan Atomic Energy Research Institute (JAERI) and Oarai Engineering Center of Japan Nuclear Fuel Cycle Development Institute (JNC). These trials were proposed by Japan and were conducted in cooperation with the IAEA Secretariat. In addition, Japan amended 'the Law for the Regulation of Reactors etc.', to collect adequate information to submit to the IAEA, to arrange the surrounding for the complementary access, etc. In addition, Japan Submitted the Initial Declaration of the Additional Protocol within 180 days of the entry into force of the Protocol, in the middle of June, 2000

  12. Saudi Arabia and CERN sign protocol

    CERN Multimedia

    2008-01-01

    On 9 May 2008, Mohammed I. Al Suwaiyel, President of the King Abdulaziz City of Science and Technology, representing the Government of Saudi Arabia, and CERN Director-General, Robert Aymar, signed a protocol to the 2006 cooperation agreement between CERN and Saudi Arabia. Members of the Saudi Arabian Government visit ATLAS.The purpose of the protocol is to define the operational framework needed to carry out various specific tasks provided for in the cooperation agreement in order to promote the development of a high energy particle physics community in Saudi Arabia and its ultimate visible participation as a member of the global CERN community. Signing the protocol, Mohammed I. Al-Suwaiyel said: "The Saudi Arabian Government has taken a number of initiatives to promote R&D in the interests of our country’s development and the advancement of science. Thanks to this protocol, Saudi scientists will be able to work towards this go...

  13. Standardized North American Marsh Bird Monitoring Protocol

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This document describes monitoring protocols for marshbirds in North America. Monitoring parameters, field procedures, survey methods, timing of surveys, recording...

  14. Privacy-Preserving Protocols for Eigenvector Computation

    CERN Document Server

    Pathak, Manas A

    2010-01-01

    In this paper, we present a protocol for computing the dominant eigenvector of a collection of private data distributed across multiple parties, with the individual parties unwilling to share their data. Our proposed protocol is based on secure multiparty computation with a trusted third-party arbitrator who deals with data encrypted by the other parties using an additive homomorphic cryptosystem. We also augment the protocol with randomization to make it difficult, with a high probability, for any party to estimate properties of the data belonging to other parties from the intermediate steps. The previous approaches towards this problem were based on expensive QR decomposition of correlation matrices, we present an efficient algorithm using the power iteration method. We present an analysis of the correctness, security, efficiency of protocol and experiments over a prototype implementation.

  15. Multicast Routing Protocols in Adhoc Mobile networks

    Directory of Open Access Journals (Sweden)

    S.Nagaprasad,

    2010-11-01

    Full Text Available The majority of applications are in areas where rapid deployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites, classrooms, and conventions where participants share information dynamically using their mobile devices. Well established routing protocols do exist to offer efficient multicasting service in conventional wired networks. These protocols, having been designed for fixed networks, may fails to keep up with node movements and frequent topology changes in a MANET. Therefore, adapting existing wired multicast protocols as such to a MANET, which completely lacks infrastructure, appear less promising. Providing efficient multicasting over MANET faces many challenges, includes scalability,quality of service, reliable service, security, Address configuration, Applications for multicast over MANET. The existing multicast routing protocol do not addresses these issues effectively over Mobile Adhoc Networks (MANET.

  16. Protocol to Exploit Waiting Resources for UASNs

    Directory of Open Access Journals (Sweden)

    Li-Ling Hung

    2016-03-01

    Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  17. Protocol to Exploit Waiting Resources for UASNs.

    Science.gov (United States)

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.

  18. National Wildlife Refuge System Survey Protocol Template

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This template was developed for drafting National Wildlife Refuge System (NWRS) Survey Protocols. The template is arranged in the same order as the eight basic...

  19. ARC Code TI: Geometry Manipulation Protocol (GMP)

    Data.gov (United States)

    National Aeronautics and Space Administration — The Geometry Manipulation Protocol (GMP) is a library which serializes datatypes between XML and ANSI C data structures to support CFD applications. This library...

  20. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  1. Protocol to Exploit Waiting Resources for UASNs.

    Science.gov (United States)

    Hung, Li-Ling; Luo, Yung-Jeng

    2016-01-01

    The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN) is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols. PMID:27005624

  2. Identity-based authentication protocol for grid

    Institute of Scientific and Technical Information of China (English)

    Li Hon; Sun Shixin; Yang Homiao

    2008-01-01

    Current grid authentication frameworks are achieved by applying the standard SSL authentication protocol(SAP).The authentication process is very complicated,and therefore,the grid user is in a heavily loaded point both in computation and in communication.Based on identity-based architecture for grid(IBAG)and corre-sponding encryption and signature schemes,an identity-based authentication protocol for grid is proposed.Being certificate-free,the authentication protocol aligns well with the demands of grid computing.Through simulation testing,it is seen that the authentication protocol is more lightweight and efficient than SAP,especially the more lightweight user side.This contributes to the larger grid scalability.

  3. How To Develop Survey Protocols: A Handbook

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This handbook provides a standard and guidance for developing and reviewing survey protocols used in the National Wildlife Refuge System. In the handbook, survey...

  4. Rethinking low extra delay background transport protocols

    CERN Document Server

    Carofiglio, Giovanna; Rossi, Dario; Testa, Claudio; Valenti, Silvio

    2010-01-01

    BitTorrent has recently introduced LEDBAT, a novel application-layer congestion control protocol for data exchange. The protocol design starts from the assumption that network bottlenecks are at the access of the network, and that thus user traffic competes creating self-inducing congestion. To relieve from this phenomenon, LEDBAT is designed to quickly infer that self-induced congestion is approaching (by detecting relative changes of the one-way delay in the transmission path), and to react by reducing the sending rate prior that congestion occurs. Prior work has however shown LEDBAT to be affected by a latecomer advantage, where newly arriving connections can starve already existing flows. In this work, we propose modifications to the congestion window update mechanism of the LEDBAT protocol that aim at solving this issue, guaranteeing thus intra-protocol fairness and efficiency. Closed-form expressions for the stationary throughput and queue occupancy are provided via a fluid model, whose accuracy is conf...

  5. Reparable Key Distribution Protocols for Internet Environments

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    It has claimed that any practical way to achieve perfect reparability for key distribution protocol (KDP) could only be futile. Fortunately, this paper presents reparable KDPs for internet environments with the use of the concept of timestamps.

  6. Secure Key Management Protocol in WIMAX

    OpenAIRE

    Noudjoud Kahya; Nacira Ghoualmi; Pascal Lafourcade

    2012-01-01

    The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16), is new technology basedon wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 iscomplete with respect to the Privacy Key Management (PKM) protocol. The protocol is responsible forproviding the secure distribution of keying data from Base Station (BS) to Subscriber Station (SS). In thispaper we provide the formal analysis of PKMv2 using Scyther tool to verify the security properties. ...

  7. OAuth protocol for CERN Web Applications

    OpenAIRE

    Kleszcz, Emil; Rodriguez Fernandez, Luis; Marescaux, Nicolas Bernard

    2016-01-01

    Project Specification The CERN Authentication service has recently increased his offer of SSO protocols/frameworks with OAuth2 standard. The purpose of the work is to explain the need for an authorization standard and explain how does OAuth2 protocol addresses our requirements. OAuth is an open standard for authorization which provides a secure access to server resources that belongs to a user. As a wide known and relatively new standard (2012) is used by big players in the industry a...

  8. The Kyoto Protocol: Can We Meet?

    OpenAIRE

    Boromisa, Ana-Maria; Tišma, Sanja

    2008-01-01

    Integration into the EU is one of strategic foreign policy goals of Croatia. Before accession, Croatia has to align with the EU policies and legislation. The European Commission in its Croatia 2007 Progress report identified ratification of the Kyoto Protocol as progress regarding environmental chapter of accession negotiations. By ratifying the Kyoto Protocol in May 2007 Croatia pledged to reduce greenhouse gases by 5% in the first commitment period, 2008-2012, from the amount released into ...

  9. The obscure future of the Kyoto protocol

    OpenAIRE

    Tsayem Demaze, Moise

    2013-01-01

    Since it came into effect in 2005 followed by its first period of application from 2008 to 2012, the Kyoto protocol has been subject to debates and international negotiations about its post-2012 future. Many grey areas persist, even though the Durban conference, held in December 2011, and the Doha conference, held in December 2012, ratified the principle of a second period of application of the protocol and started negotiations for a new international treaty supposed to come into effect in 2020.

  10. The Kyoto Protocol : a Review and Perspectives

    OpenAIRE

    Böhringer, Christoph

    2003-01-01

    International concern about climate change has led to the Kyoto Protocol, negotiated in 1997, which contains legally binding emission targets for industrialized countries to be achieved during the commitment period 2008-2012. While proponents of the Protocol celebrate it as a breakthrough in international climate policy, opponents criticize that its approach, namely setting targets and timetables for emission reductions, is seriously flawed. This paper provides a critical assessment of the Pr...

  11. Mutual Authentication Protocols for RFID Systems

    Institute of Scientific and Technical Information of China (English)

    Ashrar A. Omer; Johnson P. Thomas; Ling Zhu

    2008-01-01

    With the availability of low-cost radio frequency identification (RFID) tags, security becomes an increasing concern.However, such tags do not permit complex eryptographic functions due to their computational, communications, and storage limitations.In this paper, we investigate the security issues and requirements of RFID systems, and propose ultra-light weight and light weight protocols for low-cost RFID tags. The proposed protocols has been applied to a supply chain management system.

  12. Quantum Key Distribution Protocol with User Authentication

    CERN Document Server

    Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

    2005-01-01

    We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

  13. Protocol for communications in potentially noisy environments

    Energy Technology Data Exchange (ETDEWEB)

    Boyd, Gerlad M.; Farrow, Jeffrey

    2016-02-09

    A communications protocol that is designed for transmission of data in networks that are subjected to harsh conditions is described herein. A network includes a plurality of devices, where the devices comprise respective nodes. The nodes are in communication with one another by way of a central network hub. The protocol causes the nodes to transmit data over a network bus at different data rates depending upon whether the nodes are operating normally or an arbitration procedure has been invoked.

  14. Voice over Internet Protocol (VOIP): Future Potential

    OpenAIRE

    Ms. Deepti

    2014-01-01

    VoIP (voice over IP) delivers standard voice over telephone services over Internet Protocol (IP). VoIP is the technology of digitizing sound, compressing it, breaking it up into data packets, and sending it over an IP (internet protocol) network where it is reassembled, decompressed, and converted back into an analog wave form. Gateways are the key component required to facilitate IP Telephony. A gateway is used to bridge the traditional circuit switched PSTN with the packet switched Internet...

  15. Compiling symbolic attacks to protocol implementation tests

    OpenAIRE

    Michael Rusinowitch; Ghazi Maatoug; Hatem Ghabri

    2013-01-01

    Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically g...

  16. Trust Authentication Protocol on the Web

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    It is unsuitable to use traditional identity-based authentication on the Web where entities are not foreknown to each other. Trust relationship must be established between strangers before authentication. To achieve trust authentication, the resource-constrained trust negotiation is addressed, and traditional authentication key exchange protocol is extended. Owing to avoiding the heavy computational demands the public key cryptography operations bring about, the authentication protocol is well-suited for security authentication on the Web.

  17. Dose protocols of acetylcholine test in Chinese

    Institute of Scientific and Technical Information of China (English)

    向定成; 龚志华; 何建新; 洪长江; 邱建; 马骏

    2004-01-01

    @@ Acetylcholine test has been widely used clinically in several countries as a practical test provoking coronary artery spasm.1-3 Although it has also been launched recently in a few hospitals in China, the dose protocol for acetylcholine test used in these hospitals were from abroad.4,5 This study was aimed at developing a dose protocol for acetylcholine test suitable for Chinese people.

  18. Analyzing the exhaustiveness of the synapse protocol

    OpenAIRE

    Marinkovic, Bojan; Ciancaglini, Vincenzo; Ognjanovic, Zoran; Glavan, Paola; Liquori, Luigi; Maksimovic, Petar

    2015-01-01

    International audience The Synapse protocol is a scalable protocol designed for information retrieval over inter-connected heterogeneous overlay networks. In this paper, we give a formal description of Synapse using the Abstract State Machines framework. The formal description pertains to Synapse actions that manipulate distributed keys. Based on this formal description, we present results concerning the expected exhaustiveness for a number of scenarios and systems maintained by the Synaps...

  19. Hybrid Long-Distance Entanglement Distribution Protocol

    DEFF Research Database (Denmark)

    Brask, J.B.; Rigas, I.; Polzik, E.S.;

    2010-01-01

    We propose a hybrid (continuous-discrete variable) quantum repeater protocol for long-distance entanglement distribution. Starting from states created by single-photon detection, we show how entangled coherent state superpositions can be generated by means of homodyne detection. We show that near......-deterministic entanglement swapping with such states is possible using only linear optics and homodyne detectors, and we evaluate the performance of our protocol combining these elements....

  20. Field Monitoring Protocol. Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Earle, L. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Christensen, D. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Maguire, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Wilson, E. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Hancock, C. E. [Mountain Energy Partnership, Longmont, CO (United States)

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  1. Variable TDMA MAC Protocol For WDM EPON

    Institute of Scientific and Technical Information of China (English)

    Minsuk; Jung; Yongseok; Chang; Jonghoon; Eom; Sungho; Kim

    2003-01-01

    A MAC(Media Access Control) protocol, one of the most important technologies for an EPON(Ethernet Passive Optical Network), contains a scheduling algorithm to avoid collisions in shared links and assigns an effective bandwidth when ONUs (Optical Network Units) transfer signals upward. The current paper proposes a MAC Protocol that operates a TDMA(Time method with a variable slot assignment to overcome short of bandwidth using by the number of n wavelength., the next generation access network. To verify ...

  2. Field Monitoring Protocol: Heat Pump Water Heaters

    Energy Technology Data Exchange (ETDEWEB)

    Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

    2013-02-01

    This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

  3. Optimistic protocol for partitioned distributed database systems

    International Nuclear Information System (INIS)

    A protocol for transaction processing during partition failures is presented which guarantees mutual consistency between copies of data-items after repair is completed. The protocol is optimistic in that transactions are processed without restrictions during the failure; conflicts are detected at repair time using a precedence graph and are resolved by backing out transactions according to some backout strategy. The protocol is then evaluated using simulation and probabilistic modeling. In the simulation, several parameters are varied such as the number of transactions processed in a group, the type of transactions processed, the number of data-items present in the database, and the distribution of references to data-items. The simulation also uses different backout strategies. From these results we note conditions under which the protocol performs well, i.e., conditions under which the protocol backs out a small percentage of the transaction run. A probabilistic model is developed to estimate the expected number of transactions backed out using most of the above database and transaction parameters, and is shown to agree with simulation results. Suggestions are then made on how to improve the performance of the protocol. Insights gained from the simulation and probabilistic modeling are used to develop a backout strategy which takes into account individual transaction costs and attempts to minimize total backout cost. Although the problem of choosing transactions to minimize total backout cost is, in general, NP-complete, the backout strategy is efficient and produces very good results

  4. Network-topology-adaptive quantum conference protocols

    Institute of Scientific and Technical Information of China (English)

    Zhang Sheng; Wang Jian; Tang Chao-Jing; Zhang Quan

    2011-01-01

    As an important application of the quantum network communication,quantum multiparty conference has made multiparty secret communication possible.Previous quantum multiparty conference schemes based on quantum data encryption are insensitive to network topology.However,the topology of the quantum network significantly affects the communication efficiency,e.g.,parallel transmission in a channel with limited bandwidth.We have proposed two distinctive protocols,which work in two basic network topologies with efficiency higher than the existing ones.We first present a protocol which works in the reticulate network using Greeberger-Horne-Zeilinger states and entanglement swapping.Another protocol,based on quantum multicasting with quantum data compression,which can improve the efficiency of the network,works in the star-like network.The security of our protocols is guaranteed by quantum key distribution and one-time-pad encryption.In general,the two protocols can be applied to any quantum network where the topology can be equivalently transformed to one of the two structures we propose in our protocols.

  5. Performance of coopMAC Protocols over CSMA/CA 802.11 protocols

    Directory of Open Access Journals (Sweden)

    H.Srikanth.Kamath

    2013-06-01

    Full Text Available Wireless communication is very fast becoming the most frequently used form of communication. Ad-Hoc networks can be easily set up anywhere without any infrastructure cost and its mobility adds to its advantage. Hence with increase in its demand the quality of the setup comes under scrutiny, hence calling for its development. This paper presents the concept of Cooperative MAC protocols. Cooperative MAC protocols are found to be more efficient over 802.11 MAC protocols and improve the network performance substantially. Comparison of 802.11 MAC protocols and CoopMAC protocols on NS2 platform is carried out and successfully proved that cooperative MAC protocols offer much higher throughput.

  6. EAR Protocol-Towards Fair Optimistic Non-Repudiation Exchange

    Institute of Scientific and Technical Information of China (English)

    WANG Hai-yan; WANG Ru-chuan

    2005-01-01

    Fairness is of crucial importance for the exchange protocols via Internet. Non-repudiation therefore becomes one of the vital premises, which are essential in the exchange of sensitive and important messages. This paper is to propose a new exchange protocol, termed "EAR" Exchange Protocol as it consists of three sub-protocols: Exchange sub-protocol, Abort sub-protocol and Recovery sub-protocol. It is to be argued that the incorporation of these three sub-protocols may effectively enables EAR to assure non-repudiation, strong fairness, timeliness, confidentiality and the minimized involvement of the Trusted Third Party (TTP).

  7. Security Analysis of Broadcaster Group Key Exchange Protocols

    Institute of Scientific and Technical Information of China (English)

    LI Li; ZHANG Huanguo

    2006-01-01

    Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.

  8. Chain-Chain Based Routing Protocol

    Directory of Open Access Journals (Sweden)

    Samia A Ali

    2011-05-01

    Full Text Available Wireless sensor network (WSN is an emerging technology for monitoring physical world. WSNs consist of large numbers of sensor nodes operated by battery mostly in harsh environment. Thus energy conservation is a primary issue for organization of these sensor nodes. Another crucial issue is the data delivery time by sensor nodes to the sink node, especially in Military, medical fields, and security monitoring systems where minimum delay is desirable. Number of protocols has been proposed in the literature for routing. One of such protocols is the cluster based routing protocol LEACH (low energy adaptive clustering hierarchy. LEACH protocol organizes WSN into a set of clusters and a periodic voting for cluster head is performed in order to be evenly distributed among all the sensors of the WSN. This periodical cluster head voting in LEACH, however, consumes an amount of non-negligible energy and other resources. For energy conservation, PEGASIS (power efficient gathering in sensor information systems a near optimal chain-based protocol has been proposed, however, it is faced with the challenge of long delay for the transmitted data. Another routing protocol called CCM (Chain-Cluster based Mixed routing, which is mainly a hybrid of LEACH and PEGASIS is proposed, the consumed energy increases as network size increases. In this paper, we propose an efficient routing protocol called CCBRP (Chain-Chain based routing protocol, it achieves both minimum energy consumption and minimum delay. The CCBRP protocol mainly divides a WSN into a number of chains (Greedy algorithm is used to form each chain as in PEGSIS protocol and runs in two phases. In the first phase, sensor nodes in each chain transmit data to their chain leader nodes in parallel. In the second phase, all chain leader nodes form a chain (also, using Greedy algorithm and choose randomly a leader node then all chain leader nodes send their data to this chosen leader node. This chosen leader node

  9. Protocol Independent Multicast Based States Allocation

    Directory of Open Access Journals (Sweden)

    G Hemalatha

    2012-02-01

    Full Text Available In this paper the Protocol Independent Multicast (PIM protocol is being used. The PIM protocol avoids the packet drop and diverting problem. The PIM protocol is not dependent on any specific unicast routing protocol. It is IP routing independent protocol. The PIM uses the unicast and multicast information to create a distribution tree along the reverse path from the receivers towards the source. The PIM protocol consists of three modes such as sparse mode, dense mode and bidirectional mode. The sparse mode is used to sends the file from router to a receiver. The dense mode is used to sends the file from router to multiple receivers. The bidirectional mode is used to sends the message from router to sender and then continue the other process depending on the sender requirements. The client sends the file from sender to destination via the router. First the sender selects the file name and receiver name for transmission. Then the state is assigned automatically depend upon the user selection. The state can be defined by the number of destination selected to transmit the file from the source. If the sender selects single destination, it will assign “Without forwarding state router” for transmission. Otherwise it will assign “Forwarding state router” for transmission. If the receiver is not available, the router sends a message to sender such that “the requested receiver is not available”. Then the client will decide the file is transfer or not, it will reply with transfer the file, then the file will be transferred until the file will be discarded at client side. If the sender tries the same process after two times, the router will display the warning message as “the requested receiver is not available, this file will be discarded at client side”. Then it continues the other process.

  10. Performance Evaluation of Routing Protocols in MANET

    Directory of Open Access Journals (Sweden)

    Smitha Sunny

    2015-01-01

    Full Text Available Mobile Ad-Hoc Network (MANET is an autonomous system that is composed of the mobile nodes which communicates through wireless links without any preexisting infrastructure. MANET is a collection of mobile nodes which can self-organize freely and dynamically into arbitrary and temporary network topologies. Mobile nodes in ad-hoc networks function as a router and can dynamically establish routes among themselves by means of a routing protocol. Routing protocols in mobile ad-hoc network helps node to send and receive packets. Therefore, selection of an appropriate routing protocol is an integral part of establishing a MANET. A suitable and effective routing mechanism helps to extend the successful deployment of mobile ad-hoc networks. An attempt has been made to compare the performance between on-demand reactive routing protocols namely AODV, DSR and proactive routing protocol namely DSDV for Constant Bit Rate (CBR traffic by varying network scope i.e. number of participating nodes as well as by varying the speed. The parameters used for evaluation are Packet delivery ratio (PDR, Normalized routing overhead, Average end to end delay (Delay, Throughput and Average Energy consumption. The simulations are carried out using Network Simulator NS2:34.

  11. A Lightweight Buyer-Seller Watermarking Protocol

    Directory of Open Access Journals (Sweden)

    Yongdong Wu

    2008-01-01

    Full Text Available The buyer-seller watermarking protocol enables a seller to successfully identify a traitor from a pirated copy, while preventing the seller from framing an innocent buyer. Based on finite field theory and the homomorphic property of public key cryptosystems such as RSA, several buyer-seller watermarking protocols (N. Memon and P. W. Wong (2001 and C.-L. Lei et al. (2004 have been proposed previously. However, those protocols require not only large computational power but also substantial network bandwidth. In this paper, we introduce a new buyer-seller protocol that overcomes those weaknesses by managing the watermarks. Compared with the earlier protocols, ours is n times faster in terms of computation, where n is the number of watermark elements, while incurring only O(1/lN times communication overhead given the finite field parameter lN. In addition, the quality of the watermarked image generated with our method is better, using the same watermark strength.

  12. WDM Network and Multicasting Protocol Strategies

    Directory of Open Access Journals (Sweden)

    Pinar Kirci

    2014-01-01

    Full Text Available Optical technology gains extensive attention and ever increasing improvement because of the huge amount of network traffic caused by the growing number of internet users and their rising demands. However, with wavelength division multiplexing (WDM, it is easier to take the advantage of optical networks and optical burst switching (OBS and to construct WDM networks with low delay rates and better data transparency these technologies are the best choices. Furthermore, multicasting in WDM is an urgent solution for bandwidth-intensive applications. In the paper, a new multicasting protocol with OBS is proposed. The protocol depends on a leaf initiated structure. The network is composed of source, ingress switches, intermediate switches, edge switches, and client nodes. The performance of the protocol is examined with Just Enough Time (JET and Just In Time (JIT reservation protocols. Also, the paper involves most of the recent advances about WDM multicasting in optical networks. WDM multicasting in optical networks is given as three common subtitles: Broadcast and-select networks, wavelength-routed networks, and OBS networks. Also, in the paper, multicast routing protocols are briefly summarized and optical burst switched WDM networks are investigated with the proposed multicast schemes.

  13. Manet Load Balancing Parallel Routing Protocol

    Directory of Open Access Journals (Sweden)

    Hesham Arafat Ali

    2012-07-01

    Full Text Available In recent years, multi-path routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency in improving bandwidth of communication, increasing delivery reliability, responding to congestion and heavy traffic. Several protocols have been developed to address multi path routing, but it always has a problem that the discovered paths may be not 100% disjoint and sending data is done in only one path until it's broken; the discovery of multiple paths also generates more overhead on the network. Load Balancing Parallel Routing Protocol [LBPRP] tried to solve previous multi path problems, distributing traffic among multiple paths sending data in parallel form as it uses all paths in the same time. We employed a simple test scenario to be sure of proposed model efficiency and to validate the proposed Load Balancing Parallel Routing Protocol. [LBPRP] will achieve load balancing in sending data, decreasing the end-to-end delay and increasing the packet delivery ratio and throughput, thus the performance of multi-path routing protocols can be improved consequently.

  14. Economics of the Kyoto Protocol for Russia

    Energy Technology Data Exchange (ETDEWEB)

    Golub, D.D.; Strukova, E. [Environmental Defense, Washington, DC (United States)

    2004-07-01

    The authors propose a careful analysis of the economic consequences of the Kyoto Protocol for Russian economic recovery. They review a different GHG forecasts for Russia and develop a new forecast for uncertain GDP growth and the changing elasticity of GHG emissions per GDP. As the rate of growth remains uncertain, elasticity could change over time, as well as the fuel mix. They apply the Monte-Carlo method to simulate these uncertainties and to produce a reasonable interval for CO{sub 2} emissions in 2010. The probability of Russia exceedings its Kyoto emissions budget is essentially zero. They also discuss the benefits for Russia from the Kyoto Protocol, and more generally from the implementation of GHG mitigation policy. Ancillary benefits from Kyoto Protocol implementation will bring essential reductions in risk to human health. On the other hand, potential negative changes in the fuel mix and GDP structure, as well as a slowing of the innovation process, could exacerbate the existing health problems. Alternatives to the Kyoto Protocol may bring much tougher commitments to Russia. In conclusion the Kyoto Protocol is the best possible deal for Russia. 24 refs., 4 figs., 5 tabs.

  15. Controlled Delegation Protocol in Mobile RFID Networks

    Directory of Open Access Journals (Sweden)

    Yang MingHour

    2010-01-01

    Full Text Available To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is to say, reader-tag mutual authentication can be performed without readers being connected to back-end server. Readers are also allowed off-line access to tags' data. Compared with other delegation protocols, our scheme uniquely enables back-end server to limit each reader's reading times during delegation. Even in a multireader situation, our protocol can limit reading times and reading time periods for each of them and therefore makes back-end server's delegation more flexible. Besides, our protocol can prevent authorized readers from transferring their authority to the unauthorized, declining invalid access to tags. Our scheme is proved viable and secure with GNY logic; it is against certain security threats, such as replay attacks, denial of service (DoS attacks, Man-in-the-Middle attacks, counterfeit tags, and breaches of location and data privacy. Also, the performance analysis of our protocol proves that current tags can afford the computation load required in this scheme.

  16. Semen cryopreservation protocols of Mangalarga Marchador stallions

    Directory of Open Access Journals (Sweden)

    Marcela Leite Candeias

    2012-09-01

    Full Text Available The effect of the utilization of three semen protocols (Inra 82®, Merck Gema and Botu-crio® and two filling techniques (0.25 and 0.50 mL straws in Mangalarga Marchador stallions were studied in this experiment. Sperm parameters were assessed during processing and post-freezing. No interactions between the protocols and type of filling were observed, so they were assessed separately. Sperm parameters were not altered when the extender was added to the centrifugation; however, there was reduction of motility and strength when freezing extenders were added. The Botu-crio® protocol preserved the parameters of total and progressive sperm motility, smoothed path velocity (µm/s, straight line velocity (µm/s, track velocity (µm/s and the average and fast spermatozoa percentage better than the others. No difference between the extenders for the percentage of sperm integrity was observed. There was no difference in the responses studied on the filling techniques. The stallions presented better freezing with the use of the Botu-crio® protocol. The best post-freezing viability results were found for semen frozen using the Botu-crio® protocol and there were no differences concerning the sperm quality comparing 0.25 and 0.50 mL straws.

  17. Eccentricity in Zone Routing Protocol for MANET

    Directory of Open Access Journals (Sweden)

    Mrs Komal Nair

    2012-06-01

    Full Text Available A Mobile Ad-Hoc Network (MANET is a decentralized network of autonomous mobile nodes, able to communicate with each other over wireless links. Due to the mobility of the nodes, the topology ofthe network changes spontaneously, therefore use of conventional routing tables maintained at fixed points (routers is not suggested. Such a network may operate in a standalone fashion. There are variousrouting protocols available for MANETs. The most popular ones are DSR, DSDV and ZRP .The zone routing protocol (ZRP is a hybrid routing protocol that proactively maintains routes within a localregion of the network. ZRP can be configured for a particular network through adjustment of a single parameter, the routing zone radius. In this paper, we address the issue of configuring the ZRP to providethe best performance for a particular network at any time with the concept of eccentricity. The results illustrate the important characteristics of different protocols based on their performance and thus suggest some improvements in the respective protocol. The tools used for the simulation are NS2 which is the main simulator, NAM (Network Animator and Tracegraph which is used for preparing the graphs from the trace files.

  18. Welfare Quality assessment protocol for laying hens = Welfare Quality assessment protocol voor leghennen

    OpenAIRE

    Niekerk, van, M.; H. Gunnink; Reenen, van, A Alexander

    2012-01-01

    Results of a study on the Welfare Quality® assessment protocol for laying hens. It reports the development of the integration of welfare assessment as scores per criteria as well as simplification of the Welfare Quality® assessment protocol. Results are given from assessment of 122 farms.

  19. Animation of Natural Language Specifications of Authentication Protocols

    Directory of Open Access Journals (Sweden)

    Mabroka A. Mayouf

    2008-01-01

    Full Text Available Problem Statement: A few visualization tools have been created for protocol design and analysis. Although these tools provide an environment for designing security protocols, each one has its own protocol definition language (its also called informal specification language. The problem is that the user should understand the language which related to the used tool in order to define an exist protocol or design a new one. For specification, a language needs to be intuitive as well as easily usable and understandable by the security protocol engineer. It must be able to precisely and unambiguously specify the behavior of security protocol. Approach: In this study, we propose an approach for protocol specification based on the Natural language definitions of protocol semantics. By using programmatic semantics together with animations, representational flexibility of different protocol demonstration is retained for as long as it is needed. Result: This study provides an environment that can be used by protocols designers to develop and investigate different scenarios of security protocols especially authentication protocols. Natural Language Protocol Specifications (NLPS approach is used to define the protocol. The environment accepts the natural language text of protocol specifications and converts it to animations of protocol behavior. Conclusions/Recommendations: NLPS environment can really help protocol designer to consider and investigate the behavior of security protocols. It can also be used for teaching-learning security protocol concepts. In further, we will consider the possibility of analyzing security protocols using our NLPS environment and animation techniques in order to improve the correctness; that is determining whether or not the intended security properties of a protocol do hold.

  20. Incorporating ethical principles into clinical research protocols: a tool for protocol writers and ethics committees

    Science.gov (United States)

    Li, Rebecca H; Wacholtz, Mary C; Barnes, Mark; Boggs, Liam; Callery-D'Amico, Susan; Davis, Amy; Digilova, Alla; Forster, David; Heffernan, Kate; Luthin, Maeve; Lynch, Holly Fernandez; McNair, Lindsay; Miller, Jennifer E; Murphy, Jacquelyn; Van Campen, Luann; Wilenzick, Mark; Wolf, Delia; Woolston, Cris; Aldinger, Carmen; Bierer, Barbara E

    2016-01-01

    A novel Protocol Ethics Tool Kit (‘Ethics Tool Kit’) has been developed by a multi-stakeholder group of the Multi-Regional Clinical Trials Center of Brigham and Women's Hospital and Harvard. The purpose of the Ethics Tool Kit is to facilitate effective recognition, consideration and deliberation of critical ethical issues in clinical trial protocols. The Ethics Tool Kit may be used by investigators and sponsors to develop a dedicated Ethics Section within a protocol to improve the consistency and transparency between clinical trial protocols and research ethics committee reviews. It may also streamline ethics review and may facilitate and expedite the review process by anticipating the concerns of ethics committee reviewers. Specific attention was given to issues arising in multinational settings. With the use of this Tool Kit, researchers have the opportunity to address critical research ethics issues proactively, potentially speeding the time and easing the process to final protocol approval. PMID:26811365

  1. A Review: Multi Protocol Label Switching (Mpls

    Directory of Open Access Journals (Sweden)

    Rashed Qayoom Shawl,

    2014-01-01

    Full Text Available The demand for technology called MPLS is increasing day by day in most internet service provider networks. Majority of the carriers are deploying MPLS in their backbone networks to facilitate a number of services and applications such as virtual private networks, quality of service (QoS and traffic engineering. MPLS is a scalable, protocol-independent protocol. MPLS allows for creating end-to-end circuits across any type of transport medium using any protocol. The primary benefit of MPLS is to eliminate the dependence on a particular OSI model data-link layer technology such as asynchronous transfer mode (ATM, Frame Relay or Ethernet and eliminates the need for multiple layer-2 networks to satisfy different types of traffic. This paper reflects a detailed overview on MPLS with its architectural terminology, working and the services that it offers.

  2. MILITARY MULTI-HOP ROUTING PROTOCOL

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Military tactical network is one of the most important applications of ad hoc network. Currently the existing routing protocols are put forward based on the simple and universal network model which has the ability of multi-hop routing but cannot work efficiently in the special military applications. The narrow bandwidth and limited energy of the wireless network make general routing protocols seem to be more redundant.In order to satisfy military needs properly, this letter makes a detailed analysis of physical nodes and traffic distribution in military network, uses cross-layer design concept for reference, combines traffic characteristic of application layer with routing protocol design. It categorized routing problem as crucial routes and non-crucial routes which adopted separate maintenance methods. It not only realizes basic transmission function but also works efficiently. It is quite fit for military application.

  3. Chapter 15: Commercial New Construction Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Keates, S.

    2014-09-01

    This protocol is intended to describe the recommended method when evaluating the whole-building performance of new construction projects in the commercial sector. The protocol focuses on energy conservation measures (ECMs) measures (or packages of measures) where evaluators can best analyze impacts using building simulation. These ECMs typically require the use of calibrated building simulations under Option D of the International Performance Measurement and Verification Protocol. Examples of such measures include Leadership in Energy and Environmental Design building certification, novel and/or efficient heating, ventilation, and air conditioning system designs, and extensive building controls systems. In general, it is best to evaluate any ECM (or set of measures) expected to significantly interact with other systems within the building and with savings sensitive to seasonal variations in weather.

  4. Chapter 22: Compressed Air Evaluation Protocol

    Energy Technology Data Exchange (ETDEWEB)

    Benton, N.

    2014-11-01

    Compressed-air systems are used widely throughout industry for many operations, including pneumatic tools, packaging and automation equipment, conveyors, and other industrial process operations. Compressed-air systems are defined as a group of subsystems composed of air compressors, air treatment equipment, controls, piping, pneumatic tools, pneumatically powered machinery, and process applications using compressed air. A compressed-air system has three primary functional subsystems: supply, distribution, and demand. Air compressors are the primary energy consumers in a compressed-air system and are the primary focus of this protocol. The two compressed-air energy efficiency measures specifically addressed in this protocol are: high-efficiency/variable speed drive (VSD) compressor replacing modulating compressor; compressed-air leak survey and repairs. This protocol provides direction on how to reliably verify savings from these two measures using a consistent approach for each.

  5. Framework Design of Secure Cloud Transmission Protocol

    Directory of Open Access Journals (Sweden)

    Dinesha H A

    2013-01-01

    Full Text Available Cloud computing technologies are in high demand because of several benefits. Many business organizations are looking into cloud computing services to reduce the cost and complexity of their business infrastructure and its preservation. However, there are certain security issues in cloud computing technologies. To overcome those security issues, we propose secure cloud transmission protocol design. This framework design details will help us in developing a secure protocol for the customers who are using cloud computing technologies over insecure internet. In this paper we discuss: i Overview model of proposed secure cloud transmission system in internet ii Security requirements iii roles and responsibilities of secure transmission protocol in OSI and iv Framework Design of secure cloud transmission.

  6. Efficient Controlled Quantum Secure Direct Communication Protocols

    Science.gov (United States)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  7. Recursion vs. Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Huttel, Hans; Srba, Jiri

    2005-01-01

    We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbeek......'s spectrum, become undecidable for a very simple recursive extension of the protocol. The result holds even if no nondeterministic choice operator is allowed. We also show that the extended calculus is capable of an implicit description of the active intruder, including full analysis and synthesis of...... messages in the sense of Amadio, Lugiez and Vanackere. We conclude by showing that reachability analysis for a replicative variant of the protocol becomes decidable....

  8. Analysis of Security Protocols by Annotations

    DEFF Research Database (Denmark)

    Gao, Han

    The trend in Information Technology is that distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great...... deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal. It has long been a challenge to determine conclusively whether a given protocol is secure or not....... The development of formal techniques, e.g. control flow analyses, that can check various security properties, is an important tool to meet this challenge. This dissertation contributes to the development of such techniques. In this dissertation, security protocols are modelled in the process calculus LYSA...

  9. Performance Evaluation of MANET Routing Protocols

    Directory of Open Access Journals (Sweden)

    Hrituparna Paul

    2012-07-01

    Full Text Available The task of finding and sustaining routes in Mobile Ad-hoc Networks (MANETS is an important factor in determining the efficiency of any MANET protocol. MANET characteristically is an autonomous system of mobile nodes connected by wireless links without any centralised infrastructure. Absence of fixed infrastructures and host mobility thus network may experience rapid and unpredictable topology changes. Hence, routing is required in order to perform communication among the entire network. There are several routing protocols namely proactive, reactive and hybrid etc. In this paper we will discuss the active research work on these routing protocols and its performance evaluation. To this end, we adopt a simulation approach, which is more suitable to this kind of analysis

  10. Self Fault-Tolerance of Protocols: A Case Study

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    The prerequisite for the existing protocols' correctness is that protocols can be normally operated under the normal conditions, rather than dealing with abnormal conditions.In other words, protocols with the fault-tolerance can not be provided when some fault occurs. This paper discusses the self fault-tolerance of protocols. It describes some concepts and methods for achieving self fault tolerance of protocols. Meanwhile, it provides a case study, investigates a typical protocol that does not satisfy the self fault-tolerance, and gives a new redesign version of this existing protocol using the proposed approach.

  11. A Cryptographic Moving-Knife Cake-Cutting Protocol

    Directory of Open Access Journals (Sweden)

    Yoshifumi Manabe

    2012-02-01

    Full Text Available This paper proposes a cake-cutting protocol using cryptography when the cake is a heterogeneous good that is represented by an interval on a real line. Although the Dubins-Spanier moving-knife protocol with one knife achieves simple fairness, all players must execute the protocol synchronously. Thus, the protocol cannot be executed on asynchronous networks such as the Internet. We show that the moving-knife protocol can be executed asynchronously by a discrete protocol using a secure auction protocol. The number of cuts is n-1 where n is the number of players, which is the minimum.

  12. Objective and automated protocols for the evaluation of biomedical search engines using No Title Evaluation protocols

    Directory of Open Access Journals (Sweden)

    Campagne Fabien

    2008-02-01

    Full Text Available Abstract Background The evaluation of information retrieval techniques has traditionally relied on human judges to determine which documents are relevant to a query and which are not. This protocol is used in the Text Retrieval Evaluation Conference (TREC, organized annually for the past 15 years, to support the unbiased evaluation of novel information retrieval approaches. The TREC Genomics Track has recently been introduced to measure the performance of information retrieval for biomedical applications. Results We describe two protocols for evaluating biomedical information retrieval techniques without human relevance judgments. We call these protocols No Title Evaluation (NT Evaluation. The first protocol measures performance for focused searches, where only one relevant document exists for each query. The second protocol measures performance for queries expected to have potentially many relevant documents per query (high-recall searches. Both protocols take advantage of the clear separation of titles and abstracts found in Medline. We compare the performance obtained with these evaluation protocols to results obtained by reusing the relevance judgments produced in the 2004 and 2005 TREC Genomics Track and observe significant correlations between performance rankings generated by our approach and TREC. Spearman's correlation coefficients in the range of 0.79–0.92 are observed comparing bpref measured with NT Evaluation or with TREC evaluations. For comparison, coefficients in the range 0.86–0.94 can be observed when evaluating the same set of methods with data from two independent TREC Genomics Track evaluations. We discuss the advantages of NT Evaluation over the TRels and the data fusion evaluation protocols introduced recently. Conclusion Our results suggest that the NT Evaluation protocols described here could be used to optimize some search engine parameters before human evaluation. Further research is needed to determine if NT

  13. Study Application of RADIUS Protocol on Ethernet

    Institute of Scientific and Technical Information of China (English)

    GUO Fang; YANG Huan-yu; LI Hong

    2004-01-01

    This paper presents how to apply the RADIUS (Remote Authentication Dial In User Service)protocol ,which is generally applied to dial-up network, to the authentication & charge of Broad Band accessing control system on Ethernet. It is provided that the Broad Band accessing control system included a self-designed communication protocol is used in communicating between an terminal user and Network Access Server .The interface module on the servers side and the Radius system is also given in this article.

  14. NADA protocol: integrative acupuncture in addictions.

    Science.gov (United States)

    Carter, Kenneth; Olshan-Perlmutter, Michelle

    2014-01-01

    National Acupuncture Detoxification Association (NADA) acupuncture is a simple, standardized, 1- to 5-point auricular needling protocol that originated as a grass-roots response to the opiate epidemic of the 1970s. NADA acupuncture is increasingly recognized as a universally useful intervention in the treatment of addictions specifically and in behavior health more generally. It is recognized as a best practice in the treatment of substance use disorders. Integrative programs using the NADA protocol are likely to see improvements in engagement, retention, decreased drug cravings, anxiety, and less physical symptoms.

  15. A Protocol for Evaluating Contextual Design Principles

    Directory of Open Access Journals (Sweden)

    Arthur Stamps

    2014-11-01

    Full Text Available This paper explains how scientific data can be incorporated into urban design decisions, such as evaluating contextual design principles. The recommended protocols are based on the Cochrane Reviews that have been widely used in medical research. The major concepts of a Cochrane Review are explained, as well as the underlying mathematics. The underlying math is meta-analysis. Data are reported for three applications and seven contextual design policies. It is suggested that use of the Cochrane protocols will be of great assistance to planners by providing scientific data that can be used to evaluate the efficacies of contextual design policies prior to implementing those policies.

  16. Building multiservice Internet protocol virtual private networks

    Science.gov (United States)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  17. Explicit Protocol for Deterministic Entanglement Concentration

    Institute of Scientific and Technical Information of China (English)

    GU Yong-Jian; GAO Peng; GUO Guang-Can

    2005-01-01

    @@ We present an explicit protocol for extraction of an EPR pair from two partially entangled pairs in a deterministic fashion via local operations and classical communication. This protocol is constituted by a local measurement described by a positive operator-valued measure (POVM), one-way classical communication, and a corresponding local unitary operation or a choice between the two pairs. We explicitly construct the required POVM by the analysis of the doubly stochastic matrix connecting the initial and the final states. Our scheme might be useful in future quantum communication.

  18. Performance of Conferencing over MANET Routing Protocols

    Directory of Open Access Journals (Sweden)

    Md. Ibrahim Abdullah

    2012-06-01

    Full Text Available Wireless ad hoc network represents a system of wireless nodes that can freely and dynamically self-organize into arbitrary and temporary network topologies, allowing people and devices to seamlessly internet-work in areas without any preexisting communication infrastructure. The routing protocols of this network elapsed much time in route discovery and route maintenances. In this research work we have studied the performance of routing protocols DSR and AODV when the nodes involved in video conferencing. Simulation studies show that AODV is better than DSR in coverage area with acceptable delay and packet loss.

  19. Variable TDMA MAC Protocol For WDM EPON

    Institute of Scientific and Technical Information of China (English)

    Minsuk Jung; Yongseok Chang; Jonghoon Eom; Sungho Kim

    2003-01-01

    A MAC(Media Access Control) protocol, one of the most important technologies for an EPON(Ethernet Passive Optical Network), contains a scheduling algorithm to avoid collisions in shared links and assigns an effective bandwidth when ONUs (Optical Network Units) transfer signals upward. The current paper proposes a MAC Protocol that operates a TDMA(Time method with a variable slot assignment to overcome short of bandwidth using by the number of n wavelength., the next generation access network. To verify the above, the current study also implements an EPON model using OPNET as the simulation tool.

  20. Comparison of Five Parathyroid Scintigraphic Protocols

    OpenAIRE

    Virpi Tunninen; Pekka Varjo; Jukka Schildt; Aapo Ahonen; Tomi Kauppinen; Irina Lisinen; Anu Holm; Hannu Eskola; Marko Seppänen

    2013-01-01

    Objectives. We compared five parathyroid scintigraphy protocols in patients with primary (pHPT) and secondary hyperparathyroidism (sHPT) and studied the interobserver agreement. The dual-tracer method (99mTc-sestamibi/123I) was used with three acquisition techniques (parallel-hole planar, pinhole planar, and SPECT/CT). The single-tracer method (99mTc-sestamibi) was used with two acquisition techniques (double-phase parallel-hole planar, and SPECT/CT). Thus five protocols were used, resulting ...

  1. Optimal protocols for slowly driven quantum systems.

    Science.gov (United States)

    Zulkowski, Patrick R; DeWeese, Michael R

    2015-09-01

    The design of efficient quantum information processing will rely on optimal nonequilibrium transitions of driven quantum systems. Building on a recently developed geometric framework for computing optimal protocols for classical systems driven in finite time, we construct a general framework for optimizing the average information entropy for driven quantum systems. Geodesics on the parameter manifold endowed with a positive semidefinite metric correspond to protocols that minimize the average information entropy production in finite time. We use this framework to explicitly compute the optimal entropy production for a simple two-state quantum system coupled to a heat bath of bosonic oscillators, which has applications to quantum annealing. PMID:26465432

  2. Statistical principles for prospective study protocols:

    DEFF Research Database (Denmark)

    Christensen, Robin; Langberg, Henning

    2012-01-01

    In the design of scientific studies it is essential to decide on which scientific questions one aims to answer, just as it is important to decide on the correct statistical methods to use to answer these questions. The correct use of statistical methods is crucial in all aspects of research...... (rigorous) protocol writing too troublesome, will realize that they have already written the first half of the final paper if they follow these recommendations; authors simply need to change the protocols future tense into past tense. Thus, the aim of this clinical commentary is to describe and explain...

  3. A Formal Approach to Protocol Interoperability Testing

    Institute of Scientific and Technical Information of China (English)

    郝瑞兵; 吴建平

    1998-01-01

    Porotocol Interoperability testing is an important means to ensure the interconnection and interoperation between protocol products.In this paper,we proposed a formal approach to protocol interoperability testing based on the operational semantics of Concurrent TTCN.We define Concurrent TTCN's operational semantics by using Labeled Transition System,and describe the interoperability test execution and test verdict based on Concurrent TTCN.This approach is very helpful for the formation of formal interoperability testing theory and construction of general interoperability testing system.

  4. Automated Theorem Proving for Cryptographic Protocols with Automatic Attack Generation

    OpenAIRE

    Jan Juerjens; Thomas A. Kuhn

    2016-01-01

    Automated theorem proving is both automatic and can be quite efficient. When using theorem proving approaches for security protocol analysis, however, the problem is often that absence of a proof of security of a protocol may give little hint as to where the security weakness lies, to enable the protocol designer to improve the protocol. For our approach to verify cryptographic protocols using automated theorem provers for first-order logic (such as e-SETHEO or SPASS), we demonstrate a method...

  5. A New Route Maintenance in Dynamic Source Routing Protocol

    CERN Document Server

    Shukla, Ashish

    2010-01-01

    Mobile ad-hoc network (MANET) is infrastructureless, self-organizable, multi hop packet switched network. A number of routing protocols for MANETs have been proposed in recent years. Dynamic Source Routing (DSR) protocol is one of the most popular routing protocol for ad hoc networks. This paper presents a novel method to enhance route maintenance part of DSR protocol. Our proposed route maintenance significantly increases the efficiency of the protocol at the time of route failures.

  6. Performance Comparison of Routing Protocols for Remote Login in MANETs

    OpenAIRE

    VIKAS GOYAL; SHAVETA RANI; PARAMJIT SINGH

    2013-01-01

    Wireless networks are those networks, in which devices are connected without using cables. Thebest example, which comes across in our daily life is mobile phones. MANET has mobile nodes in network,which transfer data packets from source node to destination node; this is possible by routing protocols. Inthis paper, the routing protocols used are - Ad hoc On-Demand Distance Vector (AODV) Protocol,Geographical Routing Protocol (GRP) and Optimized Link State Routing (OLSR) Protocol. The performan...

  7. A Security Analysis of the 802.11s Wireless Mesh Network Routing Protocol and Its Secure Routing Protocols

    OpenAIRE

    Seong-Moo Yoo; Jun Huy Lam; Sang-Gon Lee; Whye Kit Tan

    2013-01-01

    Wireless mesh networks (WMNs) can act as a scalable backbone by connecting separate sensor networks and even by connecting WMNs to a wired network. The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for the 802.11s WMN. The routing protocol is one of the most important parts of the network, and it requires protection, especially in the wireless environment. The existing security protocols, such as the Broadcast Integrity Protocol (BIP), Counter with cipher block chaining...

  8. Secure Bidirectional Communication Protocol without Quantum Channel

    OpenAIRE

    Zhang, Z. J.; Man, Z. X.

    2004-01-01

    In this letter we propose a theoretical deterministic secure direct bidirectional quantum communication protocol by using swapping quantum entanglement and local unitary operations, in which the quantum channel for photon transmission can be discarded, hence any attack with or without eavesdropping or even the destructive attack without scruple is impossible.

  9. Cognitive Radio MAC Protocol for WLAN

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    To solve the performance degradation issue in current WLAN caused by the crowded unlicensed spectrum, we propose a cognitive radio (CR) media access protocol, C-CSMA/CA. The basic idea is that with cognitive radio techniques the WLAN devices can not only access the legacy WLAN unlicensed spectrum...

  10. Plant Fungal Pathogens: Methods and Protocols

    NARCIS (Netherlands)

    Bolton, M.D.; Thomma, B.P.H.J.

    2012-01-01

    Over the course of evolution, fungi have adapted to occupy specific niches, from symbiotically inhabiting the flora of the intestinal tract of mammals to saprophytic growth on leaf litter resting on the forest floor. In Plant Fungal Pathogens: Methods and Protocols, expert researchers in the field d

  11. Recursion Versus Replication in Simple Cryptographic Protocols

    DEFF Research Database (Denmark)

    Hüttel, Hans; Srba, Jiri

    2005-01-01

    We use some very recent techniques from process algebra to draw interesting conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we show that all nontrivial properties, including reachability and equivalence checking wrt. the whole van Glabbee...

  12. A classification of service discovery protocols

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Hartel, Pieter; Scholten, Hans

    2005-01-01

    Service discovery is an emerging field in the area of ubiquitous computing. There are various techniques and protocols (proposed or/and already implemented) particularly tailored to specific sets of objectives. This paper analyses the current state of the art and presents a taxonomy of service disco

  13. Implementing the Environmental Protocol Domestically : An Overview

    NARCIS (Netherlands)

    Bastmeijer, C.J.; Vidas, Davor

    2000-01-01

    This book - edited by Davor Vidas of the Nansens Institute (Oslo, Norway) - is the first book that comprehensively discusses the implementation of the Environmental Protocol to the Antarctic Treaty. Part V of this book includes a number of chapters describing the measures that have been taken by sel

  14. Smart environments technology, protocols and applications

    CERN Document Server

    Cook, Diane

    2004-01-01

    Smart Environments contains contributions from leading researchers, describing techniques and issues related to developing and living in intelligent environments. Reflecting the multidisciplinary nature of the design of smart environments, the topics covered include the latest research in smart environment philosophical and computational architecture considerations, network protocols for smart environments, intelligent sensor networks and powerline control of devices, and action prediction and identification.

  15. SECURED ELECTRONIC VOTING PROTOCOL USING HYBRID CRYPTOSYSTEM

    Directory of Open Access Journals (Sweden)

    KALAICHELVI V

    2013-04-01

    Full Text Available Electronic Voting play a really vital role in the democracy of our life. In this paper, we propose an electronic voting protocol. Our scheme does not require a special voting channel and communication can occur entirely over the current Internet. This method integrates the Internet convenience and cryptology. In the existing protocol the Tallier has to wait until the decryption key is received from the voter. So it will consume lot of time. But, the proposed protocol is based on the hybrid cryptosystem. In this, the ballot is encrypted using faster secret key algorithm and the digital envelope is encrypted using Tallier’s public key. So, the Tallier will decrypt the digital envelope using his own private key to get the secret key and then the encrypted ballot is decrypted using that secret key. So, comparatively the proposed protocol consumes less time. This paper also analyzes the various security issues involved in an electronic voting like security, privacy, authentication, anonymous, uniqueness, accuracy, fairness, efficiency and uncoercibility.

  16. Sessions and Separability in Security Protocols

    DEFF Research Database (Denmark)

    Carbone, Marco; Guttman, Joshua

    2013-01-01

    Despite much work on sessions and session types in non- adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof methods. We provide a syntactic property that guarantees that a protocol has session-respecting executions. Any uncomprom...

  17. Protocols for communication and governance of risks

    NARCIS (Netherlands)

    Vrouwenvelder, A.C.W.M.; Lind, N.C.; Faber, M.H.

    2015-01-01

    The aim of this paper is to explain the need to organize the development of standard protocols for communication about major public risks. Tragic events, such as inadequate earthquake preparedness or great unnecessary losses of life due to public misunderstandings underline the importance of such pr

  18. Secure communication protocol for mobile multimedia applications

    OpenAIRE

    Komninos, N.; Honary, B.; Darnell, M.

    2000-01-01

    Data transmission over wireless communication networks is increasing rapidly and security has become a very important issue. The main considerations of secure communication systems are authentication, key distribution, and data transfer. This paper describes a secure communication protocol (SCP), which provides privacy and data integrity for end-to-end data transmission over wireless communication systems.

  19. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    ” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  20. Evaluating Computer-Tutors: A Protocol Study.

    Science.gov (United States)

    Strickland, James

    A protocol study investigated whether computer tutors (programs that interactively guide writers while they freewrite with a word processing program) promote or hinder a richer understanding of the composing process. The analysis focused on writers' attitudes toward computer tutors in the invention process. Data were collected by tape recording a…

  1. Demarcation of Security in Authentication Protocols

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    easier, and enables us to define security goals with a fine granularity. We present one such separation, by introducing the notion of binding sequence as a security primitive. A binding sequence, roughly speaking, is the only required security property of an authentication protocol. All other...... authentication goals, the correctness requirements, can be derived from the binding sequence....

  2. Delta-t protocol specification: working draft

    Energy Technology Data Exchange (ETDEWEB)

    Watson, R.W.

    1981-12-04

    This document is one of a series describing protocols associated with the Livermore Interactive Network Communication System (LINCS) hierarchical architecture. At the heart of LINCS is its basic interprocess communication (LINCS-IPC) service. LINCS-IPC defines a reliable, flow controlled, full duplex, uninterpreted, labeled bit stream communication service. LINCS-IPC is level 4 in the LINCS architecture. Level 3 of LINCS is the Network layer defining an internetwork datagram type service. LINCS-IPC interfaces to User processes that utilize higher level syntactic and semantic conventions for process interaction. The transport service provided by the Delta-t protocol can be considered a sublayer of the LINCS-IPC layer. Delta-t augments the Network level service as required to support LINCS-IPC. This document specifies the services provided by the Delta-t protocol to support LINCS-IPC, the operation of Delta-t, and the services Delta-t requires of the Network level. This document was written to be self-contained but the reader will find it useful to have available for reference the LINCS-IPC and LINCS DeltaGram Network layer protocol specifications. Implementations are underway in Pascal for the PDP-11 running under RT11 and RX11, in BLISS for the VAX running under VMS, in MODEL for the CRAY-1 and CDC 7600 running under NLTSS and LTSS, and for the SEL 32/75 running under PORT.

  3. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  4. Direct data access protocols benchmarking on DPM

    Science.gov (United States)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  5. A Bayesian approach to optimizing cryopreservation protocols

    Directory of Open Access Journals (Sweden)

    Sammy Sambu

    2015-06-01

    Full Text Available Cryopreservation is beset with the challenge of protocol alignment across a wide range of cell types and process variables. By taking a cross-sectional assessment of previously published cryopreservation data (sample means and standard errors as preliminary meta-data, a decision tree learning analysis (DTLA was performed to develop an understanding of target survival using optimized pruning methods based on different approaches. Briefly, a clear direction on the decision process for selection of methods was developed with key choices being the cooling rate, plunge temperature on the one hand and biomaterial choice, use of composites (sugars and proteins as additional constituents, loading procedure and cell location in 3D scaffolding on the other. Secondly, using machine learning and generalized approaches via the Naïve Bayes Classification (NBC method, these metadata were used to develop posterior probabilities for combinatorial approaches that were implicitly recorded in the metadata. These latter results showed that newer protocol choices developed using probability elicitation techniques can unearth improved protocols consistent with multiple unidimensionally-optimized physical protocols. In conclusion, this article proposes the use of DTLA models and subsequently NBC for the improvement of modern cryopreservation techniques through an integrative approach.

  6. A Geographical Heuristic Routing Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Luis Urquiza-Aguiar

    2016-09-01

    Full Text Available Vehicular ad hoc networks (VANETs leverage the communication system of Intelligent Transportation Systems (ITS. Recently, Delay-Tolerant Network (DTN routing protocols have increased their popularity among the research community for being used in non-safety VANET applications and services like traffic reporting. Vehicular DTN protocols use geographical and local information to make forwarding decisions. However, current proposals only consider the selection of the best candidate based on a local-search. In this paper, we propose a generic Geographical Heuristic Routing (GHR protocol that can be applied to any DTN geographical routing protocol that makes forwarding decisions hop by hop. GHR includes in its operation adaptations simulated annealing and Tabu-search meta-heuristics, which have largely been used to improve local-search results in discrete optimization. We include a complete performance evaluation of GHR in a multi-hop VANET simulation scenario for a reporting service. Our study analyzes all of the meaningful configurations of GHR and offers a statistical analysis of our findings by means of MANOVA tests. Our results indicate that the use of a Tabu list contributes to improving the packet delivery ratio by around 5% to 10%. Moreover, if Tabu is used, then the simulated annealing routing strategy gets a better performance than the selection of the best node used with carry and forwarding (default operation.

  7. Integrated Routing Protocol for Opportunistic Networks

    Directory of Open Access Journals (Sweden)

    Anshul Verma

    2011-03-01

    Full Text Available In opportunistic networks the existence of a simultaneous path is not assumed to transmit a message between a sender and a receiver. Information about the context in which the users communicate is a key piece of knowledge to design efficient routing protocols in opportunistic networks. But this kind of information is not always available. When users are very isolated, context information cannot be distributed, and cannot be used for taking efficient routing decisions. In such cases, context oblivious based schemes are only way to enable communication between users. As soon as users become more social, context data spreads in the network, and context based routing becomes an efficient solution. In this paper we design an integrated routing protocol that is able to use context data as soon as it becomes available and falls back to dissemination-based routing when context information is not available. Then, we provide a comparison between Epidemic and PROPHET, these are representative of context oblivious and context aware routing protocols. Our results show that integrated routing protocol is able to provide better result in term of message delivery probability and message delay in both cases when context information about users is available or not.

  8. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    are infeasible to invert. In fact, the security proofs of all currently employed cryptographic protocols need to assume some component being a one-way function. Unfortunately, at our current point i history, we really have no idea whether one-way functions even exist, and though most researchers in computational...

  9. The Nagoya Protocol: Fragmentation or Consolidation?

    Directory of Open Access Journals (Sweden)

    Carmen Richerzhagen

    2014-02-01

    Full Text Available In October, 2010, a protocol on access and benefit-sharing (ABS of genetic resources was adopted, the so-called Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity. Before the adoption of the Nagoya Protocol, the governance architecture of ABS was already characterized by a multifaceted institutional environment. The use of genetic resources is confronted with many issues (conservation, research and development, intellectual property rights, food security, health issues, climate change that are governed by different institutions and agreements. The Nagoya Protocol contributes to increased fragmentation. However, the question arises whether this new regulatory framework can help to advance the implementation of the ABS provisions of the Convention on Biological Diversity (CBD. This paper attempts to find an answer to that question by following three analytical steps. First, it analyzes the causes of change against the background of theories of institutional change. Second, it aims to assess the typology of the architecture in order to find out if this new set of rules will contribute to a more synergistic, cooperative or conflictive architecture of ABS governance. Third, the paper looks at the problem of “fit” and identifies criteria that can be used to assess the new ABS governance architecture with regard to its effectiveness.

  10. The Kyoto protocol in a global perspective

    Directory of Open Access Journals (Sweden)

    Tjaša Redek

    2009-11-01

    Full Text Available The global climate has changed notably since the beginning of the Industrial Revolution. Atmospheric concentrations of greenhouse gasses (GHG have increased dramatically followed by an increase in global average temperature. In order to avoid negative potential outcomes of global warming, countries have adopted the United Nations Framework Convention on Climate Change that has so far been ratified by 192 countries. In 1997 the Kyoto Protocol, a binding GHG reduction plan, was adopted and entered into force in 2005. But several countries, including the USA, have had doubts about the potential negative consequences of the planned 5% global joint reduction of GHG. However, studies generally show that on a macroeconomic level: (1 welfare loss in terms of GDP and lost growth in EU is low; (2 it differs among economies; and (3 permit trading and permit price (in either global or regional markets is highly correlated with the welfare loss. The main objective of the paper is to describe the attitudes and responses to the Kyoto Protocol from a global perspective. The paper has three objectives. First, to provide an overview of global greenhouse gas emissions and the big drivers behind these emissions. Second, to present where different countries, both developed and less developed countries, such as India, China and the countries of South-east Europe currently stand as regards their efforts to achieve the Kyoto Protocol requirements. Third, to analyse the responses and attitudes to the Kyoto Protocol from a country development perspective.

  11. The challenges of additional protocol implementation

    International Nuclear Information System (INIS)

    The IAEA Board of Governors approved the Model Protocol Additional to Safeguards Agreements, INFCIRC/540, (referred to as the Additional Protocol) in May 1997. The Additional Protocol provides for new mechanisms that include expanded information on State's nuclear activities to be declared to the IAEA and increased physical access to locations for IAEA inspectors. Given the expanded capability under the additional protocol for the Agency to draw conclusions regarding the absence of undeclared nuclear material and activities, Safeguards Department staff have had to broaden their outlook with respect to all safeguards activities being conducted. Beyond verification of nuclear material, inspectors are being called upon to conduct a wider range of activities, with more emphasis on observation of indicators of a State's nuclear-related activities and consideration of the consistency of the other information with a State's declarations. This includes consideration of how the evaluation of all information available to the Agency affects the planning and prioritizing of future safeguards activities, for example in resolving questions or inconsistencies in the declared information or selecting locations for conducting complementary access. The implementation of strengthened safeguards and the additional protocol has led to a need to institutionally change the roles of many staff members in the various Safeguards Divisions and increase the interaction between the Divisions to most effectively draw State-level conclusions regarding the absence of undeclared nuclear material and activities. This paper focuses on the significant changes in the roles of safeguards inspectors, in particular facility officers and country officers, in the implementation of strengthened safeguards. It outlines the nature of the changes, and some of the challenges being faced in order to adapt to these roles, including changes in the nature of interaction between the Operations and Support Divisions

  12. Adenosine stress protocols for myocardial perfusion imaging

    Directory of Open Access Journals (Sweden)

    Baškot Branislav

    2008-01-01

    Full Text Available Background/Aim. Treadmill test combined with myocardial perfusion scintigraphy (MPS is a commonly used technique in the assessment of coronary artery disease. There are many patients, however, who may not be able to undergo treadmill test. Such patients would benefit from pharmacological stress procedures combined with MPS. The most commonly used pharmacological agents for cardiac stress are coronary vasodilatators (adenosine, dipyridamol and catecholamines. Concomitant low-level treadmill exercise with adenosine pharmacologic stress (AdenoEX during MPS has become commonly used in recent years. A number of studies have demonstrated a beneficial impact of AdenoEX protocol. The aim of the study was, besides introducing into practice the two types of protocols of pharmatological stress test with adenosine, as a preparation for MPS, to compare and monitor the frequency of their side effects to quality, acquisition, as well as to standardize the onset time of acquisition (diagnostic imaging for both protocols. Methods. A total of 130 patients underwent pharmacological stress test with adenosine (vasodilatator. In 108 of the patients we performed concomitant exercise (AdenoEX of low level (50W by a bicycle ergometar. In 28 of the patients we performed Adenosine abbreviated protocol (AdenoSCAN. Side effects of adenosine were followed and compared between the two kinds of protocols AdenoEX and AdenoSCAN. Also compared were image quality and suggested time of acquisition after the stress test. Results. Numerous side effects were found, but being short-lived they did not require any active interventions. The benefit of AdenoEX versus AdenoSCAN included decreased side effects (62% vs 87%, improved safety and patients tolerance, improved target-to-background ratios because of less subdiaphragmatic activity, earlier acquisition, and improved sensitivity. Conclusion. The safety and efficacy of adenosine pharmacological stress is even better with concomitant

  13. Bayesian adaptive survey protocols for resource management

    Science.gov (United States)

    Halstead, Brian J.; Wylie, Glenn D.; Coates, Peter S.; Casazza, Michael L.

    2011-01-01

    Transparency in resource management decisions requires a proper accounting of uncertainty at multiple stages of the decision-making process. As information becomes available, periodic review and updating of resource management protocols reduces uncertainty and improves management decisions. One of the most basic steps to mitigating anthropogenic effects on populations is determining if a population of a species occurs in an area that will be affected by human activity. Species are rarely detected with certainty, however, and falsely declaring a species absent can cause improper conservation decisions or even extirpation of populations. We propose a method to design survey protocols for imperfectly detected species that accounts for multiple sources of uncertainty in the detection process, is capable of quantitatively incorporating expert opinion into the decision-making process, allows periodic updates to the protocol, and permits resource managers to weigh the severity of consequences if the species is falsely declared absent. We developed our method using the giant gartersnake (Thamnophis gigas), a threatened species precinctive to the Central Valley of California, as a case study. Survey date was negatively related to the probability of detecting the giant gartersnake, and water temperature was positively related to the probability of detecting the giant gartersnake at a sampled location. Reporting sampling effort, timing and duration of surveys, and water temperatures would allow resource managers to evaluate the probability that the giant gartersnake occurs at sampled sites where it is not detected. This information would also allow periodic updates and quantitative evaluation of changes to the giant gartersnake survey protocol. Because it naturally allows multiple sources of information and is predicated upon the idea of updating information, Bayesian analysis is well-suited to solving the problem of developing efficient sampling protocols for species of

  14. The braided single-stage protocol for quantum secure communication

    Science.gov (United States)

    Darunkar, Bhagyashri; Verma, Pramode K.

    2014-05-01

    This paper presents the concept and implementation of a Braided Single-stage Protocol for quantum secure communication. The braided single-stage protocol is a multi-photon tolerant secure protocol. This multi-photon tolerant protocol has been implemented in the laboratory using free-space optics technology. The proposed protocol capitalizes on strengths of the three-stage protocol and extends it with a new concept of braiding. This protocol overcomes the limitations associated with the three-stage protocol in the following ways: It uses the transmission channel only once as opposed to three times in the three-stage protocol, and it is invulnerable to man-in-the-middle attack. This paper also presents the error analysis resulting from the misalignment of the devices in the implementation. The experimental results validate the efficient use of transmission resources and improvement in the data transfer rate.

  15. MPT0G066, a novel anti-mitotic drug, induces JNK-independent mitotic arrest, JNK-mediated apoptosis, and potentiates antineoplastic effect of cisplatin in ovarian cancer

    Science.gov (United States)

    Huang, Han-Li; Chao, Min-Wu; Li, Ya-Chi; Chang, Li-Hsun; Chen, Chun-Han; Chen, Mei-Chuan; Cheng, Chun-Chun; Liou, Jing-Ping; Teng, Che-Ming; Pan, Shiow-Lin

    2016-01-01

    Developing new anticancer agents against ovarian cancer is an urgent medical need. MPT0G066, a novel synthetic arylsulfonamide compound, was shown to inhibit cell growth and decrease viability in human ovarian cancer cells. MPT0G066 induced arrest of the cell cycle at the multipolyploidy (MP) phase in SKOV3 and at the G2/M phase in A2780 cells, while increasing the proportion of cells in the subG1. Additionally, MPT0G066 induced c-Jun-NH2 terminal kinase (JNK) activation, influenced cell cycle regulatory and Bcl-2 family proteins, which triggered intrinsic apoptotic pathways through cleavage of caspase-3, -7, -9, and poly-(ADP-ribose) polymerase (PARP). Flow cytometry analysis of p-glycoprotein (p-gp) function showed that MPT0G066 was not a substrate of p-gp. Additionally, it was shown that MPT0G066 could decrease cell viability in multiple-drug-resistant human ovarian cancer cells. Furthermore, the combination of MPT0G066 and cisplatin presented a synergistic cytotoxic effect against ovarian cancer cell lines in vitro. MPT0G066 also significantly suppressed the growth of ovarian carcinoma and potentiated the antineoplastic effects of cisplatin in vivo. In conclusion, these findings indicate that MPT0G066 can be a potential anticancer agent against ovarian cancer that worthy of further development. PMID:27526962

  16. Studies on antineoplastic constituents from marine bryozoan Bugula neritina inhabiting South China Sea:isolation and structural elucidation of a novel macrolide%中国南海总合草苔虫抗癌活性成分研究:一个新的大环内酯的分离鉴定

    Institute of Scientific and Technical Information of China (English)

    林厚文; 刘皋林; 易杨华; 姚新生; 吴厚铭

    2004-01-01

    Objective :To investigate the antineoplastic constituents from marine bryozoan Bugula neritina in South China Sea. Methods:Antineoplastic compounds were screened by bioassay-guided method with partitive extraction and multiple column chromatographies (Sephadex LH-20,ODS and preparative HPLC). Structures of active compounds were determined by high-resolution 2D NMR (600 MHz) and ESI-MS techniques. Results:A new antineoplastic macrolide bryostatin 19 (1) was isolated from this animal. Five known antineoplastic bryostatins: bryostatin 4 (2), bryostatin 5 (3), bryostatin 6 (4), bryostatin 18(5) and bryostatin 10(6),were for the first time obtained from this bryozoan in South China Sea. Bryostatin 19(1) shows strong inhibition activity against U937 cell line with ED50 value being 3.2 nmol/L in vitro. Conclusion : The animal resource of Bugula neritina is abundant in South China Sea. It contains potential antineoplastic new macrolide of bryostatin series and will be developed as potentially useful source of anticancer agents in the future.%目的:研究中国南海总合草苔虫中的抗癌活性成分.方法:通过分级萃取和多种硅胶柱层析(Sephadex LH-20凝胶过滤、ODS反相层析和HPLC)追踪分离抗癌活性成分;利用电喷雾离子质谱(ESI-MS)和高分辨(600 MHz)核磁共振二维谱技术鉴定化合物的结构.结果:分离得到一个新的具有显著抗肿瘤活性的大环内酯bryostatin 19(1).同时还首次自中国海域的该种苔虫中分离鉴定了5个bryostatins类大环内酯抗癌活性化合物:bryostatin 4,5,6,10,18.Bryostatin 19显示很强的体外抗癌活性,对U937细胞的ED50值为3.2 nmol/L.结论:我国南海总合草苔虫资源丰富,并且含有新结构的抗癌活性草苔虫内酯.本研究结果为今后的新药研制与开发提供了参考.

  17. Investigations and Performance Evaluation of Dynamic Routing Protocol with New Proposed Protocol for WAN

    Directory of Open Access Journals (Sweden)

    Vasudha,

    2011-05-01

    Full Text Available Routing is a relevant issue for maintaining good performance and successfully operating in a network. Routing Protocols allow routers to dynamically advertise and learn routes, determine whichroutes are available and which are the most efficient routes to a destination. In any IP network, routing protocols provide the intelligence that takes a collection of physical links and transforms them into a network that enables packets to travel from one host to another. In this paper we present performance evaluation for the combination of conventional model of “RIP” and “OSPF” routing protocols for network traffic over WAN using OPNET. There is significant improvement in the FTP download response time which is reduced by the order of 3sec. The performance metrics like: point-to-point link utilization has increased from 122% to 133% and throughput has increased from 1547 to 1703packets/sec without significant change in queuing delay for both the protocols.

  18. Energy-efficient MAC protocols for Wireless Sensor Networks

    Institute of Scientific and Technical Information of China (English)

    Li De-liang; Peng Fei

    2009-01-01

    Designing energy-efficient Medium Access Control (MAC) protocols has a significant influence on the energy performance of wireless sensor network (WSN). In this paper we present a survey of the recent typical MAC protocols regarding energy efficiency for WSN. According to channel access policies, we classify these protocols into four categories: contention-based, TDMA-based, hybrid, and cross layer protocols, in which the advantages and disadvantages in each class of MAC protocols are discussed. Finally, we point out open research issues that need to carry on to achieve high energy efficiency for the design of MAC protocols in WSN.

  19. The Research and Application Design of SDL Protocol

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Aiming at overcoming the disadvantages in the Simple Data Link(SDL) protocol, we study and modify the protocol mechanism, which enhances the flexibility in carrying the packets of various network layer protocols and improves the ability to correct errors. We research the error check and error correction of CRC and the application of MPLS labels in the SDL protocol. Furthermore, we provide a method of CRC correction and application of MPLS labels in the SDL protocol. Finally, we present a scheme of realizing the SDL protocol.

  20. The comparative cost analysis of EAP Re-authentication Protocol and EAP TLS Protocol

    OpenAIRE

    Seema Mehla; Bhawna Gupta

    2010-01-01

    the Extensible Authentication Protocol (EAP) is a generic framework supporting multiple types of authentication methods. In systems where EAP is used for authentication, it is desirable to not repeat the entire EAP exchange with another authenticator. The EAP reauthentication Protocol provides a consistent, methodindependentand low-latency re-authentication. It is extension to current EAP mechanism to support intradomain handoff authentication. This paper analyzed the performance of the EAP r...

  1. Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol

    Directory of Open Access Journals (Sweden)

    Simarpreet Kaur

    2012-11-01

    Full Text Available Low power MAC protocols have received a lot of consideration in the last few years because of their influence on the lifetime of wireless sensor networks. Since, sensors typically operate on batteries, replacement of which is often difficult. A lot of work has been done to minimize the energy expenditure and prolong the sensor lifetime through energy efficient designs, across layers. Meanwhile, the sensor network should be able to maintain a certain throughput in order to fulfill the QoS requirements of the end user, and to ensure the constancy of the network. This paper introduces different types of MAC protocols used for WSNs and proposes S‐MAC, a Medium‐Access Control protocol designed for Wireless Sensor Networks. S‐MAC uses a few innovative techniques to reduce energy consumption and support selfconfiguration. A new protocol is suggested to improve the energy efficiency, latency and throughput of existing MAC protocol for WSNs. A modification of the protocol is then proposed to eliminate the need for some nodes to stay awake longer than the other nodes which improves the energy efficiency, latency and throughput and hence increases the life span of a wireless sensor network.

  2. Automated Verification of Quantum Protocols using MCMAS

    Directory of Open Access Journals (Sweden)

    F. Belardinelli

    2012-07-01

    Full Text Available We present a methodology for the automated verification of quantum protocols using MCMAS, a symbolic model checker for multi-agent systems The method is based on the logical framework developed by D'Hondt and Panangaden for investigating epistemic and temporal properties, built on the model for Distributed Measurement-based Quantum Computation (DMC, an extension of the Measurement Calculus to distributed quantum systems. We describe the translation map from DMC to interpreted systems, the typical formalism for reasoning about time and knowledge in multi-agent systems. Then, we introduce dmc2ispl, a compiler into the input language of the MCMAS model checker. We demonstrate the technique by verifying the Quantum Teleportation Protocol, and discuss the performance of the tool.

  3. Gamma camera performance: technical assessment protocol

    Energy Technology Data Exchange (ETDEWEB)

    Bolster, A.A. [West Glasgow Hospitals NHS Trust, London (United Kingdom). Dept. of Clinical Physics; Waddington, W.A. [University College London Hospitals NHS Trust, London (United Kingdom). Inst. of Nuclear Medicine

    1996-12-31

    This protocol addresses the performance assessment of single and dual headed gamma cameras. No attempt is made to assess the performance of any associated computing systems. Evaluations are usually performed on a gamma camera commercially available within the United Kingdom and recently installed at a clinical site. In consultation with the manufacturer, GCAT selects the site and liaises with local staff to arrange a mutually convenient time for assessment. The manufacturer is encouraged to have a representative present during the evaluation. Three to four days are typically required for the evaluation team to perform the necessary measurements. When access time is limited, the team will modify the protocol to test the camera as thoroughly as possible. Data are acquired on the camera`s computer system and are subsequently transferred to the independent GCAT computer system for analysis. This transfer from site computer to the independent system is effected via a hardware interface and Interfile data transfer. (author).

  4. Fairness in Physical Products Delivery Protocol

    Directory of Open Access Journals (Sweden)

    Abdullah Mohammed Alaraj

    2012-12-01

    Full Text Available In an e-commerce transaction, a buyer purchases a physical product, such as a laptop, from an onlineseller. In an attempt to protect himself, any seller would prefer to collect payment from the buyer beforehe sends the product. Likewise, the buyer would prefer to have the product shipped to him before hemakes a payment to the seller. Both parties have a need to take precautions to minimize their risk in casethe other party proves to be untrustworthy. This paper proposes a new e-commerce fair exchangeprotocol based on verifiable and recoverable encryption of keys. The proposed protocol is based onoffline TTP. Only seven messages are exchanged between the parties involved in the protocol. Disputesare resolved electronically in case one party evades

  5. Non-blocking message total ordering protocol

    Institute of Scientific and Technical Information of China (English)

    WANG Yun; WANG JunLing

    2008-01-01

    Message total ordering is a critical part in active replication in order to maintain consistency among members in a fault tolerant group. The paper proposes a non-blocking message total ordering protocol (NBTOP) for distributed systems. Non-blocking property refers to that the members in a fault tolerant group keep on running independently without waiting for installing the same group view when a fault tolerant group evolves even when decision messages collide. NBTOP takes advantage of token ring as its logical control way. Members adopt re-requesting mechanism (RR) to obtain their lost decisions. Forward acknowledgement mechanism (FA) is put forth to solve decision collisions. The paper further proves that NBTOP satisfies the properties of total order, agreement, and termination. NBTOP is implemented, and its performance test is done. Comparing with the performance of Totem, the results show that NBTOP has a better total ordering delay. It manifests that non-blocking property helps to improve protocol efficiency.

  6. Staining protocol for organotypic hippocampal slice cultures.

    Science.gov (United States)

    Gogolla, Nadine; Galimberti, Ivan; DePaola, Vincenzo; Caroni, Pico

    2006-01-01

    This protocol details a method to immunostain organotypic slice cultures from mouse hippocampus. The cultures are based on the interface method, which does not require special equipment, is easy to execute and yields slice cultures that can be imaged repeatedly, from the time of isolation at postnatal day 6-9 up to 6 months in vitro. The preserved tissue architecture facilitates the analysis of defined hippocampal synapses, cells and entire projections. Time-lapse imaging is based on transgenes expressed in the mice or on constructs introduced through transfection or viral vectors; it can reveal processes that develop over periods ranging from seconds to months. Subsequent to imaging, the slices can be processed for immunocytochemistry to collect further information about the imaged structures. This protocol can be completed in 3 d.

  7. May the Kyoto protocol produce results?

    International Nuclear Information System (INIS)

    A not well managed drastic reduction of greenhouse emissions might result in significant decrease of living standards, but without such reduction efforts, climate change might have five to twenty times higher costs. Thus, while indicating estimated consequences or evolutions of greenhouse emissions and temperature, the author stresses the need of emission reduction. She discusses the role of economic instruments which can be used in policies aimed at the struggle against climate change. She recalls the emission reduction commitments specified in the Kyoto protocol, discusses the present status, operation and results of the international emission trading scheme, the lessons learned after the first years of operation, comments the involvement of emerging countries in relationship with another mechanism defined in the protocol: the Clean Development Mechanism

  8. Mouse cell culture - Methods and protocols

    Directory of Open Access Journals (Sweden)

    CarloAlberto Redi

    2010-12-01

    Full Text Available The mouse is, out of any doubt, the experimental animal par excellence for many many colleagues within the scientific community, notably for those working in mammalian biology (in a broad sense, from basic genetic to modeling human diseases, starting at least from 1664 Robert Hooke experiments on air’s propertyn. Not surprising then that mouse cell cultures is a well established field of research itself and that there are several handbooks devoted to this discipline. Here, Andrew Ward and David Tosh provide a necessary update of the protocols currently needed. In fact, nearly half of the book is devoted to stem cells culture protocols, mainly embryonic, from a list of several organs (kidney, lung, oesophagus and intestine, pancreas and liver to mention some........

  9. An Efficient Multicast Source Authentication Protocol

    Institute of Scientific and Technical Information of China (English)

    WANG Weidong; LI Zhitang; LU Chuiwei; ZHANG Yejiang

    2006-01-01

    We propose an efficient multicast source authentication protocol called efficient multi-tree-chains scheme (EMTC),which shows more loss resistibility,less communication cost,and no delay at receivers. The EMTC scheme is based on combination of single Chain scheme and Hash Tree Chains scheme,and integrates the advantages of both. In this scheme,stream is firstly divided into blocks with n packets,and each block consists of m clusters,everyone of which contains a tree of packets. All clusters are chained together. Through EMTC,packets of one cluster can be authenticated by any packet of the previous cluster. Compared to other multicast authentication protocols,the proposed scheme has the following advantages: ① dramatically improves the resistance to burst packets loss; ② low computation and communication overhead; ③ imposes low delay on the sender side and no delay on the receiver side.

  10. Da Vinci robot emergency undocking protocol.

    Science.gov (United States)

    O'Sullivan, O E; O'Sullivan, S; Hewitt, M; O'Reilly, B A

    2016-09-01

    The role of robot-assisted surgery across gynaecology is evolving with increasing numbers of procedures being undertaken with varying degrees of complexity. While the risk of conversion is low at approximately 1 %, the reasons for conversion are variable. These range from technical issues with the robot, surgical complications such as haemorrhage and anaesthetics issues such as an inability to ventilate the patient adequately. While many conversions to open or laparoscopic approach are not due to life-threatening indications, it is important that the theatre staff are aware of the indication and can perform an emergency undocking as effectively, efficiently and safely as possible when the need arises. Unfortunately, there is a paucity of the literature available outlining such protocols. For this reason, we developed an emergency undocking protocol clearly outlining the role of each theatre staff member and the need for clear concise communication. PMID:27126584

  11. Direct data access protocols benchmarking on DPM

    CERN Document Server

    Furano, Fabrizio; Keeble, Oliver; Mancinelli, Valentina

    2015-01-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring infor...

  12. Internet Core Protocols Help for Network Administrators

    CERN Document Server

    Hall, Eric

    2000-01-01

    If you've ever been responsible for a network, you know that sinkingfeeling: your pager has gone off at 2 a.m., the network is broken, and you can't figure out why by using a dial-in connection from home. You drive into the office, dig out your protocol analyzer, and spend the next fourhours trying to put things back together before the staff shows up for work. When this happens, you often find yourself looking at the low-level guts of the Internet protocols: you're deciphering individual packets, trying to figure out what is (or isn't) happening. Until now, the only real guide to the protoc

  13. Kyoto protocol and Nepal's energy sector

    International Nuclear Information System (INIS)

    Nepal has recently ratified Kyoto Protocol, which considers justifiable use of resources to limit or reduce the emission of gases that contribute to green house gas inventory in the atmosphere. Nepal's per capita green gas (GHG) emission from energy use is insignificant. However, it is important for Nepal to adopt environmentally friendly energy options based on local resources like hydropower and biomass. Nepal can benefit from the provisions of clean development mechanism (CDM) under the Kyoto Protocol of the United Nations Framework Convention on Climate Change (UNFCC) or carbon funds being promoted by various organizations in order to obtain funding for new projects that reduce GHG emissions (ER). Funding can be generated through Carbon trading in international market as well. In this paper, the country's current contribution to GHG due to energy consumption is evaluated. Options for promoting more sustainable and environmentally friendly projects have also been discussed

  14. Protocol independent adaptive route update for VANET.

    Science.gov (United States)

    Rasheed, Asim; Ajmal, Sana; Qayyum, Amir

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptive route update usually becomes impractical for dense networks due to large routing overheads. This paper presents an adaptive route update approach which can provide solution for any baseline routing protocol. The proposed adaptation eliminates the classification of reactive and proactive by categorizing them as logical conditions to find and update the route. PMID:24723807

  15. Analysis of Security Protocols in Embedded Systems

    DEFF Research Database (Denmark)

    Bruni, Alessandro

    .e., protecting the system from the external world). With increased connectivity of these systems to external networks the attack surface has grown, and consequently there is a need for securing the system from external attacks. Introducing security protocols in safety critical systems requires careful......Embedded real-time systems have been adopted in a wide range of safety-critical applications—including automotive, avionics, and train control systems—where the focus has long been on safety (i.e., protecting the external world from the potential damage caused by the system) rather than security (i...... considerations on the available resources, especially in meeting real-time and resource constraints, as well as cost and reliability requirements. For this reason many proposed security protocols in this domain have peculiar features, not present in traditional security literature. In this thesis we tackle...

  16. Severe hypomagnesaemia with tetany following ESHAP protocol

    Directory of Open Access Journals (Sweden)

    Majumdar Gautam

    2002-01-01

    Full Text Available Abstract Background One patient with B-cell Non-Hodgkin's Lymphoma developed severe hypomagnesaemia and tetany 15 days after the first course of treatment with ESHAP protocol. This prompted a careful look at the incidence and severity of hypomagnesaemia during treatment with this combination chemotherapy. Method This patient and two further patients having the same treatment were monitored for hypomagnesaemia throughout their treatment period. Result All three patients developed significant hypomagnesaemia requiring intravenous magnesium infusion in the second and third weeks after treatment though not after every course of chemotherapy. Conclusions ESHAP protocol is often associated with significant hypomagnesaemia two to three weeks after treatment. Therefore, serum magnesium level should be monitored throughout the treatment period.

  17. Bell Inequalities, Experimental Protocols and Contextuality

    CERN Document Server

    Kupczynski, Marian

    2014-01-01

    The violation of Bell, CHSH and CH inequalities indicates only that the assumption of "conterfactual definiteness" and/or the probabilistic models used in proofs were incorrect. In this paper we discuss in detail an intimate relation between experimental protocols and probabilistic models. In particular we show that local realistic and stochastic hidden variable models are inconsistent with the experimental protocols used in spin polarization correlation experiments. In particular these models neglect a contextual character of quantum theory (QT) and do not describe properly quantum measurements. We argue that the violation of various inequalities gives arguments against the irreducible randomness of act of the measurement. Therefore quantum probabilities are reducible what means that QT is emergent. In this case one could expect to discover in time series of data some unpredicted fine structures proving that QT is not predictably complete what would be a major discovery.

  18. A New Secure Pairing Protocol using Biometrics

    OpenAIRE

    Buhan, I.R.

    2008-01-01

    Secure Pairing enables two devices, which share no prior context with each other, to agree upon a security association that they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping or to a man-in-the-middle attack. We propose a user friendly solution to this problem. Keys extracted from biometric data of the participants are used for authentication. Details of the pairing protocol a...

  19. Traffic Engineering With Traditional IP Routing Protocols

    OpenAIRE

    Fortz, Bernard; Rexford, Jennifer; Thorup, Mikkel

    2002-01-01

    Traffic engineering involves adapting the routing of traffic to the network conditions, with the joint goals of good user performance and efficient use of network resources. In this paper, we describe an approach to intradomain traffic engineering that works within the existing deployed base of Interior Gateway Protocols (IGPs), such as Open Shortest Path First (OSPF) and Intermediate System-Intermediate System (IS-IS). We explain how to adapt the configuration of link weights, based on a ...

  20. Trusted Hosts in Host Identity Protocol (HIP)

    OpenAIRE

    K.C., Amir

    2012-01-01

    The goal of the project was to study the possibilities to establish trusted hosts in Host Identity Protocol (HIP) and implement certificate handling in HIP packets. The time complexity and performance while using certificates in HIP packets was also measured. The research project was carried out at Arcada University of Applied Sciences in collaboration with Helsinki University. The project aimed to implement standard x.509 certification of the public key used as HI (Host Identity) to deri...

  1. z39.50 Information Retrieval Protocol

    OpenAIRE

    Koganuramath, M. M.; Angadi, Mallikarjun; Kademani, B. S.

    2001-01-01

    This article describes the Internet information retrieval protocol z39.50 and it's usage. Brief history, definition and the working of z39.50 are also depicted here. An attempt has also been made to study various versions of z39.50 and on freely available softwares on the web. Some of the problems encountered, current developments and new initiatives are also discussed here.

  2. The Kyoto protocol in a global perspective

    OpenAIRE

    Tjaša Redek; Matjaž Koman; Polona Domadenik; Andreja Cirman

    2009-01-01

    The global climate has changed notably since the beginning of the Industrial Revolution. Atmospheric concentrations of greenhouse gasses (GHG) have increased dramatically followed by an increase in global average temperature. In order to avoid negative potential outcomes of global warming, countries have adopted the United Nations Framework Convention on Climate Change that has so far been ratified by 192 countries. In 1997 the Kyoto Protocol, a binding GHG reduction plan, ...

  3. Dynamic consistency problems behind the Kyoto protocol

    OpenAIRE

    Ha-Duong, Minh; Hourcade, Jean Charles; Lecocq, Franck

    1999-01-01

    This paper examines the economic rationale behind both the quantitative targets and the flexibility mechanisms adopted in the Kyoto Protocol. It synthesises some theoretical dimensions of the debate about the so-called "when flexibility" of climate policies, explaining the importance of the interplay between uncertainty and technico-economic inertia. Numerical results shows that the aggregate Kyoto abatement target is consistent with a stochastic dynamic optimum in which a 450 ppm concentrati...

  4. Studying Media Access andControl Protocols

    OpenAIRE

    Mohammed, Alalelddin Fuad Yousif

    2010-01-01

    This thesis project’s goal is to enable undergraduate students to gain insight into media access and control protocols based upon carrying out laboratory experiments. The educational goal is to de-mystifying radio and other link and physical layer communication technologies as the students can follow packets from the higher layers down through the physical layer and back up again. The thesis fills the gap between the existing documentation for the Universal Software Radio Peripheral (USRP) re...

  5. Session Initiation Protocol Security: A Brief Review

    OpenAIRE

    Selvakumar Manickam; Chen-Wei Tan; Aws N. Jaber; Ali A. Khudher

    2012-01-01

    Problem statement: This study aims to discuss several issues on session initiation protocol security and threats. An in-depth investigation related to SIP with the intention to categorize the wide variety of SIP security issues. Approach: Related papers to the infrastructure of SIP security were analysed. Some of the identified issues are: Social threats, eavesdropping, delaying, modification of media session, service abuse threats, physical access threats and denied services threats. Results...

  6. Building America House Simulation Protocols (Revised)

    Energy Technology Data Exchange (ETDEWEB)

    Hendron, R.; Engebrecht, C.

    2010-10-01

    The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

  7. DATA PROVENANCE IN PHOTOGRAMMETRY THROUGH DOCUMENTATION PROTOCOLS

    OpenAIRE

    Carboni, N.; G. Bruseker; A. Guillem; Bellido Castañeda, D.; Coughenour, C.; Domajnko, M.; Kramer, M.; Ramos Calles, M. M.; E. K. Stathopoulou; R Suma

    2016-01-01

    Documenting the relevant aspects in digitisation processes such as photogrammetry in order to provide a robust provenance for their products continues to present a challenge. The creation of a product that can be re-used scientifically requires a framework for consistent, standardised documentation of the entire digitisation pipeline. This article provides an analysis of the problems inherent to such goals and presents a series of protocols to document the various steps of a photogra...

  8. Mobile opportunistic networks architectures, protocols and applications

    CERN Document Server

    Denko, Mieso K

    2011-01-01

    Widespread availability of pervasive and mobile devices coupled with recent advances in networking technologies make opportunistic networks one of the most promising communication technologies for a growing number of future mobile applications. Covering the basics as well as advanced concepts, this book introduces state-of-the-art research findings, technologies, tools, and innovations. Prominent researchers from academia and industry report on communication architectures, network algorithms and protocols, emerging applications, experimental studies, simulation tools, implementation test beds,

  9. Retinopathy of Prematurity and Blood Transfusion Protocols

    OpenAIRE

    P Mohagheghi; Khosravi, N.; H Samaii

    2003-01-01

    To determine the role of blood transfusion protocols on retinopathy of prematurity (ROP), a prospective cohort study on 57 premature infants under 1501 grams birth weight was performed. Fourteen day-old infants were divided into two groups randomly. Infants in group 1 (n=27) received packed red blood cell transfusion only if specific medical signs were met and their hematocrit level was under 30%. Infants in group 2 (n=30) received blood transfusion to maintain their hematocrit level > 40%...

  10. A CONTRIBUTION TO SECURE THE ROUTING PROTOCOL

    OpenAIRE

    Mohammed ERRITALI; Oussama Mohamed Reda; Bouabid El Ouahidi

    2011-01-01

    This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter StatelessRouting) for vehicular ad hoc networks, we examine the possible attacks against GPSR and securitysolutions proposed by different research teams working on ad hoc network security. Then, we propose asolution to secure GPSR packet by adding a digital signature based on symmetric cryptographygenerated using the AES algorithm and the MD5 hash function more suited to a mobile environment

  11. An adaptive protocol for distributed beamforming

    OpenAIRE

    Sigg, Stephan; Beigl, Michael

    2011-01-01

    We study distributed adaptive beamforming in networks of wireless nodes. In particular, we observe that for the synchronisation of carrier phases, distinct algorithmic configurations are optimal in various environmental settings and propose a protocol that utilises organic computing principles to find optimum parameters. Furthermore, we study the impact of different modulation schemes on the bit error rate of a signal sequence transmitted collaboratively by distributed devices via adaptive be...

  12. Stochastic stability of continuous time consensus protocols

    OpenAIRE

    Medvedev, Georgi S.

    2010-01-01

    A unified approach to studying convergence and stochastic stability of continuous time consensus protocols (CPs) is presented in this work. Our method applies to networks with directed information flow; both cooperative and noncooperative interactions; networks under weak stochastic forcing; and those whose topology and strength of connections may vary in time. The graph theoretic interpretation of the analytical results is emphasized. We show how the spectral properties, such as algebraic co...

  13. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  14. Routing Protocols in MANET: Comparative Study

    OpenAIRE

    Jayanti; Vikram Nandal

    2014-01-01

    A Mobile Ad Hoc Network (MANET) is composed of mobile nodes without any infrastructure like wireless access points or base stations. MANET describes wireless, mobile and multi-hop networks that operate without the benefit of any existing infrastructure except for the nodes themselves. The main goal of an ad hoc network routing protocol is to establish correct and efficient route between a pair of mobile nodes so that messages delivered within the active route timeout interval. Several protoco...

  15. Montreal Protocol Benefits simulated with CCM SOCOL

    Directory of Open Access Journals (Sweden)

    T. Egorova

    2013-04-01

    Full Text Available Ozone depletion is caused by the anthropogenic increase of halogen-containing species in the atmosphere, which results in the enhancement of the concentration of reactive chlorine and bromine in the stratosphere. To reduce the influence of anthropogenic ozone-depleting substances (ODS, the Montreal Protocol was agreed by Governments in 1987, with several Amendments and Adjustments adopted later. In order to assess the benefits of the Montreal Protocol and its Amendments and Adjustments (MPA on ozone and UV radiation, two different runs of the chemistry-climate model (CCM SOCOL have been carried out. The first run was driven by the emission of ozone depleting substances (ODS prescribed according to the restrictions of the MPA. For the second run we allow the ODS to grow by 3% annually. We find that the MPA would have saved up to 80% of the global annual total ozone by the end of the 21st century. Our calculations also show substantial changes of the stratospheric circulation pattern as well as in surface temperature and precipitations that could occur in the world without MPA implementations. To illustrate the changes in UV radiation at the surface and to emphasise certain features, which can only be seen for some particular regions if the influence of the cloud cover changes is accounted for, we calculate geographical distribution of the erythemally weighted irradiance (Eery. For the no Montreal Protocol simulation Eery increases by factor of 4 to 16 between the 1970s and 2100. For the scenario including the Montreal Protocol it is found that UV radiation starts to decrease in 2000, with continuous decline of 5% to 10% at middle latitudes in the both Northern and Southern Hemispheres.

  16. A CONTRIBUTION TO SECURE THE ROUTING PROTOCOL

    Directory of Open Access Journals (Sweden)

    Mohammed ERRITALI

    2011-10-01

    Full Text Available This work presents a contribution to secure the routing protocol GPSR (Greedy Perimeter StatelessRouting for vehicular ad hoc networks, we examine the possible attacks against GPSR and securitysolutions proposed by different research teams working on ad hoc network security. Then, we propose asolution to secure GPSR packet by adding a digital signature based on symmetric cryptographygenerated using the AES algorithm and the MD5 hash function more suited to a mobile environment

  17. Comparison of Five Parathyroid Scintigraphic Protocols

    Directory of Open Access Journals (Sweden)

    Virpi Tunninen

    2013-01-01

    Full Text Available Objectives. We compared five parathyroid scintigraphy protocols in patients with primary (pHPT and secondary hyperparathyroidism (sHPT and studied the interobserver agreement. The dual-tracer method (T99mc-sestamibi/123I was used with three acquisition techniques (parallel-hole planar, pinhole planar, and SPECT/CT. The single-tracer method (T99mc-sestamibi was used with two acquisition techniques (double-phase parallel-hole planar, and SPECT/CT. Thus five protocols were used, resulting in five sets of images. Materials and Methods. Image sets of 51 patients were retrospectively graded by four experienced nuclear medicine physicians. The final study group consisted of 24 patients (21 pHPT, 3 sHPT who had been operated upon. Surgical and histopathologic findings were used as the standard of comparison. Results. Thirty abnormal parathyroid glands were found in 24 patients. The sensitivities of the dual-tracer method (76.7–80.0% were similar (P=1.0. The sensitivities of the single-tracer method (13.3–31.6% were similar (P=0.625. All differences in sensitivity between these two methods were statistically significant (P<0.012. The interobserver agreement was good. Conclusion. This study indicates that any dual-tracer protocol with T99mc-sestamibi and 123I is superior for enlarged parathyroid gland localization when compared with single-tracer protocols using T99mc-sestamibi alone. The parathyroid scintigraphy was found to be independent of the reporter.

  18. Dynamic Characteristics of Explicit Control Protocol

    Institute of Scientific and Technical Information of China (English)

    CHENG Shuang-mei; LI Jian-hua; GUO Chuan-xiong

    2008-01-01

    The dynamic characteristics of eplicit control protocol (XCP) were investigated with single bottle-neck on the microscopic time-scale. Analysis and simulation results show that the bandwidth utilization of an XCP bottleneck link converges to 1 at exponential rate, persistent congestion cannot occur at the bottleneck link, and throughput of an arbitrary subset of XCP flows at the bottleneck link converges to its fair share in exponential rate. The XCP has high bandwidth utilization and good fairness properties.

  19. Protocol Independent Adaptive Route Update for VANET

    OpenAIRE

    Asim Rasheed; Sana Ajmal; Amir Qayyum

    2014-01-01

    High relative node velocity and high active node density have presented challenges to existing routing approaches within highly scaled ad hoc wireless networks, such as Vehicular Ad hoc Networks (VANET). Efficient routing requires finding optimum route with minimum delay, updating it on availability of a better one, and repairing it on link breakages. Current routing protocols are generally focused on finding and maintaining an efficient route, with very less emphasis on route update. Adaptiv...

  20. Integrated Routing Protocol for Opportunistic Networks

    OpenAIRE

    Anshul Verma; Dr. Anurag Srivastava

    2012-01-01

    In opportunistic networks the existence of a simultaneous path is not assumed to transmit a message between a sender and a receiver. Information about the context in which the users communicate is a key piece of knowledge to design efficient routing protocols in opportunistic networks. But this kind of information is not always available. When users are very isolated, context information cannot be distributed, and cannot be used for taking efficient routing decisions. In such cases, context o...